Javascript must be enabled to continue!
Extending Open5GS for IIoT: Performance Evaluation of the EAP-AKA’ Integration for 5G Standalone Non-Public Networks
View through CrossRef
The growing demands of the Industrial Internet of Things (IIoT) necessitate secure and flexible authentication in 5G Standalone Non-Public Network (SNPN). While the Extensible Authentication Protocol (EAP) supports such scenarios, open-source 5G cores, such as Open5GS, lack support for EAP-based methods and rely solely on 5G-AKA. This work adds EAP-AKA’ support to Open5GS, enabling secure USIM-based authentication for SNPN. A virtualized testbed was used to compare EAP-AKA’ with standard 5G-AKA. Results show that EAP-AKA’ increases message size, latency, and memory usage due to EAP encapsulation and ECIES-based cryptographic operations. Despite the added overhead, EAP-AKA’ improves authentication flexibility. This enhancement makes Open5GS more suitable for private 5G deployments in industrial environments, aligning it with 3GPP standards for secure and scalable authentication.
Centre for Continental Network in Eco-Innovation and Research
Title: Extending Open5GS for IIoT: Performance Evaluation of the EAP-AKA’ Integration for 5G Standalone Non-Public Networks
Description:
The growing demands of the Industrial Internet of Things (IIoT) necessitate secure and flexible authentication in 5G Standalone Non-Public Network (SNPN).
While the Extensible Authentication Protocol (EAP) supports such scenarios, open-source 5G cores, such as Open5GS, lack support for EAP-based methods and rely solely on 5G-AKA.
This work adds EAP-AKA’ support to Open5GS, enabling secure USIM-based authentication for SNPN.
A virtualized testbed was used to compare EAP-AKA’ with standard 5G-AKA.
Results show that EAP-AKA’ increases message size, latency, and memory usage due to EAP encapsulation and ECIES-based cryptographic operations.
Despite the added overhead, EAP-AKA’ improves authentication flexibility.
This enhancement makes Open5GS more suitable for private 5G deployments in industrial environments, aligning it with 3GPP standards for secure and scalable authentication.
Related Results
CELAYIRLI EMİRÜ’L-ÜMERALIĞINDAN EMİR TİMUR’UN TABİİYETİNE: EMİR ADİL AKA’NIN SERENCAMI
CELAYIRLI EMİRÜ’L-ÜMERALIĞINDAN EMİR TİMUR’UN TABİİYETİNE: EMİR ADİL AKA’NIN SERENCAMI
İlhanlı Devleti’nin yıkılışıyla birlikte Bağdat merkezli kurulan Celayırlı Devleti, Sultan Şeyh Üveys (h. 1356-1374) döneminde İlhanlıların varisi olarak onların topraklarının nere...
Integration of Next Generation IIoT with Blockchain for the Development of Smart Industries
Integration of Next Generation IIoT with Blockchain for the Development of Smart Industries
In modern era, a wide range of smart industries is being focus on automation-based applications. Various technologies are rapidly implementing in Industrial Internet of Things (IIo...
Integrated Fuzzy Decision Tree based Blockchain Federated Safety- as-a-Service for IIoT
Integrated Fuzzy Decision Tree based Blockchain Federated Safety- as-a-Service for IIoT
Abstract
Blockchains are not appropriate for smart appliances because they are expensive to compute, have a lot of overhead bandwidth and cause delays. Improving data deliv...
An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancem...
Non-Recommended Publishing Lists: Strategies for Detecting Deceitful Journals
Non-Recommended Publishing Lists: Strategies for Detecting Deceitful Journals
Abstract
The rapid growth of open access publishing (OAP) has significantly improved the accessibility and dissemination of scientific knowledge. However, this expansion has also c...
A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application
A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application
Abstract
Industrial IoT (IIoT) is a specialized subset of IoT which involves the interconnection of industrial devices with ubiquitous control and intelligent processing se...
A Secure Hybrid Deep Learning Technique for Anomaly Detection in IIoT Edge Computing
A Secure Hybrid Deep Learning Technique for Anomaly Detection in IIoT Edge Computing
The IIoT network involves smart sensors, actuators, and technologies extending IoT capabilities across industrial sectors. With the rapid development in connected technology and co...
DECONSTRUCTING STUDENT NEEDS IN EAP FOR STEM: INSIGHTS FROM BALEAP 2023 SYMPOSIUM
DECONSTRUCTING STUDENT NEEDS IN EAP FOR STEM: INSIGHTS FROM BALEAP 2023 SYMPOSIUM
The BALEAP STEM SIG 2023 Symposium on 'Deconstructing student needs in EAP for STEM' provided insights into the unique challenges and strategies for teaching English for Academic P...

