Study on 5G Mobile Communication Network Security
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (U1636216, U163620049, 61572485); National Grand FundamentalResearch (973) Program of China (2013CB338003)

  • Article
  • | |
  • Metrics
  • |
  • Reference [59]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    The fifth generation mobile communication network, abbreviated 5G network or 5G, is also called the next generation of mobile communication network, which aims at constructing a networked society and realizing the goal of "everything-connecting". With 4G mobile communication network entering the commercial stage, the research on 5G has gained wider attention all over the world. The realization of the vision for 5G needs the revolution and innovation of system structure and core techniques, and until now the corresponding techniques and standards are in the primary stage. The new architectures, new business, and new technology bring new challenges to 5G security. This paper briefly summarizes performance, key technology, application scenario, and standardization progress of 5G, analyzes the security requirements and challenges of 5G, introduces 5G security framework, and investigates some key issues and the corresponding solutions based on the research efforts, white paper and related standards. Furthermore, the paper discusses the current research trends in industries and academia in the context of 5G security.

    Reference
    [1] http://www.itu.int/en/ITU-R/information/Pages/default.aspx
    [2] http://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/Pages/default.aspx
    [3] 3GPP. 3G security, security architecture. Technical Specification, TS 33.102 v12.1.0, 2014.
    [4] http://www.3gpp.org
    [5] IMT-2020(5G) Promotion Group. 5G wireless technology architecture. White Paper, 2015(in Chinese).
    [6] IMT-2020(5G) Promotion Group. 5G network technology architecture. White Paper, 2015(in Chinese).
    [7] ITU-R. IMT-vision-framework and overall objectives of the future development of IMT for 2020 and beyond. Recommendation, ITU-R M.2083-0. 2015. http://www.itu.int/rec/R-REC-M.2083
    [8] http://www.3gpp.org/release-14
    [9] http://www.3gpp.org/release-15
    [10] https://5g-ppp.eu
    [11] http://www.ngmn.org/home.html
    [12] https://www.gsmaintelligence.com
    [13] 5G PPP. View on 5G architecture. White Paper, v 1.0, 2016.
    [14] NGMN. NGMN 5G white paper. 2015. http://www.ngmn.org/fileadmin/ngmn/content/downloads/Technical/2015/NGMN_5G_White_Paper_V1_0.pdf
    [15] GSMA Intelligence. Understanding 5G:Perspectives on future technological advancements in mobile. 2014.
    [16] IMT-2020(5G) Promotion Group. 5G vision and requirements. White Paper, 2014(in Chinese).
    [17] IMT-2020(5G) Promotion Group. 5G concept. White Paper, 2015(in Chinese).
    [18] IMT-2020(5G) Promotion Group. 5G network architecture design. White Paper, 2016(in Chinese).
    [19] IMT-2020(5G) Promotion Group. 5G network security requirements and architecture. White Paper, 2017(in Chinese).
    [20] Ericsson. 5G system-Enabling the transformation of industry and society. White Paper, 2017. https://www.ericsson.com/assets/local/publications/white-papers/wp-5g-systems.pdf
    [21] Samsung Electronics Co. 5G vision. White Paper, 2015. http://www.samsung.com/global/business-images/insights/2015/Samsung-5G-Vision-2.pdf
    [22] Nokia. Now is the time to prepare for 5G. White Paper, 2013.
    [23] Huawei Technologies Co. 5G opening up new business opportunities. White Paper, 2016.
    [24] 3GPP. Study on the security aspects of the next generation system. Technical Report, TR 33.899 v1.1.0, 2017.
    [25] 5G PPP. 5G PPP phase 1 security landscape. 2017. https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP_White-Paper_Phase-1-Security-Landscape_June-2017.pdf
    [26] NGMN. 5G security recommendations (package #1, package #2:networking slicing, package #3:mobile edge computing). White Paper, 2016.
    [27] Ericsson. 5G security-Scenarios and solutions. White Paper, 2017.
    [28] https://www.ericsson.com/assets/local/publications/white-papers/wp-5g-security.pdf
    [29] Nokia. Security challenges and opportunities for 5G mobile networks. White Paper, 2017.
    [30] Huawei Technologies Co. 5G security:Forward thinking. White Paper, 2015. http://www.huawei.com/minisite/5g/img/5G_Security_Whitepaper_en.pdf
    [31] ETSI. Network functions virtualization (NFV); Terminology for main concepts in NFV. Group Specification, NFV 003 v1.1.1. 2013.
    [32] ETSI. Network functions virtualization (NFV); Use cases. Group Specification, NFV 001 v1.1.1. 2013. http://www.etsi.org/deliver/etsi_gs/NFV/001_099/001/01.01.01_60/gs_NFV001v010101p.pdf
    [33] ETSI. Network functions virtualization (NFV); Proof of concepts; Framework. Group Specification, NFV-PER 002 v1.1.2. 2014. http://www.etsi.org/deliver/etsi_gs/NFV-PER/001_099/002/01.01.02_60/gs_NFV-PER002v010102p.pdf
    [34] Evangelos H, Kostas P, Spyros D, Hadi SJ, David M, Odysseas K. Software-Defined networking (SDN):Layers and architecture terminology. IETF RFC 7426. 2015.
    [35] 3GPP. 3GPP system architecture evolution; Security architecture. Technical Specification, TS 33.401 v15.0.0, 2017.
    [36] https://en.wikipedia.org/wiki/Orchestration_%28computing%29
    [37] Gnther H, Peter S. Towards 5G security. In:Proc. of the 14th IEEE Int'l Conf. on Trust, Security and Privacy in Computing and Communications. Helsinki, 2015. 1165-1170.[doi:10.1109/Trustcom.2015.499]
    [38] 3GPP. Study on architecture for next generation system (release 14). Technical Report, TR 23.799 v14.0.0, 2016.
    [39] 5G-Ensure Deliverable D3.5. 5G-PPP security enablers technical roadmap (update). 2016. http://5gensure.eu/sites/default/files/5GENSURE_D3.5%205G-PPP%20security%20enablers%20technical%20roadmap%20%28Update%29.pdf
    [40] 3GPP. Study on subscriber privacy impact in 3GPP. Technical Report, TR 33.849 v14.0.0, 2016.
    [41] 3GPP. Feasibility study on new services and markets technology nnablers-Network operation. Technical Report, TR 22.864 v15.0.0, 2016.
    [42] 3GPP. Study on management and orchestration of network slicing for next generation network. Technical Report, TR 28.801 v1.2.0. 2017.
    [43] NGMN. 5G network and service management including orchestration. White Paper, v2.12.7. 2017.
    [44] 3GPP. Specification of the 3GPP confidentiality and integrity algorithms EEA3 and EIA3, document 4:Design and evaluation reprot. Technical Specification, TR 35.924 v11.0.1, 2012.
    [45] Michel A, Mihir B, Phillip R. DHAES:An encryption scheme based on the Diffie-Hellman problem. IACR Cryptology ePrint Archive. 1999. 7.
    [46] Michel A, Mihir B, Phillip R. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In:Proc. of the Cryptographers' Track at RSA Conf. San Francisco, 2001. 143-158.[doi:10.1007/3-540-45353-9_12]
    [47] Dan B, Matt F. Identity-Based encryption from the Weil pairing. In:Proc. of the 21st Annual Int'l Cryptology Conf. Santa Barbara, 2001. 213-229.[doi:10.1007/3-540-44647-8_13]
    [48] Amit S, Brent W. Fuzzy identity based encryption. IACR Cryptology ePrint Archive. 2004. 86.
    [49] Bernard A, Larry BJ, John VR, James C, Henrik L. Extensible authentication protocol (EAP). IETF RFC 3748, 2004.
    [50] Rosario G, Christian G, Markus A, Simon H. A secure group-based AKA protocol for machine-type communications. In:Proc. of the 19th Annual Int'l Conf. on Information Security and Cryptology. Seoul, 2016. 3-27.[doi:10.1007/978-3-319-53177-9_1]
    [51] ETSI. Mobile edge computing-A key technology towards 5G. White Paper, ISBN No. 979-10-92620-08-5. 2015. http://www.etsi.org/images/files/ETSIWhitePapers/etsi_wp11_mec_a_key_technology_towards_5g.pdf
    [52] https://en.wikipedia.org/wiki/Deep_packet_inspection
    附中文参考文献:
    [5] IMT-2020(5G)推进组.5G无线技术架构.白皮书,2015.
    [6] IMT-2020(5G)推进组.5G网络技术架构.白皮书,2015.
    [16] IMT-2020(5G)推进组.5G愿景与需求.白皮书,2014.
    [17] IMT-2020(5G)推进组.5G概念.白皮书,2015.
    [18] IMT-2020(5G)推进组.5G网络架构设计.白皮书,2016.
    [19] IMT-2020(5G)推进组.5G网络安全需求与架构.白皮书,2017.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

冯登国,徐静,兰晓.5G移动通信网络安全研究.软件学报,2018,29(6):1813-1825

Copy
Share
Article Metrics
  • Abstract:6371
  • PDF: 18144
  • HTML: 4581
  • Cited by: 0
History
  • Received:August 09,2017
  • Revised:December 28,2017
  • Online: February 08,2018
You are the first2044894Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063