Token-Based Authentication Framework for 5G MEC Mobile Networks
نویسندگان
چکیده
MEC technology provides a distributed computing environment in 5G mobile networks for application and service hosting. It allows customers with different requirements professional competencies to use the services offered by external suppliers. We consider access control framework on that is efficient, flexible, user-friendly. Its central element Enabler, which handles AAA requests stakeholders accessing hosted edge servers. The JSON Web Token (JWT) open standard suitable tool Enabler manage credentials transfer them securely between parties. In this paper, context of control, we propose token reference pattern called Access (JMAT) analyze effectiveness its available protection methods compliance MEC-hosted networks.
منابع مشابه
Analysis of Two Token-Based Authentication Schemes for Mobile Banking
We analyze two token-based authentication schemes, designed for authenticating users in banking systems implemented over mobile networks. The first scheme is currently deployed in India by a mobile banking service provider named Eko with a reach of over 50,000 customers. The second scheme was proposed recently in [1] (in joint effort with Eko) to fix weaknesses in the first one, and is now bein...
متن کاملMEC-aware Cell Association for 5G Heterogeneous Networks
The need for efficient use of network resources is continuously increasing with the grow of traffic demand, however, current mobile systems have been planned and deployed so far with the mere aim of enhancing radio coverage and capacity. Unfortunately, this approach is not sustainable anymore, as 5G communication systems will have to cope with huge amounts of traffic, heterogeneous in terms of ...
متن کاملTechnology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDN
This paper analyzes current standardization situation of 5G and the role network softwarization plays in order to address the challenges the new generation of mobile networks must face. This paper surveys recent documentation from the main stakeholders to pick out the use cases, scenarios and emerging vertical sectors that will be enabled by 5G technologies, and to identify future high-level se...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics10141724