5 G : Towards secure ubiquitous connectivity beyond 2020 SICS technical report
نویسندگان
چکیده
The growing demand for mobile Internet, and the increasing number of connected devices, has required significant advancements in radio technology and networks compared to the previous generations of mobile telecommunication. Security however has only seen incremental changes to the previous mobile telecommunication generation, with enhancements that mitigate new threats and address revealed weaknesses. 5G is expected to change this, as novel use-cases will demand new trust models and require novel security solutions. In this paper, we examine the state of 5G Security, and start by describing the new expectations, requirements and enablers in 5G and the design principles conferred by material presented in selected publications. Furthermore, we describe the historic development of the authentication and key agreement protocols, which were introduced with GSM (2G), as an example of the incremental improvements to security. Additionally, we present select published papers that suggest di erent types of attacks on the current generations of mobile networks, and solutions to the identified weaknesses, which must be taken into account in 5G security. Finally, we describe a proposed 5G Security architecture, which bring new models for authentication, authorization and accounting (AAA) to 5G. The role of 5G security is clear, it must not only meet the basic security requirements in confidentiality, integrity and privacy, but also foster user confidence in mobile telecommunication.
منابع مشابه
Generic Peer-to-Peer Support for a Personal Service Platform
Building on previous work of the OASIS group at SICS, this paper presents a generic peer-to-peer system for the sView personal service platform. The sView platform provides each user with a personal service briefcase from which services may be reached using a variety of devices and interfaces. With the peer-to-peer system, called Briefcase Connectivity, we leverage the community of all sView us...
متن کاملCompelling Needs and Technologies to support Reconfigurable Terminals
To date, research into reconfigurable mobile communications has predominantly focussed on the software radio concept, and specifically on the hardware technologies required to move physical layer processing into a programmable environment [1][2][3]. Although an interesting and necessary challenge, this only represents a fraction of the overall support and technology required to realise the pote...
متن کاملSecure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملSecuring Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks
Ubiquitous wireless Internet access networks (UWIANs) integrate mobile ad hoc networks into the Internet to achieve ubiquitous Internet connectivity. The Internet connectivity is provided by Internet gateways in the UWIANs. Most of the Internet connectivity research has not considered a malicious environment. However, UWIANs will not be able to succeed without an effective security solution due...
متن کاملPAWNs: Satisfying the Need for Ubiquitous Secure Connectivity and Location Services
The dawning of the 21st century has seen unprecedented growth in the number of wireless users, applications, and network access technologies. This trend is enabling the vision of pervasive, ubiquitous computing where users have network access anytime, anywhere, and applications are location-sensitive and contextaware. To realize this vision, we need to extend network connectivity beyond private...
متن کامل