Security Aspects of 5G Mobile Networks
Само за регистроване кориснике
2019
Чланак у часопису (Објављена верзија)
Метаподаци
Приказ свих података о документуАпстракт
5G (or fifth generation) represents the latest generation of mobile network technology, whose implementation is underway in some countries. This mobile system has undeniable advantages over its predecessors. This paper gives an overview of security aspects of 5G networks, based on data derived from available literature. Authentication and key management are fundamental processes to the security of cellular networks. That is why the emphasis in the paper is put on elaborating these security methods and comparing features with the previous 4G system. Authentication components in 5G are different in regard to 4G because of the new service–based architecture. Further, 3GPP and non–3GPP access networks are treated more equally. Also, in case of 5G, the user equipment uses the public key of the home network to encrypt permanent identifier before it is sent to a network. In 4G, this identifier is sent as clear text (unencrypted). Key structure is longer in 5G than in 4G because of the impleme...ntation of two additional keys. Despite the evident advantages, consideration must be given to the security challenges brought to 5G networks by new services, architectures and technologies. For example, authentication in 5G is not without deficiencies. Namely, user tracking ability in 5G may still be possible.
Кључне речи:
5G / network security / architecture / authentication / key managementИзвор:
ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online), 2019, 17, 4, 137-143Издавач:
- Timisoara : University Politehnica
ISSN: 1584-2665 (printed editions, in two fascicules); 2601-2332 (online, all four fascicules)
[ Google Scholar ]Институција/група
JakovTY - JOUR AU - Čisar, Petar AU - Maravić Čisar, Sanja PY - 2019 UR - http://jakov.kpu.edu.rs/handle/123456789/1527 AB - 5G (or fifth generation) represents the latest generation of mobile network technology, whose implementation is underway in some countries. This mobile system has undeniable advantages over its predecessors. This paper gives an overview of security aspects of 5G networks, based on data derived from available literature. Authentication and key management are fundamental processes to the security of cellular networks. That is why the emphasis in the paper is put on elaborating these security methods and comparing features with the previous 4G system. Authentication components in 5G are different in regard to 4G because of the new service–based architecture. Further, 3GPP and non–3GPP access networks are treated more equally. Also, in case of 5G, the user equipment uses the public key of the home network to encrypt permanent identifier before it is sent to a network. In 4G, this identifier is sent as clear text (unencrypted). Key structure is longer in 5G than in 4G because of the implementation of two additional keys. Despite the evident advantages, consideration must be given to the security challenges brought to 5G networks by new services, architectures and technologies. For example, authentication in 5G is not without deficiencies. Namely, user tracking ability in 5G may still be possible. PB - Timisoara : University Politehnica T2 - ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online) T1 - Security Aspects of 5G Mobile Networks VL - 17 IS - 4 SP - 137 EP - 143 UR - https://hdl.handle.net/21.15107/rcub_jakov_1527 ER -
@article{ author = "Čisar, Petar and Maravić Čisar, Sanja", year = "2019", abstract = "5G (or fifth generation) represents the latest generation of mobile network technology, whose implementation is underway in some countries. This mobile system has undeniable advantages over its predecessors. This paper gives an overview of security aspects of 5G networks, based on data derived from available literature. Authentication and key management are fundamental processes to the security of cellular networks. That is why the emphasis in the paper is put on elaborating these security methods and comparing features with the previous 4G system. Authentication components in 5G are different in regard to 4G because of the new service–based architecture. Further, 3GPP and non–3GPP access networks are treated more equally. Also, in case of 5G, the user equipment uses the public key of the home network to encrypt permanent identifier before it is sent to a network. In 4G, this identifier is sent as clear text (unencrypted). Key structure is longer in 5G than in 4G because of the implementation of two additional keys. Despite the evident advantages, consideration must be given to the security challenges brought to 5G networks by new services, architectures and technologies. For example, authentication in 5G is not without deficiencies. Namely, user tracking ability in 5G may still be possible.", publisher = "Timisoara : University Politehnica", journal = "ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)", title = "Security Aspects of 5G Mobile Networks", volume = "17", number = "4", pages = "137-143", url = "https://hdl.handle.net/21.15107/rcub_jakov_1527" }
Čisar, P.,& Maravić Čisar, S.. (2019). Security Aspects of 5G Mobile Networks. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online) Timisoara : University Politehnica., 17(4), 137-143. https://hdl.handle.net/21.15107/rcub_jakov_1527
Čisar P, Maravić Čisar S. Security Aspects of 5G Mobile Networks. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online). 2019;17(4):137-143. https://hdl.handle.net/21.15107/rcub_jakov_1527 .
Čisar, Petar, Maravić Čisar, Sanja, "Security Aspects of 5G Mobile Networks" in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online), 17, no. 4 (2019):137-143, https://hdl.handle.net/21.15107/rcub_jakov_1527 .