5g Scenarios and Security Design
5g Scenarios and Security Design
November 2016
5G 5G Scenarios and Security Design
4
5G Scenarios and Security Design 5G
Contents
Foreword
1 Overview 1
5G Security Requirements and Challenges
5G Security Design
uRLLC Needs Lower Latency in Access Authentication, Transmission Protection, and Security Context
Handover
5
5G 5G Scenarios and Security Design
Foreword
5G networks bring many novel technologies and advances for mobile
communication operators. Therefore operators are able to offer a platform
for new and better services that have not been seen in the earlier
generations. Number of mobile nodes would increase rapidly because
of developments such as Internet of Things, industrial internet and self-
driving cars. Parallel to this extension of mobile networks to new directions,
traditional users of mobile devices would enjoy from improved feature sets,
including better-quality video calls, augmented reality etc.
The whole 5G service palette is so wide that it is not possible to secure all
of it with one-size-fits-all security solutions. Instead, flexibility is needed
also in the security domain but in such manner that all services are still
adequately protected while extra protection can be added for services that
require higher security. This whitepaper shows how creative solutions can
be found in all major service domains. However, further research is still
needed to explore how all these solutions form a coherent 5G security
architecture.
5G Scenarios and Security Design 5G
Overview
5G Security Requirements and Challenges
5G Is Expected to Meet Diverse Needs in eMBB, uRLLC, and mMTC
Scenarios
5G is the next generation of mobile networks and seen as the enabler of the future digital world. 5G is neither a single piece of wireless
access technology nor simply a combination of new wireless access technologies. Rather, 5G is a truly converged network and offers
seamless support for a variety of new network deployments.
In order for a single physical network to meet numerous service requirements, the same underlying physical infrastructure is virtualized
into different network topologies and functions. This means that each service type has its own network functions and these network
functions form a separate network slice. All network slices physically originate from the same network infrastructure, greatly reducing an
operator's investment in multi-service networks. Meanwhile, network slices are logically isolated and independent of each other, enabling
different service types to be separately operated and maintained.
LTE RAN-RT
RAN-NRT
5G Cache
eMBB slice Wi-Fi AC CP UP
LTE RAN-RT
5G
RAN-NRT
IoT server CP UP
mMTC slice Wi-Fi
RAN Mobile cloud engine
mMTC: massive Machine Type Communications uRLLC: ultra-Reliable and Low-Latency Communications
1
5G 5G Scenarios and Security Design
Heterogeneous access is one of the distinct technical features of next-generation access networks. Coordination between concurrent
access from different network systems(5G, LTE, Wi-Fi), access technologies, and site types (macro, small, and micro cells) is an
everyday phenomenon. Security management is expected to offer flexibility for all access technologies.
Vertical industries use a huge variety of Internet of Things (IoT) devices. Compared with traditional devices, IoT devices are larger in
number and a large number of IoT devices have burst access behavior. A more efficient method of access authentication should be
tailored for IoT devices. Meanwhile how to deal with mass IoT devices applying (D) DoS attacks to the network is an important issue.
Comparing to a single UE, (D) DoS attacks are more damaging when massive IoT devices attacks a single network node.
By opening up their security capabilities, operators can develop 5G security technologies and expand their business, unleashing security
capabilities as a major potential catalyst for industry applications.
2
5G Scenarios and Security Design 5G
5G Security Design
Common essential security capabilities should be built into 5G systems. This ensures that a unified security management mechanism
can be established across different access technologies and cloud network architectures to provide differentiated security features,
policies, and solutions to specific scenarios.
Unified Authentication
Unified Authentication of Heterogeneous Access
Efficient coordination between concurrent access from different network systems, access technologies, and site types is a must for
5G networks. It would be beneficial to build a common authentication mechanism, one that could manage access security of complex
access networks in a unified manner.
3
5G 5G Scenarios and Security Design
eMBB refers specifically to bandwidth-intensive services, such as high-definition video, virtual/augmented reality (VR/AR). The
emergence of eMBB enables digital life.
mMTC is suitable in scenarios with dense connectivity, such as smart transportation, smart grid, and smart manufacturing. With the help
of mMTC, a digital society is taking shape.
uRLLC is a collection of ultra latency-sensitive services, such as automatic/assisted driving and remote control. The advent of uRLLC
paints a bright future for the digital industry.
The following chapters explain how 5G security design can address the security requirements of these service types.
4
5G Scenarios and Security Design 5G
5
5G 5G Scenarios and Security Design
6
5G Scenarios and Security Design 5G
Service-based security
policy negotiation
AN CN
7
5G 5G Scenarios and Security Design
Security policy
Internet
controller UP-GW Service provider
UP-GW
Shared
5G base station security
context
Trusted Wi-Fi
Authentication server
User subscriber data
8
5G Scenarios and Security Design 5G
Security Context Sharing During the Handover Between Different Access Technologies
In the unified EAP authentication mechanism, different access technologies share the security context that is used for authentication.
For example, when a device needs to switch to a different access technology, it can directly use the existing security context for fast
authentication, without needing to acquire new authentication data from the user subscriber databases. In this way, access latency is
reduced.
As services are increasingly converged, it is natural that 5G operators open the security capabilities based on (U)SIM and enhance
service authentication security by introducing more authentication dimensions.
Opening digital identity management and authentication capabilities to a huge variety of 5G services through application platform
interfaces (APIs) can be a win-win situation. On one hand, operators can introduce third-party services into their own platforms, thus
building an open ecosystem favorable to operators, enhancing user loyalty, and exploring new revenue streams. Meanwhile, third-party
service providers can leverage operators' digital identity management capabilities to expand their service footprint.
Once mutual trust has been established between service providers and operators, operators can associate digital identities with service
information, allowing devices and service servers to use operators' digital identity management and network authentication capabilities
through open APIs.
Third-party
service 1. Service auth request carrying Digital identity Service auth parameters
service auth parameters
Service Device
server
6. Auth result 3. Service auth Token
2. Service auth
parameters
4. Service authentication
9
5G 5G Scenarios and Security Design
A way to protect user IDs is to replace permanent IDs with random IDs, eliminating the situation in which permanent IDs have to be
transmitted over air interfaces. LTE base stations are present in 5G access networks. Therefore, the protection of international mobile
subscriber identities (IMSIs) needs to be compatible with LTE authentication signaling. Otherwise, attackers may exploit the LTE
signaling to initiate downgrade attacks. Encrypting user IDs by means of asymmetric cryptographic technique can prevent attackers from
tracing or intercepting user IDs via air interfaces.
Key security features explained above are not restricted to eMBB services. They are equally applicable to mMTC and uRLLC services.
In the following chapters we will discuss security issues that are specific to mMTC and uRLLC.
10
5G Scenarios and Security Design 5G
The large number of IoT devices could make network communication rather costly for vertical industries. 5G networks must provide
secure, reliable yet cost-efficient network access modes to a massive number of IoT devices.
11
5G 5G Scenarios and Security Design
A decentralized authentication mode could be a good choice for IoT because it can achieve:
In addition, it eliminates the risk of signaling storms and avoids authentication nodes from becoming a bottleneck in the authentication
process.
Comparing to centralized authentication mechanism, decentralized authentication mechanism disperses the risk of attack in the
network, by avoiding a single network node attack by massive number of IoT devices, therefore reduce the risk of (D)DoS attack to the
authentication node.
Some IoT devices will send service data as small data, either individually or in batches. To improve data transmission efficiency and
network resource utilization, asymmetric cryptographic technology can be used to simultaneously transmit small service data and
identity authentication messages.
12
5G Scenarios and Security Design 5G
The asymmetric key management system is based on decentralization— networks do not need to store device keys or have an always-
on-line central identity management node.
Operator Industries
Key management center
Industry 1
Key generation center Industry customer identity Identity management
management center server
NE identity management
center
Device Device
Industry 2
Identity management
server
Authentication Authentication Authentication
node node node
Device Device
Key distribution (offline) Authentication interaction (online)
13
5G 5G Scenarios and Security Design
IBC authentication could reduce message length and numbers of interaction in the authentication process. This means that security
capabilities can be efficiently provided to 5G mMTC services.
Messages are frequently broadcast within IoV networks. To filter out non-legitimate information between vehicles, all broadcast
messages carry identity information and need to be authenticated. IoV has limitation on the length of broadcast messages in order to
save scarce air-interface resources. If messages are long or authentication interactions are frequent, packet fragmentation will occur,
increasing message broadcast delay. To address this challenge, each vehicle-mounted device could have an IBC identity and related
key. Messages that will be broadcast to these devices are authenticated using the IBC identities. This eliminates the need to send
authentication credentials, reducing message length and delay.
V2X application
KMS server
IBC-Auth
Subscription
database eMBB
IoV scenario
Authentication
node
V2X
eV2I
Control
Function
5G Roadside
eMBB equipment V2X
access application
network
eV2I
Pedestrian IBC-Auth
eV
2I
IBC-Auth
V2X
application Vehicle Vehicle
eV2V eV2V eV2V
IBC-Auth IBC-Auth
V2X V2X
application application
14
5G Scenarios and Security Design 5G
uRLLC refers to ultra latency-sensitive services, including autonomous or assisted driving, AR, VR, Tactile internet, and industrial
control. If network latency is too high, the uRLLC service experience will be compromised and control errors are likely to occur.
The figure below shows services that will require latency smaller than 10 ms in the 5G era.
Delay
10 ms
1 ms
15
5G 5G Scenarios and Security Design
Ultra-low latency can be achieved by taking a series of actions at each phase of transmission. The actions include:
To achieve ultra-low E2E latency over 5G networks, the following security activities should be optimized: identity authentication, data
transmission protection, data encryption/decryption at network nodes, and security context transfer during handover of mobile devices.
RAN-RT
RAN-NRT
LTE
MCE CN
16
5G Scenarios and Security Design 5G
For example, use distributed authentication to relocate authentication servers from central nodes to a place close to authenticated
devices. In this way, the authentication chain becomes shorter and authentication messages are transmitted faster.
Methods to establish a more efficient authentication mechanism include reducing parameter quantity or message length and simplifying
authentication message processing and local computation.
A new security algorithm could be consider to reduce the additional overhead due to security protection, such as encryption, integrity
protection, and anti-replay. At the same time, data should be encrypted E2E (from devices to service data gateways). This can free
intermediate transmission nodes from repeatedly encrypting or decrypting data, which reduces unnecessary latency in data protection.
Measures to reduce latency in a mobile handover include unified authentication of heterogeneous access, efficient security context
derivation, and minimal security context transfer between network nodes.
17
5G 5G Scenarios and Security Design
Typically, to achieve ultra-low latency on 5G networks, the following enhancements should be made to the security protection
mechanism without degrading the protection level:
• Implement E2E encryption and decryption to reduce the latency from repeated encryption or decryption at intermediate nodes.
• Relocate authentication servers from central nodes to a location close to authenticated devices to reduce latency in authentication
message transmission.
• Adopt a new transmission protection protocol to reduce security payload due to encryption, integrity protection, and anti-replay.
• Establish an efficient mechanism for security context transfer and key re-creation during mobile handover.
18
5G Scenarios and Security Design 5G
5G eMBB services such as VR/AR and HD videoing are driving the rapid growth of 5G networks. 5G security design must
allow for differentiated services, heterogeneous access, and open environments. To support multi-service environments on
cloud 5G networks, security protection should change from the hop-by-hop protection of pipelines to the service-based E2E
protection. In a converged network that accommodates various network systems, access technologies, and site types, it
is beneficial to build a unified and open authentication framework across different access technologies and authentication
protocols. This would simplify security management and improve network efficiency. By opening-up identity management and
authentication capabilities, authentication security can be enhanced, 5G service ecosystem can be improved and operators
can attracts more industry customers.
As new 5G mMTC services are continuously emerging, such as smart transportation, smart grid, smart manufacturing,
the issue of how to provide on-demand ubiquitous connectivity to mMTC users efficiently at low cost has become a major
concern for operators. By deploying a decentralized identity management and authentication mechanism on 5G networks,
operators can slash identity management costs and improve authentication efficiency, building a more efficient security
solution for 5G mMTC.
5G uRLLC services such as automatic driving and Industry 4.0 are becoming a reality. To achieve E2E 5G ultra-low latency,
reducing security protocol interactions and security processing delay, without downgrading security protection strength, is
essential.
19
HUAWEI TECHNOLOGIES CO., LTD.
Bantian, Longgang District
Shenzhen518129, P. R. China
Tel:+86-755-28780808