Análise de mecanismos de autenticação de dispositivos em redes móveis 5G para Internet Industrial (IIoT) categorizada por mMTC, eMBB e URLLC
Resumo
As redes 5G possuem um aspecto inovador ao proporcionar pela primeira vez uma cobertura em larga escala para interconectar não apenas pessoas mas principalmente dispositivos em larga escala, densidade e área de cobertura. Cada geração de redes celulares sempre define pelo menos um método de autenticação, as redes 5G possuem três métodos de autenticação 5G: AKA, EAP-AKA e EAP-TLS. Este trabalho, apresenta uma análise inicial da arquitetura básica de segurança do 5G, os protocolos e mecanismos de autenticação e faz uma relação destes com o cenário de implantação em dispositivos da Internet Industrial, categorizando-os de acordo com os serviços de autenticação do 5G como Enhanced Mobile Broadband (eMBB), Ultra Reliable Low Latency Communications (uRLLC) e Massive Machine Type Communications (mMTC).
Referências
Behrad, S., Bertin, E., Tuffin, S., and Crespi, N. (2019). 5G-SSAAC: Slice-specific Authentication and Access Control in 5G. In Proceedings IEEE NetSoft 2019, pages 281–285. IEEE.
Brown, G. et al. (2018). Ultra-reliable low-latency 5g for industrial automation. Technol. Rep. Qualcomm, 2:52065394.
Cao, J., Ma, M., Li, H., Fu, Y., and Liu, X. (2018). EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. Journal of Network and Computer Applications, 102:1–16.
Chen, Z., Chen, S., Xu, H., and Hu, B. (2018). A security authentication scheme of 5G ultra-dense network based on block chain. IEEE Access, 6:55372–55379.
Fan, K., Gong, Y., Liang, C., Li, H., and Yang, Y. (2016). Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Security and Communication Networks, 9(16):3095–3104.
Ferrag, M. A., Maglaras, L., Argyriou, A., Kosmanos, D., and Janicke, H. (2018). Security for 4G and 5G cellular networks: A survey of existing authentication and privacypreserving schemes.
Flynn, K. (2018). 3gpp 5g security. 3gpp.org.
ITU-R (2017). Minimum requirements related to technical performance for IMT-2020 radio interface(s) M Series Mobile, radiodetermination, amateur and related satellite services.
Ivezic, M. (2020). Introduction to 5g core service-based architecture (sba) components. 5G Security 5G, mIoT, CPSSEC, Security blog by Marin Ivezic.
Jenuario, Tadeu, C. J. O. P. G. K. D. (2019). Verificação Automática de Protocolos de Segurança com a ferramenta Scyther. pages 172–177.
Ni, J., Lin, X., and Shen, X. S. (2018). Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT. IEEE Journal on Selected Areas in Communications, 36(3):644–657.
Prasad, A. R., Arumugam, S., B, S., and Zugenmaier, A. (2018). 3gpp 5g security. Journal of ICT Standardization, 6(1):137–158.
Qiu, Q., Liu, S., Xu, S., and Yu, S. (2020). Study on Security and Privacy in 5G-Enabled Applications. Wireless Communications and Mobile Computing, 2020.
Seok, B., Sicato, J. C. S., Erzhena, T., Xuan, C., Pan, Y., and Park, J. H. (2020). Secure D2D communication for 5G IoT network based on lightweight cryptography. Applied Sciences (Switzerland), 10(1).
Simon, D., Hurst, R., and Aboba, D. B. D. (2008). The EAP-TLS Authentication Protocol. RFC 5216.
TSGR (2017). TR 138 912 V14.0.0 5G; Study on New Radio (NR) access technology (3GPP TR 38.912 version 14.0.0 Release 14).
TSGS (2019). TS 133 501 V15.5.0 5G; Security architecture and procedures for 5G System (3GPP TS 33.501 version 15.5.0 Release 15). Technical report.
Weinand, A., Sattiraju, R., Karrenbauer, M., and Schotten, H. D. (2019). Supervised learning for physical layer based message authentication in URLLC scenarios. In IEEE Vehicular Technology Conference, volume 2019-September. IEEE.