2020
DOI: 10.3390/app10020727
|View full text |Cite
|
Sign up to set email alerts
|

Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network

Abstract: The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices. This architecture uses the secondary authentication for mutual authentication between the User Equipment (UE) and the Data Network (DN) to authenticate devices and services. However, this authentication mechanism can cause a signaling storm in the Non-Access Stratum (NAS) becaus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Primarily, the secondary authentication operates by SAF process. The SAF gets requests from the user, processes the request, and interacts with ADMF to increase the audibility of communique environment [39].…”
Section: B Access Control Systemsmentioning
confidence: 99%
“…Primarily, the secondary authentication operates by SAF process. The SAF gets requests from the user, processes the request, and interacts with ADMF to increase the audibility of communique environment [39].…”
Section: B Access Control Systemsmentioning
confidence: 99%
“…In 5 delay-sensitive G applications, the impact of delay can be more extreme [13]. In terms of defense, a user identity disclosure attack is when users send their International Mobile Subscriber Identities (IMSIs) to HSS in plain text without encryption [14][15][16].…”
Section: Introductionmentioning
confidence: 99%