Authentication mechanisms in the 5G system

6Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms.

Cite

CITATION STYLE

APA

Huang, X., Yoshizawa, T., & Baskaran, S. B. M. (2021). Authentication mechanisms in the 5G system. Journal of ICT Standardization, 9(2), 61–78. https://doi.org/10.13052/jicts2245-800X.921

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free