Security among UPFs belonging to Different 5G/B5G/6G Networks

被引:0
|
作者
Hsiao, Liang-Sheng [1 ]
Tsai, Kun-Lin [2 ]
Liu, Jung-Chun [1 ]
Leu, Fang-Yie [1 ]
Lu, Yu-Syuan [3 ]
Lin, I-Long [1 ]
机构
[1] Tatung Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Tunghai Univ, Elect Engn Dept, Taichung 40704, Taiwan
[3] Tunghai Univ, Comp Sci Dept, Taichung 40704, Taiwan
关键词
5G/B5G/6G; Edge Computer; Symmetric/Asymmetric Cryptography; n-party Cryptography; Initial Key Agreement;
D O I
10.1007/s10796-024-10510-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, 5G/B5G/6G networks (5G for short) have been gloriously developed to give us colorful lives and make our daily activities more convenient than before. On the other hand, online meetings, like video conferences and online educations, have been popularly held everywhere in the world. Nevertheless, in such a meeting on 5G networks, a packet P transmitted from a User Plane Function (UPF), e.g., UPF1 of a 5G, e.g., 5G(1), to P's destinations, e.g., the set {UPF2, UPF3, . . .UPFn}, respectively, in {5G(2), 5G(3), . . .5G(n)}, is not secure, even not encrypted, particularly when P goes through the Internet. Hackers may duplicate P, i.e., data leakage on the connections among these UPFs. The situation needs to be avoided when data of the meetings ought not to be leaked, e.g., for an important military conference. Therefore, in this study, we propose a security architecture, named Group Key using IKA (GKIKA), which encrypts/decrypt packets before sending them, e.g., EC1 in 5G(1) encrypts P and then sends P's ciphertext which will be decrypted by edge computers {EC2, EC3, . . .ECn} where ECj is in 5G(j), 2 <= j <= n. Our security scenarios include data transmission among n-parties, n >= 2. When n = 2, symmetric or asymmetric cryptography is adopted depending on the security level and time constraints required. As n > 2, the Initial Key Agreement (IKA) is utilized to establish a secret key for all participating ECs. Other security mechanisms, like message authentication code and time stamp, are also utilized to enhance the security level of data transmission. Our analyses show that the GKIKA can effectively avoid some types of attacks.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Implementation of Switch Slicing in 5G/B5G/6G Networks
    Peng, Li-Wen
    Leu, Fang-Yie
    Susanto, Heru
    [J]. INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS 2024, 2024, 214 : 369 - 378
  • [2] Drones in B5G/6G Networks as Flying Base Stations
    Amponis, Georgios
    Lagkas, Thomas
    Zevgara, Maria
    Katsikas, Georgios
    Xirofotos, Thanos
    Moscholios, Ioannis
    Sarigiannidis, Panagiotis
    [J]. DRONES, 2022, 6 (02)
  • [3] ML KPI Prediction in 5G and B5G Networks
    Nguyen Phuc Tran
    Delgado, Oscar
    Jaumard, Brigitte
    Bishay, Fadi
    [J]. 2023 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT, EUCNC/6G SUMMIT, 2023, : 502 - 507
  • [4] Intelligent Trust Ranking Security Preserving Model for B5G/6G
    Shafi, Misbah
    Jha, Rakesh Kumar
    Jain, Sanjeev
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3549 - 3561
  • [5] Placement of Logical Functionalities in 5G/B5G Networks
    Ziazet, Junior Momo
    Jaumard, Brigitte
    Larabi, Adel
    Huin, Nicolas
    [J]. 2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [6] Intelligence Driven Wireless Networks in B5G and 6G Era:A Survey
    GAO Yin
    CHEN Jiajun
    LI Dapeng
    [J]. ZTE Communications., 2024, 22 (03) - 105
  • [7] A survey of VNF forwarding graph embedding in B5G/6G networks
    Zhang, Biao
    Fan, Qilin
    Zhang, Xu
    Fu, Zhihan
    Wang, Sen
    Li, Jian
    Xiong, Qingyu
    [J]. WIRELESS NETWORKS, 2024, 30 (05) : 3735 - 3758
  • [8] Revisiting Rural and Remote Connectivity Challenges in B5G and 6G Networks
    Unhelkar, Bhuvan
    Chakravarty, Sumit
    Acharya, Tamaghna
    [J]. IT PROFESSIONAL, 2024, 26 (04) : 14 - 16
  • [9] Framework for Trustworthy AI/ML in B5G/6G
    Barmpounakis, Sokratis
    Demestichas, Panagiotis
    [J]. 2022 1ST INTERNATIONAL CONFERENCE ON 6G NETWORKING (6GNET), 2022,
  • [10] Evolution of optical wireless communication for B5G/6G
    Wei, Zixian
    Wang, Zhaoming
    Zhang, Jianan
    Li, Qian
    Zhang, Junping
    Fu, H. Y.
    [J]. PROGRESS IN QUANTUM ELECTRONICS, 2022, 83