没有合适的资源?快使用搜索试试~ 我知道了~
A Comparative Introduction of 4G and 5G Authentication.pdf
需积分: 0 1 下载量 187 浏览量
2020-03-13
11:50:54
上传
评论
收藏 827KB PDF 举报
温馨提示
试读
19页
A Comparative Introduction of 4G and 5G Authentication
资源推荐
资源详情
资源评论
WINTER 2019
A Comparative
Introduction to 4G and
5G Authentication
cablelabs.com info@cablelabs.com
About
CableLabs
As the leading Innovation and R&D lab for the cable industry, CableLabs creates
global impact through its 60+ cable-network-operator members located in the United
States, Canada, Mexico, Central America, South America, Europe, Asia, and Australia,
representing approximately 180 million subscribers and roughly 500 million individuals.
CableLabs’ innovation and R&D eorts are focused in the areas of wireless network
technologies, including in both licensed and unlicensed spectrum; wired network
technologies, including both ber and coaxial cable technologies; cybersecurity; and
articial intelligence. With a state-of-the art research and innovation facility and a
collaborative ecosystem of partners including academia, government, and thousands of
vendors, CableLabs delivers impactful network technologies for the entire industry.
Inform[ED] Insights
CableLabs created the Inform[ED] Insights series to address major technology
developments that have the potential to transform the cable business and society at
large.
The cable industry connects and entertains people across the globe, contributing
signicantly to economic growth and enabling rich discourse in its countries of operation.
Inform[ED] Insights provides leaders across sectors and disciplines with communications
technology facts and insights on which to base major decisions.
For more information, please visit https://www.cablelabs.com/informed-insights/.
cablelabs.com info@cablelabs.com
Executive Summary
Authentication and key management are
fundamental to the security of cellular networks
because they provide mutual authentication
between users and the network and derive
cryptographic keys to protect both signaling and
user plane data.
Each generation of cellular networks always denes at least one authentication method.
For example, 4G denes 4G EPS-AKA, and 5G denes three authentication methods—
5G-AKA, EAP-AKA’, and EAP-TLS.
Because additional authentication methods are dened in 5G, wireless practitioners
oen ask what motivates the adoption of these new authentication methods in 5G and
how they dier from 4G authentication. This paper attempts to answer those questions
by providing a comparative study of 4G and 5G authentication. The analysis shows that
5G authentication improves upon 4G authentication through a number of features,
including a unied authentication framework that can support more user cases, better
user equipment identity protection, enhanced home-network control, and more key
separation in key derivation, among others. The paper also discusses the weaknesses of
5G authentication and its need to continuously evolve.
cablelabs.com info@cablelabs.com
Contents
1. Introduction..........................................................................................................................1
2. 4G Authentication.................................................................................................................2
a. 4G EPS-AKA.........................................................................................................2
3. 5G Authentication.................................................................................................................4
a. 5G Authentication Framework............................................................................5
b. 5G-AKA.................................................................................................................6
c. EAP-AKA’...............................................................................................................8
d. EAP-TLS................................................................................................................9
4. Comparison.........................................................................................................................10
5. Conclusions.........................................................................................................................12
6. Endnotes.............................................................................................................................13
7. Abbreviations......................................................................................................................14
剩余18页未读,继续阅读
资源评论
titianchen
- 粉丝: 4
- 资源: 24
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功