logo

SCIENTIA SINICA Informationis, Volume 51 , Issue 3 : 347(2021) https://doi.org/10.1360/SSI-2020-0225

Survey on research and standardization of 5G security technology

More info
  • ReceivedJul 23, 2020
  • AcceptedSep 21, 2020
  • PublishedFeb 24, 2021

Abstract


Funded by

电子科技大学通信抗干扰技术国家级重点实验室稳定支持科研项目(IFN2020207)

四川省重点研发项目(2020YFG0315)


References

[1] System architecture for the 5G System (5GS). Technical Specification, TS 23.501 v16.3.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[2] Shafi M, Molisch A F, Smith P J. 5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice. IEEE J Sel Areas Commun, 2017, 35: 1201-1221 CrossRef Google Scholar

[3] Qualcom. The role of 5G in private networks for industrial IoT. https://www.qualcomm.com/documents/role-5g-private-networks-industrial-iot. Google Scholar

[4] Huawei. What is China doing to accelerate 5G transport network deployment? https://www.huawei.com/en/about-huawei/publications/winwin-magazine/32-extra/china-accelerate-5g-transport-network-deployment. Google Scholar

[5] Ji X, Huang K, Jin L. Overview of 5G security technology. Sci China Inf Sci, 2018, 61: 081301 CrossRef Google Scholar

[6] Markov I L, Fatima A, Isakov S V, et al. Quantum supremacy is both closer and farther than it appears. 2018,. arXiv Google Scholar

[7] Prasad A R, Arumugam S, B S. 3GPP 5G Security. JICTS, 2018, 6: 137-158 CrossRef Google Scholar

[8] Fang D, Qian Y, Hu R Q. Security for 5G Mobile Wireless Networks. IEEE Access, 2018, 6: 4850-4874 CrossRef Google Scholar

[9] Ahmad I, Kumar T, Liyanage M. Overview of 5G Security Challenges and Solutions. IEEE Comm Stand Mag, 2018, 2: 36-43 CrossRef Google Scholar

[10] Cao J, Ma M, Li H. A Survey on Security Aspects for 3GPP 5G Networks. IEEE Commun Surv Tutorials, 2020, 22: 170-195 CrossRef Google Scholar

[11] Khan R, Kumar P, Jayakody D N K. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Commun Surv Tutorials, 2020, 22: 196-248 CrossRef Google Scholar

[12] Security architecture and procedures for 5G System. Technical Specification, TS 33.501 v15.4.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[13] Chao C, Lee W, Wang C, et al. A flexible anti-jamming channel hopping for cognitive radio networks. In: Proceedings of International Symposium on Computing & Networking, 2018. 549--551. Google Scholar

[14] Xiao L, Li Y, Dai C. Reinforcement Learning-Based NOMA Power Allocation in the Presence of Smart Jamming. IEEE Trans Veh Technol, 2018, 67: 3377-3389 CrossRef Google Scholar

[15] Peng T, Leckie C, Ramamohanarao K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput Surv, 2007, 39: 3 CrossRef Google Scholar

[16] Marco L, Louis M. ENISA threat landscape for 5G Networks. European Union Agency for Cybersecurity. 2019. Google Scholar

[17] Conti M, Dragoni N, Lesyk V. A Survey of Man In The Middle Attacks. IEEE Commun Surv Tutorials, 2016, 18: 2027-2051 CrossRef Google Scholar

[18] Steig S, Aarnes A, van Do T, et al. A network based IMSI catcher detection. In: Proceedings of International Conference on It Convergence and Security, 2016. Google Scholar

[19] Huang Y, Jin L, Wei H Q, et al. Pilot contamination with MITM attack. In: Proceedings of the 85th Vehicular Technology Conference, 2017. Google Scholar

[20] system architecture evolution (SAE). Technical Specification, TS 33.401 v15.10.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[21] Huawei. 5G Security: Forward Thinking: Huawei White Paper. 2015. Google Scholar

[22] Shubham G, Balu L P, Narendra S C. Security vulnerabilities in handover authentication mechanism of 5G network. In: Proceedings of International Conference on Secure Cyber Computing and Communication. 2018. 369--374. Google Scholar

[23] Basin D, Dreier J, Hirschi L, et al. A formal analysis of 5G authentication. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, 2018. 1383--1396. Google Scholar

[24] Study on authentication enhancements in the 5G System (5GS). Technical Report, TR 33.846 v0.3.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[25] Arute F, Arya K, Babbush R. Quantum supremacy using a programmable superconducting processor. Nature, 2019, 574: 505-510 CrossRef ADS arXiv Google Scholar

[26] Roetteler M, Naehrig M, Svore K M, et al. Quantum resource estimates for computing elliptic curve discrete logarithms. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2017. 241--270. Google Scholar

[27] Study on the support of 256-bit algorithms for 5G. Technical Report, TR 33.841 v16.1.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[28] Alrashede H, Shaikh R. IMSI catcher detection method for cellular networks. In: Proceedings of International Conference on Computer Applications and Information Security, 2019. Google Scholar

[29] Wu Y, Schober R, Ng D W K. Secure Massive MIMO Transmission With an Active Eavesdropper. IEEE Trans Inform Theor, 2016, 62: 3880-3900 CrossRef Google Scholar

[30] Zhou X, Maham B, Hjorungnes A. Pilot Contamination for Active Eavesdropping. IEEE Trans Wireless Commun, 2012, 11: 903-907 CrossRef Google Scholar

[31] Mukherjee A, Swindlehurst A L. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper. IEEE Trans Signal Process, 2013, 61: 82-91 CrossRef ADS arXiv Google Scholar

[32] Lei Xu , Chunxiao Jiang , Jian Wang . Information Security in Big Data: Privacy and Data Mining. IEEE Access, 2014, 2: 1149-1176 CrossRef Google Scholar

[33] Wang D, Bai B, Zhao W. A Survey of Optimization Approaches for Wireless Physical Layer Security. IEEE Commun Surv Tutorials, 2019, 21: 1878-1911 CrossRef Google Scholar

[34] Wu Y, Khisti A, Xiao C. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J Sel Areas Commun, 2018, 36: 679-695 CrossRef Google Scholar

[35] Physical layer procedures for data, Technical Specification, TS 38.214 v16.0.0. Technical Specification Group Services and System Aspects. 2020. Google Scholar

[36] Hong Y W P, Lan P C, Kuo C C J. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches. IEEE Signal Process Mag, 2013, 30: 29-40 CrossRef ADS Google Scholar

[37] Mukherjee A, Swindlehurst A L. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI. IEEE Trans Signal Process, 2011, 59: 351-361 CrossRef ADS arXiv Google Scholar

[38] Wang H M, Luo M, Yin Q. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks. IEEE TransInformForensic Secur, 2013, 8: 2007-2020 CrossRef Google Scholar

[39] Zhang W, Chen J, Kuo Y. Artificial-Noise-Aided Optimal Beamforming in Layered Physical Layer Security. IEEE Commun Lett, 2019, 23: 72-75 CrossRef Google Scholar

[40] Leung-Yan-Cheong S, Hellman M. The Gaussian wire-tap channel. IEEE Trans Inform Theor, 1978, 24: 451-456 CrossRef Google Scholar

[41] Zhang H, Huang Y, Li S. Energy-Efficient Precoder Design for MIMO Wiretap Channels. IEEE Commun Lett, 2014, 18: 1559-1562 CrossRef Google Scholar

[42] Zhu J, Schober R, Bhargava V K. Secure Transmission in Multicell Massive MIMO Systems. IEEE Trans Wireless Commun, 2014, 13: 4766-4781 CrossRef Google Scholar

[43] Liu R, Poor H V. Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages. IEEE Trans Inform Theor, 2009, 55: 1235-1249 CrossRef Google Scholar

[44] Fakoorian S A, Swindlehurst A L. Optimal power allocation for GSVD-based beamforming in the MIMO gaussian wiretap channel. In: Proceedings of International Symposium on Information Theory, 2012. 2321--2325. Google Scholar

[45] Geraci G, Egan M, Yuan J. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding. IEEE Trans Commun, 2012, 60: 3472-3482 CrossRef Google Scholar

[46] Zheng G, Krikidis I, Li J. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers. IEEE Trans Signal Process, 2013, 61: 4962-4974 CrossRef ADS arXiv Google Scholar

[47] Lee J H. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems. IEEE Commun Lett, 2015, 19: 525-528 CrossRef Google Scholar

[48] Ebrahimi N, Yektakhah B, Sarabandi K, et al. A novel physical layer security technique using master-slave full duplex communication. In: Proceedings of IEEE MTT-S International Microwave Symposium, 2019. 1096--1099. Google Scholar

[49] Yan S, Zhou X, Yang N. Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver. IEEE TransInformForensic Secur, 2018, 13: 2788-2800 CrossRef Google Scholar

[50] Gwon Y, Dastangoo S, Fossa C, et al. Competing mobile network game: embracing antijamming and jamming strategies with reinforcement learning. In: Proceedings of Communications and Networking Symposium, 2013. 28--36. Google Scholar

[51] Erpek T, Sagduyu Y E, Shi Y. Deep Learning for Launching and Mitigating Wireless Jamming Attacks. IEEE Trans Cogn Commun Netw, 2019, 5: 2-14 CrossRef Google Scholar

[52] Yao F, Jia L. A Collaborative Multi-Agent Reinforcement Learning Anti-Jamming Algorithm in Wireless Networks. IEEE Wireless Commun Lett, 2019, 8: 1024-1027 CrossRef Google Scholar

[53] Rappaport T S, Shu Sun T S, Mayzus R. Millimeter Wave Mobile Communications for 5G Cellular: It Will Work. IEEE Access, 2013, 1: 335-349 CrossRef Google Scholar

[54] Wang C, Wang H M. Physical Layer Security in Millimeter Wave Cellular Networks. IEEE Trans Wireless Commun, 2016, 15: 5569-5585 CrossRef Google Scholar

[55] Zhu Y, Wang L, Wong K K. Secure Communications in Millimeter Wave Ad Hoc Networks. IEEE Trans Wireless Commun, 2017, 16: 3205-3217 CrossRef Google Scholar

[56] Vuppala S, Tolossa Y J, Kaddoum G. On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks. IEEE Trans Commun, 2018, 66: 1139-1152 CrossRef Google Scholar

[57] Jr R W H, González-Prelcic N, Rangan S, et al. An overview of signal processing techniques for millimeter wave MIMO systems. IEEE J Sel Top Signal Process, 2015, 10: 436--453. Google Scholar

[58] Kapetanovic D, Zheng G, Rusek F. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Commun Mag, 2015, 53: 21-27 CrossRef Google Scholar

[59] Yang T, Zhang R, Cheng X. Secure Massive MIMO Under Imperfect CSI: Performance Analysis and Channel Prediction. IEEE TransInformForensic Secur, 2019, 14: 1610-1623 CrossRef Google Scholar

[60] Chen J, Chen X, Gerstacker W H. Resource Allocation for a Massive MIMO Relay Aided Secure Communication. IEEE TransInformForensic Secur, 2016, 11: 1700-1711 CrossRef Google Scholar

[61] Sheikhi M, Razavizadeh S M. Security vulnerability of FDD massive MIMO systems in downlink training phase. In: Proceedings of International Symposium on Telecommunications, 2018. 492--496. Google Scholar

[62] Wu Y, Wen C K, Chen W. Data-Aided Secure Massive MIMO Transmission Under the Pilot Contamination Attack. IEEE Trans Commun, 2019, 67: 4765-4781 CrossRef Google Scholar

[63] Study on security aspects of network slicing enhancement, Technical Report, TR 33.813 v0.6.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[64] Scott-Hayward S, O'Callaghan G, Sezer S. SDN security: a survey. In: Proceedings of IEEE SDN for Future Networks and Services, 2013. Google Scholar

[65] Lal S, Taleb T, Dutta A. NFV: Security Threats and Best Practices. IEEE Commun Mag, 2017, 55: 211-217 CrossRef Google Scholar

[66] Liyanage M, Salo J, Braeken A, et al. 5G privacy: scenarios and solutions. In: Proceedings of IEEE 5G World Forum, 2018. 197--203. Google Scholar

[67] Study on long term key update procedures (LTKUP), Technical Report, TR 33.834 v16.1.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[68] Dabbagh M, Hamdaoui B, Guizani M. Software-defined networking security: pros and cons. IEEE Commun Mag, 2015, 53: 73-79 CrossRef Google Scholar

[69] Hawilo H, Shami A, Mirahmadi M. NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC). IEEE Network, 2014, 28: 18-26 CrossRef Google Scholar

[70] Chen S Z. Analysis and suggestion of future 5G directions. Telecommun Sci, 2016, 32: 1--10. Google Scholar

[71] Zhang K, Qiu X F. CMD: a convincing mechanism for MITM detection in SDN. In: Proceedings of International Conference on Consumer Electronics, 2018. Google Scholar

[72] Tselios C, Politis I, Kotsopoulos S. Enhancing SDN security for IoT-related deployments through blockchain. In: Proceedings of IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017. 303--308. Google Scholar

[73] Siddiqui M S, Escalona E, Trouva E, et al. Policy based virtualised security architecture for SDN/NFV enabled 5G access networks. In: Proceedings of IEEE Conference on Network Function Virtualization and Software Defined Networks, 2016. 44--49. Google Scholar

[74] Security assurance methodology (SECAM) and security assurance specification (SCAS) for 3GPP virtualized network products, Technical Report, TR 33.818 v0.4.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[75] Study on security impacts of virtualisation, Technical Report, TR 33.848 v0.3.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[76] Niu B, You W, Tang H B, et al. 5G network slice security trust degree calculation model. In: Proceedings of IEEE International Conference on Computer and Communications, 2017. 1150--1157. Google Scholar

[77] Sattar D, Matrawy A. Towards secure slicing: using slice isolation to mitigate DDoS attacks on 5G core network slices. In: Proceedings of Communications and Networking Symposium, 2019. 82--90. Google Scholar

[78] Li P, Xu C, Xu H, et al. Research on data privacy protection algorithm with homomorphism mechanism based on redundant slice technology in wireless sensor networks. China Commun, 2019, 16: 158--170. Google Scholar

[79] Liu H L. Research on privacy protection framework design and key technologies in large data environment. In: Proceedings of International Conference on Robots and Intelligent System, 2019. 327--330. Google Scholar

[80] Yin C, Xi J, Sun R. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things. IEEE Trans Ind Inf, 2018, 14: 3628-3636 CrossRef Google Scholar

[81] Shokri R, Theodorakopoulos G, Boudec J L, et al. Quantifying location privacy. In: Proceedings of IEEE Symposium on Security and Privacy, 2011. 247--262. Google Scholar

[82] Zheng J Y, Tan X B, Zou C, et al. A cloaking-based approach to protect location privacy in location-based services. In: Proceedings of Conference on Computational Complexity, 2014. 5459--5464. Google Scholar

[83] Study on the security of the enhancement to the 5G Core (5GC) location services, Technical Report, TR 33.814 v16.0.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[84] Suguna M, Anusia R, Shalinie S M, et al. Secure identity management in mobile cloud computing. In: Proceedings of International Conference on Nextgen Electronic Technologies: Silicon to Software, 2017. 42--45. Google Scholar

[85] Norrman K, Dubrova E. Protecting IMSI and user privacy in 5G Networks. In: Proceedings of International Conference on Mobile Multimedia Communications, 2016. 159--166. Google Scholar

[86] Study on 5G security enhancements against false base stations, Technical Report, TR 33.809 v0.6.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[87] Fang H, Wang X, Tomasin S. Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks. IEEE Wireless Commun, 2019, 26: 55-61 CrossRef Google Scholar

[88] Adem N, Hamdaoui B, Yavuz A. Pseudorandom time-hopping anti-jamming technique for mobile cognitive users. In: Proceedings of IEEE Globecom Workshops, 2015. Google Scholar

[89] Haus M, Waqas M, Ding A Y. Security and Privacy in Device-to-Device (D2D) Communication: A Review. IEEE Commun Surv Tutorials, 2017, 19: 1054-1079 CrossRef Google Scholar

[90] Li Q, Ren P, Xu D. Security Enhancement and QoS Provisioning for NOMA-Based Cooperative D2D Networks. IEEE Access, 2019, 7: 129387 CrossRef Google Scholar

[91] Wang W, Teh K C, Li K H. Enhanced Physical Layer Security in D2D Spectrum Sharing Networks. IEEE Wireless Commun Lett, 2016, : 1-1 CrossRef Google Scholar

[92] Yang Y, Wei Z, Zhang Y. V2X security: A case study of anonymous authentication. Pervasive Mobile Computing, 2017, 41: 259-269 CrossRef Google Scholar

[93] Study on security aspects of 3GPP support for advanced V2X services, Technical Report, TR 33.836 v0.3.0. Technical Specification Group Services and System Aspects. 2020. Google Scholar

[94] Suo H, Wan J F, Zou C F, et al. Security in the internet of things: a review. In: Proceedings of International Conference on Computer Science and Electronics Engineering, 2012. 648--651. Google Scholar

[95] Fan K, Gong Y Y, Du Z, et al. RFID secure application revocation for IoT in 5G. In: Proceedings of IEEE Trustcom/BigDataSE/ISPA, 2015. 175--181. Google Scholar

[96] Xu Q, Ren P, Song H. Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations. IEEE Access, 2016, 4: 2840-2853 CrossRef Google Scholar

[97] Hachinyan O, Khorina A, Zapechnikov S. A game-theoretic technique for securing IoT devices against Mirai botnet. In: Proceedings of IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, 2018. 1500--1503. Google Scholar

[98] Battery efficient security for very low throughput machine type communication (MTC) devices (BEST), Technical Specification, TS 33.163 v16.2.0. Technical Specification Group Services and System Aspects. 2019. Google Scholar

[99] Study on evolution of cellular IoT security for the 5G system, Technical Report, TR 33.861 v1.6.0. Technical Specification Group Services and System Aspects. 2020. Google Scholar

[100] You X, Zhang C, Tan X. AI for 5G: research directions and paradigms. Sci China Inf Sci, 2019, 62: 21301 CrossRef Google Scholar

[101] Niknam S, Dhillon H S, Reed J H. Federated Learning for Wireless Communications: Motivation, Opportunities, and Challenges. IEEE Commun Mag, 2020, 58: 46-51 CrossRef Google Scholar

[102] Wu H Q. New features of network society and industry challenges in the 5G era. J Chongqing Univ Posts Telecom (Nat Sci Ed), 2020, 32: 171--176. Google Scholar

[103] Eidle D, Ni S Y, Decusatis C, et al. Autonomic security for zero trust networks. In: Proceedings of IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, 2017. 288--293. Google Scholar

[104] Lee J, Kim J, Seo J. Cyber attack scenarios on smart city and their ripple effects. In: Proceedings of International Conference on Platform Technology and Service (PlatCon), 2019. Google Scholar

[105] Chen H L, Hu M, Yan H, et al. Research on industrial internet of things security architecture and protection strategy. In: Proceedings of International Conference on Virtual Reality, 2019. 365--368. Google Scholar

[106] Mora O B, Rivera R, Larios V M, et al. A use case in cybersecurity based in blockchain to deal with the security and privacy of citizens and smart cities cyberinfrastructures. In: Proceedings of IEEE International Smart Cities Conference, 2018. Google Scholar

[107] Li B, Fei Z, Zhou C. Physical-Layer Security in Space Information Networks: A Survey. IEEE Internet Things J, 2020, 7: 33-52 CrossRef Google Scholar

[108] Yan S, Wang X Y, Li Z L, et al. Cooperative jamming for physical layer security in hybrid satellite terrestrial relay networks. China Commun, 2019, 16: 154--164. Google Scholar

  • Figure 1

    (Color online) 5G security architecture overview

  • Figure 2

    5G trust model

  • Figure 3

    5G primary authentication procedure

  • Table 1   5G security enhancements over LTE
    Security aspects 5GLTE
    Trust model
    Composed of AMF, SEAF, AUSF, UMD, and ARPF.
    Composed of MME, HSS, and AuC.
    Authentication
    Using SUCI and SUPI for authentication, EAP-
    AKA and 5G AKA are necessary authentication
    methods. Secondary authentication can be
    carried out if the external data network required.
    Using IMSI and TMSI for
    authentication, the authentication
    method is EPS AKA and does not
    support secondary authentication.
    Security context
    Additional security context management in the case
    of multiple registrations.
    Does not support multiple
    registration security contexts.
    Security between
    PLMNs
    Ensure security between PLMNs through SEPP
    and N32 interface.
    No SEPP.
    Mobility
    With more flexible mobility management,
    operators can decide whether to perform Xn or
    N2 handover for a specific gNB according to the
    security features of a specific gNB. Xn handover
    is only switched through the Xn interface
    without involving AMF.
    Mobility management must be
    done through AMF.
    User plane security
    Additional optional integrity and confidentiality
    protection.
    No integrity and confidentiality
    protection.