Next Article in Journal
Analysis of 5G Channel Access for Collaboration with TSN Concluding at a 5G Scheduling Mechanism
Previous Article in Journal
Phase Shift Design in RIS Empowered Wireless Networks: From Optimization to AI-Based Methods
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Introduction of a Modular Framework for Securing 5G Networks and Beyond

1
School of Science and Technology, Department of Computer Science, Middlesex University, London NW4 4BT, UK
2
School of Computing and Engineering, University of West London, London W5 5RF, UK
*
Author to whom correspondence should be addressed.
Network 2022, 2(3), 419-439; https://doi.org/10.3390/network2030026
Submission received: 21 June 2022 / Revised: 13 July 2022 / Accepted: 18 July 2022 / Published: 22 July 2022

Abstract

:
Fifth Generation Mobile Network (5G) is a heterogeneous network in nature, made up of multiple systems and supported by different technologies. It will be supported by network services such as device-to-device (D2D) communications. This will enable the new use cases to provide access to other services within the network and from third-party service providers (SPs). End-users with their user equipment (UE) will be able to access services ubiquitously from multiple SPs that might share infrastructure and security management, whereby implementing security from one domain to another will be a challenge. This highlights a need for a new and effective security approach to address the security of such a complex system. This article proposes a network service security (NSS) modular framework for 5G and beyond that consists of different security levels of the network. It reviews the security issues of D2D communications in 5G, and it is used to address security issues that affect the users and SPs in an integrated and heterogeneous network such as the 5G enabled D2D communications network. The conceptual framework consists of a physical layer, network access, service and D2D security levels. Finally, it recommends security mechanisms to address the security issues at each level of the 5G-enabled D2D communications network.

1. Introduction

New use cases will be created and vertical industries supported in the Fifth Generation Mobile Network (5G). End-users will be able to access services at the edge from different service providers (SPs). The mobile network operator (MNO) and SP will also share infrastructure and security management while providing the service to the users. The Fifth Generation Mobile Network (5G) will also use network services such as device-to-device (D2D) communications as a underlay technology to push content to the edge [1,2]. The general security approach in solving security issues is using cryptographic techniques to achieve most security objectives. These cryptographic techniques should increase the reliability of security and privacy mechanisms in D2D communication, in form of anonymity, unlinkability, privacy, confidentiality, integrity, and authentication. These mechanisms should be lightweight due to mobile device computation and energy consumption constraints. In the past, D2D security was applied at the application layer, however, recently, network layer and physical layer security are new ways to achieve security objectives. For example, communication secrecy can be achieved at the lower layers without depending on higher layer encryption. With cryptographic methods such as the symmetric and asymmetric methods deployed at these layers, D2D communication security requirements can be achieved. Additionally, physical layer security can also be achieved by analysing and implementing the physical properties of wireless channels connecting D2D devices to provide secrecy capacity, channel-based key agreement, physical-layer authentication, and privacy-preserving anonymity [3].
There are a few security features in an information-centric networking (ICN) architecture. For example, to address the trust issue in ICN, a consumer can gain trust from the received content by deriving it from the publisher’s credentials using their public key certificate [4]. In content-centric networking (CCN), data integrity is achieved by a publisher signing a piece of content with their private key and verifying the content using the publishers’ public key. Data integrity is intrinsically provided in ICN by a named data object including a hash of data formatting. A symmetric encryption technique is used, and keys are securely distributed to authorised users, ensuring data secrecy. Due to name-based routing and the fact that the network’s interests are dispersed throughout many areas, attacks such as denial of service (DoS) have less of an impact on CCN. Secure naming addresses content poisoning and cache pollution, which are basic security challenges that need to be addressed. Strong cache validation and self-certifying naming methods also prevent fraudulent content and unpopular content from spreading throughout the network [2]. Due to its capacity to support dynamic content objects and offer an effective content retrieval, self-certification has emerged as an effective strategy, particularly at the network edge of 5G technology [5].
The initial research to address the security issues of D2D communications led to the development of several security protocols to address security at different layers of communications. It was discovered that there is a need for a security framework that can capture all levels of the network. This article aimed to explain how these protocols could co-exist and interact within the context of a framework. Therefore, it explores the security of 5G and D2D communications and proposes a network service security (NSS) framework that includes a multi-level security model for a 5G-enabled D2D communication system. The NSS framework consists of three security levels that can be used to develop the underlying security protocols for an integrated security solution to provide privacy and security protection to network services at different levels of 5G-enabled D2D communications network.
The article’s main contributions are summarised as follows:
  • The security of 5G and D2D communications is explored by investigating the UE authentication and authorisation procedures;
  • A security framework is proposed that addresses security at different levels of the network for D2D communications in 5G and beyond;
  • The security model that applies different security mechanisms for network service delivery in 5G is explained;
  • An integrated security solution for securing network services for 5G-enabled D2D communications by incorporating verified and evaluated security protocols in the proposed security framework is explored.
The rest of this article is structured as follows: an overview of the D2D security in the 5G network is presented in Section 2. While Section 3 introduces the designing and modelling of the security framework, an integrated security solution for D2D in 5G is presented in Section 4. This article is concluded in Section 5, with some recommendations.

2. Related Work

The Fifth Generation Mobile Network (5G) enabled D2D communication security challenges to be addressed using infrastructural and information-centric security mechanisms to protect devices, the communication channel and the network services. The New Generation NodeB (gNB) assists in establishing the connectivity of D2D devices, and is involved in the distribution of security information such as keys and certificates, which extends the decentralised security-centric methods into D2D architecture; however, the gNB acts as the trust authority.

2.1. Security Mechanisms

To achieve the main security objectives, which are authentication, authorisation and secure data sharing in a 5G-enabled D2D communication network, multiple security techniques are deployed.
Mobile networks adopted a service authorisation model that provides default services to every subscribed user, whereby implicit access authorisation is given to registered user equipment (UE) upon successful primary authentication. Service authorisation in legacy mobile networks, such as Fourth Generation (4G), was based on the static subscription of a user. Moreover, each UE’s authorisation matrix is kept in the home network (HN) and then downloaded to the snetwork (SN) [6]. The SN then utilises the received permission matrix to grant the authenticated UE access to the services provided by the SP.
The standardisation and adoption of a static SP-based authorisation model have proven beneficial from an interoperability standpoint when applied to a market with a limited set of services supplied via wireless networks managed by one or two MNOs. In 5G, the UE will be authenticated to access the HN and authorised to access services in the HN and data network (DN) to support multiple shareholders. For new services, the authentication mechanism was decoupled from authorisation, and new authorisation processes were established. Network slicing provided by Network Function Virtualisation (NFV) and Software-Defined Networking (SDN) technologies is used in 5G to provide a diverse collection of services. A service authorisation architecture that allows the delivery of services from several infrastructure providers using an SP-based authorisation mechanism to enable existing implicit service authorisation while also protecting SPs from unauthorised service access is desirable because of the projected large range of service products and connected devices [7].
The authentication and authorisation mechanisms that were used in this research adopted Authentication Key Agreement (AKA) and access control methods to address security in 5G-enabled D2D communications networks. These protocols’ security properties are derived from the security requirements of the system model which are secrecy, authentication, integrity, confidentiality and privacy [2].

2.1.1. Authentication

There are two authentication procedures specified in the 5G standard [6], i.e., primary authentication with two methods, namely 5G-AKA and Extensible Authentication Protocol (EAP)-AKA’ and secondary authentication based on the EAP framework, which is an important step for 5G to become an open network platform. The UE and network authentication methods in 5G are classified as primary authentication. It is comparable to that used in the legacy systems, however, in 5G, the HN has been given more control during the authentication procedure. This procedure has an in-built home control, which allows the HN to be notified when the UE is authenticated in an SN and to make the final decision on mutual authentication with the UE, whether it agrees with the message exchange and verification process [6]. This applies to the authorisation process for non-3GPP technologies such as IEEE 802.11, due to it being independent of radio access technology. Secondary authentication provides secure communication between UE and DN outside the mobile operator domain. EAP-based authentication techniques and related credentials can be utilised for this. The UE can be authenticated with DN and obtain authorisation on establishing a data path from the operator network to DN, assisted by the HN Session Management Function (SMF). In this case, the DN could be a third-party SP. The DN might be providing data services such as operator services, Internet access or content services. The DN function has been mapped onto the third party domain in 5G architecture because of secondary authentication provided by DN Authentication Authorisation Accounting (AAA) servers [8]. In another applicable scenario, the HN might provide infrastructure services via network slices to other MNOs or SPs, even though they are in the same network domain; however, the service and security provision are handled by another party, therefore secondary authentication could be applied to internal DN [9]. The primary and secondary authentications are discussed in detail in [10,11,12,13], respectively.
Mutual authentication is achieved when both parties confirm each other’s identities and agree on a session key. The access security for the New Generation Radio Access Network (ngRAN) and 5G Core Network (5GC) involves mutual authentication between the HN and UE, key derivation for authentication, access network, non-access stratum, radio resource control security and non-3GPP access [6,10]. It provides integrity, ciphering and replay protection of signalling within the 5G network. The UE and 5G network mutual authentication rely on primary and secondary authentication procedures for accessing services in 5GC and from third-party SP/external DN, respectively. The 5G system supports mutual AKA between the UE and SN authorised by the HN, enabling the UE to securely access the HN via SN. The 5G-AKA or EAP-AKA’ methods are mandatory for the 5G primary authentication procedure and the only authentication methods supported by UE and SN, for private networks’ EAP framework, should be used as specified in [6] and as shown in Figure 1. The 5G-AKA and EAP-AKA’ are discussed in [6,10,11,14,15].

2.1.2. Authorisation

Mobile networks implicitly authorise service access after authentication. Generally, for authorisation, access control can be used to implement permission and access rights by protecting access to an object. When a subject wants to access, the subject’s name is checked against a list; if it is on the list, then access is granted [16]. Conventional access control approaches to provide service access authorisation to the system have been proposed in related work and include Role-Based Access Control RBAC [17], Discretion Access Control (DAC) [18] and Attribute-Based Access Control (ABAC) [19]. Such access control mechanisms sometimes require additional techniques such as Encryption-based Access Control (EBAC) to provide a robust and efficient authorisation to complex systems including heterogeneous networks (HetNets). However, due to the complex characteristics of 5G, they are unable to provide a controllable and efficient mechanism to meet the criteria of 5G network service authorisation [12].
RBAC is a framework for specifying user access authorisation to resources, roles and responsibilities, and it follows principles such as the separation of duties, the least privilege and administrative activity segmentation. In contrast to ABAC, access control policies are developed by directly linking attributes with subjects. To achieve fine-grained access control, an efficient ABAC authorisation technique is employed based on user attributes and the access control authority grants the access rights.
Approaches based on Capability-Based Access Control (CBAC) have been suggested as a possible solution for the 5G network. CBAC uses an unforgeable token that designates access to a resource to inform of abilities according to a set of rights [20]. Capabilities are a two-pronged method to access control, in which each subject is assigned to a capability list that specifies each object and the actions that the subject is authorised to perform on it. The access matrix is stored by row in the metadata of the object [16]. The subject presents a capability to the service server (SS) to obtain access to an object and the capability is transferable and non-forgeable. Local SPs could perform the CBAC, capability token validation and access right authorisation processes. This can be accomplished by locally implementing permission processes on distributed edge devices, making it feasible for D2D communications. Many access control systems for mobile network applications have adopted capability-based methods, but this has raised a few issues such as capability propagation and revocation [21].
With in-network caching, content objects may not always arrive from their original producer such as the SP, and content security cannot be considered in the traditional mobile network model based on secure and wireless or point-to-point channels [22]. This implies that content must be encrypted to prevent unauthorised access, invalid disclosure or modification by unauthorised parties using EBAC. By offering a framework for delivering access permissions to services, the existing access control mechanism reflects a good conceptualisation of authorisations. All these access control policies can be implemented independently or as an integrated access control solution.
The authorisation mechanism described in [6] uses the OAuth 2.0 framework as defined in RFC 6749 [23]. It states that client credentials should be used as grants and access tokens shall be in JavaScript Object Notation (JSON) web token format, which can be protected with JSON web signature in the form of a digital signature or message authentication code (MAC) built on JSON web signature [24].

2.1.3. Access Rights Delegation

Users can be assigned access permissions in the form of delegation, which is the process of assigning access rights to a user by either an administrative user or another user. The administrator user does not need to be able to use the access right, but a user delegation must be able to use the access right [25]. For authorisation and capability revocation management, a federated delegation method can be used in the capability development and propagation workflow. This could overcome issues in the access control strategy processing of a hybrid security mechanism by combining ABAC and CBAC with federated identity (FId) in a content-aware mobile network such as 5G [12]. Moreover, delegating some authentication and authorisation activities to other security domains facilitates 5G security policies and ubiquitous services access in different domains from multiple SPs. Processing capability validation in the HN and third-party SPs offers a D2D communications access control mechanism that is flexible, elastic, context-aware and fine-grained [26]. This inter-domain delegation and access authorisation enable 5G-enabled D2D communications security to be implemented beyond static authorisation.
In addition, the authors in [27] introduced a framework that proposed a self-delegation protocol for device authentication and proactive handover authentication using a delegated credential for unified network- and service-level authentication for wireless access. Two authentication and key agreement protocols were introduced as part of a security framework to secure transactions at the network and service levels in [28]. In a heterogeneous system such as 5G for multi-server collaboration, privacy protection is crucial, as presented in [29], so the authors used blockchain to develop heterogeneous multi-access edge computing (MEC) systems to offer privacy topology protection. The authors in [30] developed a privacy-preserved, incentive-compatible and spectrum-efficient framework based on blockchain that considers human-to-human spectrum utilisation and machine-to-machine communication. A framework for the Internet of Vehicles (IoV) architecture model and an authentication-based protocol for smart vehicular communication using 5G are both suggested in [31].
The comparison between some related work is shown in Table 1 in order to highlight the key differences between the other pre-existing security frameworks for heterogeneous networks security and the proposed conceptual framework in this research. It outlines the authors, their descriptions, and the variations among a number of criteria, including key hierarchy, protocols interface, privacy preservation, authentication, authorisation, single sign-on (SSO), formal verification and evaluation.
As discussed in the related work, some security features such as authentication, authorisation and permission delegation have been used in different D2D communications or 5G independently. However, there has been a lack of a framework that considered a multilayered security solution for a 5G mobile network including the D2D communication as a layer of the network. With 5G’s unique characteristics, the promise of integration with the networks and pushing services to the edge, the proposed framework intends to provide an integrated security solution for D2D communications in 5G and beyond that is interoperable, verified and evaluated.
As discussed in the related works, some security features such as authentication, authorisation and permission delegation have been used in different D2D communications or 5G independently. However, there has been a lack of a framework that considered a multilayered security solution for 5G mobile networks, including D2D communications as a layer of the network architecture. With 5G’s unique characteristics, the promise of integration with the networks and pushing services to the edge, the proposed framework intends to provide an integrated security solution for 5G and Beyond that is interoperable, verified and evaluated.

3. Proposed Network Service Security (NSS) Framework

This section presents the proposed security solution and explains how protocols coexist and interact with each other in the context of the framework. This article adopts a network service abstraction concept from [32], the system architecture from [33] and the security architecture from [6]. The UE registers with HN and starts receiving roaming services from a visiting network (VN). The network services consist of services that rely on other services, such as D2D communications and ICN. It would require integrating 5G with other network architectures such as ICN, content delivery network (CDN) and cloud computing [2,34]. The UE would register with MNO or SP and subscribe for such services, allowing it to connect to the network and access services from HN and other SPs in different domains.
After being authenticated to access the network, the UE may need to execute a secondary authentication with the SP, which authorises the UE to access its services as well as authorising the UE to perform other activities such as data caching and sharing with other UEs. D2D communications can be deployed to support different use cases such as traffic offloading, location-based services and vehicle to everything (V2X) communications. In addition, D2D direct communication could be established for content sharing and gaming, therefore the communication must be established using a secure and efficient method with the minimal involvement of the gNB [2,26].
The MNO/SP controls the service subscription, access and content retrieval authorisation as well as enables the normal service operation of the cellular network. However, the SP in 5G could be the MNO, third party, or another SP that uses the MNO’s infrastructure as a tenant via network slicing [26]. The gNB controls the UE in cellular coverage and communications between two devices, whilst the D2D devices control the UE out of coverage scenario. Moreover, the MNO is in charge of the user’s network access, connection setup, resource allocation and security management. The MNO/SP may block the UE from accessing the services or hide their visibility. To deliver inter-operator D2D services, various networks should sign an inter-operator agreement. The communication channels between UE and networks as well as the D2D devices are all susceptible to attacks, as HN and VN may also be interested in eavesdropping on D2D communications [35]. It should be mentioned that the content access and retrieval process, which include content discovery and distribution, were also considered in this study.
In this article, an approach that integrates both infrastructural-centric and information-centric security services is proposed. The hybrid security framework will focus on:
  • Information-centric security services—providing data confidentiality, integrity and availability;
  • Infrastructural-centric security services—providing entities authentication, access controls of the user to network and services.

3.1. Network Service Security Architecture

To address the security threats in 5G-enabled D2D communication and to provide the secure delivery of network services, the proposed security framework assumes that network access security has been achieved. The main concern is the secure access of services by the UE from the SP. The UE should be able to obtain authorisation to access and share the data with another UE, hence achieving service security. The verification of the authenticity, integrity and provenance of the named data object against the producer must be performed before the UE is granted access. Another concern is whether the right data are being published and can be restricted even during out of coverage. The UE also should be able to share data without involving the HN even during coverage, which addresses one of the D2D security problems.
After a successful authentication procedure with the network, the UE can request access to services of SP via HN, and the SP verifies the UE and grants access to UE. Security is implemented by various security mechanisms, which should be interoperable with each other. Before addressing security at the different levels, these levels must be defined and the security model function of each level has to be specified.
To address the security issues of accessing the network and services, a unified modular architecture is required, as shown in Figure 2, to support the proposed security framework, and the generic architecture consists of the following security entities which are modified according to various security models:
  • UE: The end-user’s device that is trying to access the services;
  • HN AAA servers consist of security anchor function (SEAF) as SN or authenticator, Authentication Server Function (AUSF) for authentication from the HN if the service is in a home-controlled environment. From a network perspective, the Authentication Credential Repository and Processing Function (ARPF) maintains keys and other security contexts that are utilised for primary authentication [6];
  • External AAA servers for service authorisation and secondary authentication in local and external DNs authenticate and authorise the UE to access the service and permission delegation to share with other UE;
  • SS: A server storing the content/services that the UE is trying to access which could be controlled by either the HN as an internal SP or controlled by an external SP.

3.2. Security Modelling

This subsection discusses security modelling and a multilayered approach in a modular framework. The secure services model allows the UE to securely access network services from the network and SP. The wireless network is under the control of the 5G network, whose root certificate is kept in the Universal Subscriber Identity Module (USIM) [6]. In the 3GPP standard, it is mentioned that the UE and ARPF share long-term K by performing a challenge and response, the shared key with other information including identification information is used by the ARPF to generate session keys through collaboration with SEAF and AUSF as explained in [10]. The AUSF is in charge of the network and UE mutual authentication; after initial authentication, the communication link with HN gNB is left open until it is disconnected. If the UE moves to a different gNB, it will require re-authentication and the generated keys and security information might be reused during the handover—which is handled by the ARPF in both the HN and VN, this is out of the scope of this work.
In this case, the UE obtains access to the services after connecting to the wireless network, 5G is based on a security architecture that is host-centric and the CCN is information-centric; hence, the hybrid approach of the security framework. Normally, the security of the content relies on the encryption of the content object as the producer must register the content object to the database owned by the SP achieving the validation and authentication of the named data object. Multiple methods are used to address the complexity of this system model.
The security modelling in Figure 3 leverages the security principles by 3GPP [6] by applying the authentication and authorisation methods that grant the UE service access and permission to engage with other UEs. A multilevel framework is proposed to align with the network service abstraction and 5G protocol stack [32]. It comprises Network Access Security (NAC), Service Level Security (SLS) and D2D Security (DDS) levels which are parallel with the network service abstraction. It also explores physical layer security (PLS) to highlight the need for security at each level and integrated solutions. This security framework’s novelty is mainly on SLS and DDS, as PLS and the NAC have been extensively studied by related work. The PLS and NAC provide security for physical and network access; the SLS provides security for services access; and DDS provides security for D2D services sharing.
The framework considers the security link between all the security levels, and in addition to the security entities, it is represented as a unified security model. This security framework intends to provide the UE with secure service access and the sharing of these services with UE from another network without losing their initial network access. The security framework intends to provide secure communication and sharing between UEs without the need for HN as the central authority.

3.2.1. Physical Layer Security

This level of security is concerned with the PLS such as the spectrum, resource allocation, interference and signal. Even though PLS is out of scope, this article gives a brief overview of PLS solutions applied by relying on wireless channel characteristics such as interference, signal and fading—whilst the quality of the attacker’s signal can be degraded through keyless secure communication by using signal engineering and processing techniques. Different studies explored PLS in 5G, and a detailed review of different PLS techniques are presented [36,37,38]. For example, artificial noise injection is used to increase channel quality and an anti-eavesdropping signal approaches are used to align multiple users’ signals at the eavesdroppers. Secure beamforming, on the other hand, improves the spatial distribution properties of the transmitted signal, resulting in a greater difference in channel quality between legitimate users and eavesdroppers.

3.2.2. Network Access Security

The NAC was well-defined by 3GPP in 5G security standards and has been extensively studied in various related works [10,14,39,40,41,42,43,44]. The 3GPP specifies that, for UE to access the network, it requires a primary authentication process, which addresses the NAC. This includes the AKA protocol, which enables the UE and HN to authenticate each other.
Mobile subscribers will be able to access network services through ngRAN using their UEs, taking advantage of a variety of wireless communication technologies. As a result, secure access is critical to the 5G principle design, and 3GPP has defined the security requirements in [6] as well as the system architecture in [45] to support its objectives. The UE’s connections should be secured by 3GPP’s standardised security mechanisms. Both subscribers and MNOs require these mechanisms to provide security guarantees, such as the authentication and trust of involved parties, as well as the confidentiality and integrity of the user’s data. For the UE to access the network, the UE and the network must mutually authenticate, and then the UE must further authenticate using the security context to access services provided by the SP, which might be the same network provider or a third party via the DN function. Through layered access and security, the UE can gain access to network services. The AKA protocol mutually authenticates the UE and the HN and establishes a session key for UE and SN in which they can have secure communication over a wireless channel to provide network access security. As mentioned earlier, the 5G standard recommends 5G-AKA and EAP-AKA’ protocols as preferred methods for primary authentication to address the most significant security requirements in 5G [6].
The network-level authentication is responsible for verifying that the UE has access to the right network when it connects to it [6]. In 5G, the messages between the UE and the access network via radio interface are to be encrypted. The security at the network level was extensively investigated in [39,42]. Furthermore, under the 3GPP definition, the AKA messages were implemented according to a security standard which outlines certain security properties that must be met. The security context obtained from the authentication on this level can be utilised for further authentication when the UE wants access to other services. The security on this level is concerned with authenticating devices in the network and mobility of the UE. In addition, the handover authentication requires the UE and new AN to re-authenticate both parties. To access the network services provided by the MNO, the UE and the network must mutually authenticate each other to establish a secure channel of communication, trust and the authenticity of the device in the network. After this level of security assurance, the UE can request to access other services from the servers in the CN or from third party service provider.

3.2.3. Service Level Security

The user must be verified to use the services at this level, and it must be verified whether the user is attempting to access the services with the right permission. As previously stated, this research is focusing on SLS due to new emerging services being promised in 5G, in addition to PLS and NAC having been extensively investigated. With 5G extending the mobile network’s potential through the use of additional resources, dense connection, and the enabling of vertical industries, service provision is getting more challenging, especially from a security standpoint. However, the NAC is revisited in the discussion of SLS, as both the UE and network must be mutually authenticated for the UE to join the network. Security on the service level is concerned with authentication and authorisation between the UE, MNO and SP, which gives the UE access to the services and SP the ability to provide the services securely [26].
Since 5G is a large-scale HetNet in nature, some studies on service security are still relevant to this research. The service level protocol for the mobile network in [27,28] addressed security concerns when the UE is accessing services provided by the SP, this was based on IP-based networks and future networks. In [46], the authors proposed an open architecture based-service level protocol for mutual authentication between the UE and SP. After establishing connectivity to the network, the UE must be authenticated and authorised to use the services, which is addressed by SLS [12]. SLS also requires mutual authentication between the UE and the SP to establish a secure communication channel, with a focus on zero trust [11].

3.2.4. Device-to-Device Security

D2D communications’ security was addressed to some extent in 4G and has to be explored more in 5G as it uses D2D communications as an underlay technology critical to its functionality and attaining its key objectives [1,3,32,47,48]. This study is concerned with service security and how the existing D2D security can be improved. How will the UE deal with the data accessed after being granted access to the network and service? To date, D2D authentication and authorisation have been dependent on various security procedures, requiring it to be authenticated and authorised each time it disconnects from the network. Furthermore, in out-of-coverage conditions, the UE is currently not able to share restricted data with another UE. What happens to data on the UE and how can it be securely exchanged with or without network support is the subject addressed in this study. As a result, the DDS security level will attempt to address these concerns [2,26].

3.3. The Protocols

These security protocols that are defined in the framework to address security on different levels of the system model, as shown in Figure 4, were verified for security guarantees and evaluated for performance effectiveness. The framework incorporates various security protocols to provide an integrated security solution to a 5G-enabled D2D communication network. The protocols are formally analysed in related work, and they are as follows:

3.3.1. Network Access Security

NAC protocols and related work are explored in [10,15].
  • 5G-AKA Protocol: enables the UE and the HN to establish mutual authentication and anchor keys [10].
  • EAP-AKA’ Protocol: enables the UE and the HN to establish mutual authentication and anchor keys [15].

3.3.2. Service Security

SLS protocols and related work are presented in [11,12,13].
  • Secondary Authentication Protocol (SAP)-AKA Protocol: enables the UE and the SP to establish mutual authentication and anchor keys [11].
  • Network Service-Federated Identity (NS-FId) Protocol: enables the UE and the SP to achieve mutual federated authentication and authorisation [12].
  • Data Caching and Sharing security (DCSS) Protocol: allows the UE to cache and share data accessed from the SS [13].

3.3.3. Device-to-Device Security

DDS protocols and related work are presented in [26].
  • Device-to-Device Service Security (DDSec) Protocol: provides authentication and authorisation to share the cached data between two UEs in proximity, with network assistance.
  • Device-to-Device Attribute and Capability (DDACap) Protocol: provides security authentication and authorisation to share the cached data between two UEs in proximity without network assistance.

3.4. Formal Verifications and Performance Evaluation of the Security Protocols

These protocols are formally verified for security guarantees that align with the security requirements of the unified modular architecture in Figure 2, as demonstrated in [10,11,12,13,26].

3.4.1. Formal Verification Approach

Formal methods and automated verification were applied to security protocols such as AKA that provide weak assurances due to the use of strong abstractions, protocol simplifications and limitations in the properties’ interpretation. To give solid guarantees, formal approaches were already used to examine security protocols in [12,14,15,43]. Most verification approaches and tools struggle with security protocol features such as those employed in the proposed framework. This is due to the use of cryptographic primitives such as the sequence number (SQN) and exclusive-OR (XOR), which have algebraic features that make symbolic reasoning difficult [14]. As a result, some tools are incompatible with manual proof checks. Many automated verification tools can be used for this security analysis, including Automated Validation of Internet Security Protocols and Applications (AVISPA) [49], Tamarin [50], and ProVerif [51].

3.4.2. Performance Evaluation Based on Analytical and Simulation Approaches

To check the effectiveness of these protocols, performance evaluation was carried out using analytical and simulation methods presented in [52]. The analytical model associates an enhanced label to each communication and each decryption based on the ProVerif and Applied pi-calculus processes used in the verification of the protocol.
The performance parameters and metrics are displayed in Table 2 and Table 3 and the outcomes for each level are represented by applicable protocols in Table 4 for an analytical model.
The simulation model is built on the NS-3 5G mmWave module [53,54] to replicate the current non-standalone deployment of 5G using 5G radio technologies and the LTE network. By evaluating efficiency, throughput and computational cost, the communication and processing costs associated with the protocols are taken into account.
The performance parameters and metrics are displayed in Table 5 for computational cost, Table 6 and Table 7 for communication cost and Table 8 and Table 9 for the simulation model results at each level with a specific protocol.
Furthermore, the security formal verification and performance evaluation approaches of this framework’s underlining protocols were extensively explored in [10,11,12,13,26,52], respectively. The behaviour and cost of an algorithm are affected by the cryptographic scheme, formally analysed security properties and system model. An example of this is the employment of symmetric or asymmetric cryptography in a mobile network with a variety of stakeholders from various security realms. As a result, utilising this method with this conceptual framework makes the important cost aspects obvious, helps in the development of security protocols and aids in the selection of cost-effective solutions. Other communications systems in addition to mobile networks can also use these techniques.

4. An Integrated Security Solution

The inclusion of security features in the suggested security framework is covered in this section. The proposed NSS framework covers security for network services in 5G-enabled D2D communications from the point at which a UE requests access to the network via wireless access to the point at which it is allowed to share the service with another UE. The goal of the NSS framework is to defend against the dangers described in [2] by protecting the entities participating in communication and the data being communicated over communication channels in various security domains and scenarios. The NAC, SLS and DDS levels of the solution are as follows:
  • NAC provides primary authentication and is concerned with the security of the 5G access network. It safeguards the entities, the wireless data connection and the correspondence between the UE, SN and HN.
  • SLS offers secondary authentication and authorisation and is concerned with UE service authorisation. It safeguards information, entities and communication between the UE, HN and SP in several domains.
  • DDS addresses the security of D2D communication, enabling data sharing in both network-assisted and non-network-assisted communication and offers authentication and authorisation between two UEs that are close to one another. Data, entities and communication between two UEs and across networks are all protected.
An integrated security framework can be created by including some solutions into this safe framework. Each level of the security model is made up of security protocols in the following linked work. In order to provide security with the NAC, 3GPP standardised 5G-AKA and EAP-AKA [6,10]. The authors [11,12,13] proposed protocols that deal with security at the service level of 5G networks. In [26], the authors proposed investigating D2D communication security and proposed two security protocols that offer security covering many D2D scenarios.
These security framework’s underlying protocols address security on the network, service and D2D levels of communications. As illustrated in Figure 5, these security levels are connected by the protocol interfaces, and the protocols are encapsulated while addressing the security requirements from one level to another. These protocols employ or share some security contexts in order to provide an integrated security solution; nevertheless, this should not compromise security on another level or domain. Additionally, Figure 6 shows a hierarchy of keys, and explains how keys are generated and shared in various contexts.

4.1. Connection of Different Levels of NSS Model in 5G Enabled D2D System

When a user requests network access using a UE, the closest SEAF will start the primary authentication procedure. In [32], the procedure for the UE to access the network and services is covered. According to the following descriptions, the security model aims to provide three secure connections between the UE and HN; UE and SP; and UE and UE at various phases:
  • In phase 1, a primary authentication protocol is initiated when the UE presents a network access request. According to [6,10], a 5G-AKA or EAP-AKA’ protocol can be selected as the AKA procedure between UE and HN.
  • In phase 2, after primary authentication, the UE submits a service request that initiates a secondary authentication or authorisation process, which is handled by SMF in the HN network and SP AAA in the SP network. Depending on the registration status and security guidelines outlined in [11,12], the SAP-AKA or NS-FId protocols may be utilised at this time.
  • In phase 3, UE sends a request for data caching and sharing authorisation after getting access to the services using the DCSS protocol described in [13].
  • In phase 4, once the UE was given permission to cache and share data, it can publish that data by broadcasting the data name to other nearby UEs, in this example, U E A and U E B . The DDSec and DDACap protocols are invoked by another UE after an interested UE sends it the request, as defined in [26].

4.2. Federated Security in 5G

This section covers the integration of federated security into 5G as well as how the UE performs SSO. The benefits of adopting FId in mobile communications and how it eliminates the need for the UE to continually authenticate and authorise services, including in roaming scenarios, were presented in [55], which also discussed federated identity management in 5G. When the suggested solution in this article is implemented in a 5G-enabled D2D communications network, the tokens and caching data of the security processes are reduced when the UE needs to re-authenticate to the network or perform handover authentication while roaming but due to SSO, tokens and caching data of the security processes are reduced.
Next, the following steps will show how federated security is used in 5G communication:
  • Step 1: Following network authentication, the UE requests the SP for service authorisation;
  • Step 2: The UE is forwarded by the SP through SMF to the identity provider (IdP), which creates and assigns the FId to the UE;
  • Step 3: Using the UE’s identity token, the IdP and UE carry out federated authentication operations.
  • Step 4: The UE uses an identity token to ask the SP for an access token, which the SP-AAA then issues along with a refresh token. SSO has now been accomplished;
  • Step 5: If the access token is legitimate, the SS will grant the UE’s request for access to the service;
  • Step 6: Using the cached access token, the UE requests caching and sharing authorisation with other UE after getting access to the service.
An integrated security solution addressing security risks at various levels of the system model is provided by the interface between the underlying security protocols of the security framework using supported security context, as shown in Figure 7.

5. Conclusions

A D2D communications network with 5G capability is made up of several systems backed by different technologies. This prompted the creation of several security solutions that deal with security for particular applications or layers. In addition, new use cases for accessing other services from SPs in various domains are made possible by 5G network services, posing additional security difficulties. Consequently, a comprehensive security solution that handles these problems is required. End-users will frequently access services from several SPs using their UE, which will present a new security risk. Additionally, infrastructure and security management may be shared amongst SPs. This article examined security in D2D communications, 5G, and beyond. It described the system’s levels, including those that have been addressed in related works and those which still require attention. A security framework was proposed that outlined the security levels and entities involved in the authentication and authorisation processes. For the proposed security framework, it established the underlying security protocols, which were fully verified for security guarantees and appraised for efficiency. As part of an integrated security solution, the designed underlying security protocols using the suggested framework were streamlined to certain system levels and solved various security challenges. The protocols, however, can be used as a standalone solution, sharing some security context to comply with 5G security standards while permitting interoperability with third-party solutions without compromising security at any level.
Current studies have focused on developing security solutions that apply to one layer without considering the security of the layer below or above. The future direction of the research in this article is to extend the framework’s application to the next-generation mobile network and other systems such as Internet of Things (IoT) and autonomous vehicles. This framework could develop security mechanisms and evaluate their effectiveness and interoperability as an integrated solution.

Author Contributions

Conceptualisation, E.K.K.E., M.A. and J.L.; methodology, E.K.K.E. and M.A.; validation, E.K.K.E. and M.A.; investigation, E.K.K.E.; writing—original draft preparation, E.K.K.E.; writing—review and editing, E.K.K.E. and M.A.; supervision, M.A. and J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gupta, A.; Jha, R.K. A Survey of 5G Network: Architecture and Emerging Technologies. IEEE Access 2015, 3, 1206–1232. [Google Scholar] [CrossRef]
  2. Edris, E.K.K.; Aiash, M.; Loo, J. Security in Network Services Delivery for 5G enabled D2D Communications: Challenges and Solutions. In Challenges in the IoT and Smart Environments—A Practitioners’ Guide to Security, Ethics and Criminal Threats, 1st ed.; Montasari, D.R., Jahankhani, P.H., Al-Khateeb, D.H., Eds.; Advanced Sciences and Technologies for Security Applications; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar] [CrossRef]
  3. Zhang, A.; Lin, X. Security-Aware and Privacy-Preserving D2D Communications in 5G. Network 2017, 31, 70–77. [Google Scholar] [CrossRef]
  4. Zhang, X.; Chang, K.; Xiong, H.; Wen, Y.; Shi, G.; Wang, G. Towards name-based trust and security for content-centric network. In Proceedings of the 2011 19th IEEE International Conference on Network Protocols, Vancouver, AB, Canada, 17–20 October 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 1–6. [Google Scholar] [CrossRef]
  5. Tourani, R.; Misra, S.; Mick, T.; Panwar, G. Security, Privacy, and Access Control in Information-Centric Networking: A Survey. IEEE Commun. Surv. Tutor. 2018, 20, 566–600. [Google Scholar] [CrossRef]
  6. 3GPP. Security Architecture; Procedures for 5G System; Technical Specification (TS) 3GPP TS 33.501 V17.4.1 (2022-01), Third Generation Partnership Project; 3GPP: Sophia Antipolis, France, 2022. [Google Scholar]
  7. Ferdi, S.; Shah, Y.; Kumar Choyi, V.; Brusilovsky, A. Dynamic Authorization for 5G Systems. In Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking (CSCN), Paris, France, 29 October–1 November 2018; pp. 1–5. [Google Scholar] [CrossRef]
  8. Prasad, A.R.; Arumugam, S.; B, S.; Zugenmaier, A. 3GPP 5G Security. J. ICT Stand. 2018, 6, 137–158. [Google Scholar] [CrossRef]
  9. Ravindran, R. Enabling ICN in 3GPP’s 5G NextGen Core Architecture. IETF (The Internet Engineering Task Force) Request for Comments; IETF: Fremont, CA, USA, 2019; Volume 2019. [Google Scholar]
  10. Edris, E.K.K.; Aiash, M.; Loo, J. Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol. In Proceedings of the The Third International Symposium on 5G Emerging Technologies (5GET 2020), Paris, France, 19–21 April 2020. [Google Scholar]
  11. Edris, E.K.K.; Aiash, M.; Loo, J.; Alhakeem, M.S. Formal Verification of Secondary Authentication Protocol for 5G Secondary Authentication. Int. J. Secur. Netw. 2021, 16, 223–234. [Google Scholar] [CrossRef]
  12. Edris, E.K.K.; Aiash, M.; Loo, J. Network Service Federated Identity (NS-FId) Protocol for Service Authorization in 5G Network. In Proceedings of the 5th IEEE International Conference on Fog and Mobile Edge Computing (FMEC 2020), Paris, France, 19–21 April 2020. [Google Scholar]
  13. Edris, E.K.K.; Aiash, M.; Loo, J. DCSS Protocol for Data Caching and SharingSecurity in 5G Network. Networks 2021, 10, 6. [Google Scholar] [CrossRef]
  14. Basin, D.; Dreier, J.; Hirschi, L.; Radomirović, S.; Sasse, R.; Stettler, V. A Formal Analysis of 5G Authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 1383–1396. [Google Scholar] [CrossRef]
  15. Zhang, J.; Yang, L.; Cao, W.; Wang, Q. Formal Analysis of 5G EAP-TLS Authentication Protocol Using ProVerif. IEEE Access 2020, 8, 23674–23688. [Google Scholar] [CrossRef]
  16. Sandhu, R.S.; Samarati, P. Access control: Principle and practice. IEEE Commun. Mag. 1994, 32, 40–48. [Google Scholar] [CrossRef]
  17. Ferraiolo, D.; Kuhn, D.R.; Chandramouli, R. Role-Based Access Control; Artech House: London, UK, 2003. [Google Scholar]
  18. Downs, D.D.; Rub, J.R.; Kung, K.C.; Jordan, C.S. Issues in discretionary access control. In Proceedings of the 1985 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 22–24 April 1985; IEEE: Piscataway, NJ, USA, 1985; p. 208. [Google Scholar]
  19. Hu, V.C.; Ferraiolo, D.; Kuhn, R.; Friedman, A.R.; Lang, A.J.; Cogdell, M.M.; Schnitzer, A.; Sandlin, K.; Miller, R.; Scarfone, K. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Spec. Publ. 2013, 800, 1–54. [Google Scholar]
  20. Dennis, J.B.; Horn, E.C.V. Programming semantics for multiprogrammed computations. Commun. ACM 1983, 26, 29–35. [Google Scholar] [CrossRef]
  21. Anggorojati, B.; Mahalle, P.N.; Prasad, N.R.; Prasad, R. Capability-based access control delegation model on the federated IoT network. In Proceedings of the The 15th International Symposium on Wireless Personal Multimedia Communications, Taipei, Taiwan, 24–27 September 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 604–608. [Google Scholar]
  22. Kuriharay, J.; Uzun, E.; Wood, C.A. An encryption-based access control framework for content-centric networking. In Proceedings of the 2015 IFIP Networking Conference (IFIP Networking), Toulouse, France, 20–22 May 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–9. [Google Scholar] [CrossRef]
  23. Dick, H. The OAuth 2.0 Authorization Framework; Rfc 6749; IETF: Fremont, CA, USA, 2012. [Google Scholar]
  24. Jones, M.B.; Bradley, J.; Sakimura, N. RFC 7519: JSON Web Token (JWT); Rfc; IETF: Fremont, CA, USA, 2015. [Google Scholar]
  25. Crampton, J.; Khambhammettu, H. Delegation in role-based access control. Int. J. Inf. Secur. 2008, 7, 123–136. [Google Scholar] [CrossRef]
  26. Edris, E.K.K.; Aiash, M.; Loo, J. Formal Verification of Authentication and Service Authorization Protocols in 5G enabled Device-to-Device Communications using ProVerif. Electronics 2021, 10, 3160. [Google Scholar] [CrossRef]
  27. Kuroda, M.; Yoshida, M.; Ono, R.; Kiyomoto, S.; Tanaka, T. Secure Service and Network Framework for Mobile Ethernet. Wirel. Pers. Commun. Int. J. 2004, 29, 161–190. [Google Scholar] [CrossRef]
  28. Aiash, M.; Mapp, G.; Lasebae, A.; Loo, J. A Secure Framework for Communications in Heterogeneous Networks. In Proceedings of the 2014 28th International Conference on Advanced Information Networking and Applications Workshops, Victoria, BC, Canada, 13–16 May 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 841–846. [Google Scholar] [CrossRef]
  29. Yang, H.; Liang, Y.; Yuan, J.; Yao, Q.; Yu, A.; Zhang, J. Distributed Blockchain-Based Trusted Multidomain Collaboration for Mobile Edge Computing in 5G and Beyond. IEEE Trans. Ind. Inform. 2020, 16, 7094–7104. [Google Scholar] [CrossRef]
  30. Zhou, Z.; Chen, X.; Zhang, Y.; Mumtaz, S. Blockchain-Empowered Secure Spectrum Sharing for 5G Heterogeneous Networks. IEEE Netw. 2020, 34, 24–31. [Google Scholar] [CrossRef]
  31. Gupta, N.; Manaswini, R.; Saikrishna, B.; Silva, F.; Teles, A. Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET. Future Internet 2020, 12, 63. [Google Scholar] [CrossRef]
  32. Edris, E.K.K.; Aiash, M.; Loo, J. Investigating Network Services Abstraction in 5G enabled Device-to-Device (D2D) Communications. In Proceedings of the 2019 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Leicester, UK, 19–23 August 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1660–1665. [Google Scholar] [CrossRef]
  33. Checko, A.; Christiansen, H.; Yan, Y.; Scolari, L.; Kardaras, G.; Berger, M.; Dittmann, L. Cloud RAN for Mobile Networks-A Technology Overview. IEEE Commun. Surv. Tutor. 2015, 17, 405–426. [Google Scholar] [CrossRef]
  34. Ravindran, R.; Chakraborti, A.; Amin, S.O.; Azgin, A.; Wang, G. 5G-ICN: Delivering ICN Services over 5G Using Network Slicing. IEEE Commun. Mag. 2017, 55, 101–107. [Google Scholar] [CrossRef]
  35. Wang, M.; Yan, Z.; Niemi, V. UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications. Mob. Netw. Appl. 2017, 22, 510. [Google Scholar] [CrossRef]
  36. Sun, L.; Du, Q. Physical layer security with its applications in 5G networks: A review. Commun. China 2017, 14, 1–14. [Google Scholar] [CrossRef]
  37. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.K.; Gao, X. A Survey of physical Layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef]
  38. Gao, Y.; Hu, S.; Tang, W.; Li, Y.; Sun, Y.; Huang, D.; Cheng, S.; Li, X. Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges. IEEE Access 2018, 6, 26350–26357. [Google Scholar] [CrossRef]
  39. Arkko, J.; Norrman, K.; Näslund, M.; Sahlin, B. A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Washington, DC, USA, 20–22 August 2015; Volume 1, pp. 1205–1209. [Google Scholar] [CrossRef]
  40. Dehnel-Wild, M.; Cremers, C. Security Vulnerability in 5G-AKA Draft; Tech. Rep; Department of Computer Science, University of Oxford: Oxford, UK, 2018. [Google Scholar]
  41. Koutsos, A. The 5G-AKA Authentication Protocol Privacy. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden, 17–19 July 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 464–479. [Google Scholar]
  42. Fang, D.; Qian, Y.; Hu, R.Q. Security for 5G Mobile Wireless Networks. IEEE Access 2018, 6, 4850–4874. [Google Scholar] [CrossRef]
  43. Ahlström, M.; Holmberg, S. Prototype Implementation of a 5G Group-Based Authentication and Key Agreement Protocol; Lund University: Lund, Sweden, 2016. [Google Scholar]
  44. Ajit, M.; Sankaran, S.; Jain, K. Formal Verification of 5G EAP-AKA protocol. In Proceedings of the 2021 31st International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 24–26 November 2021; pp. 140–146. [Google Scholar] [CrossRef]
  45. 3GPP. System Architecture for the 5G System; Technical Specification (TS) 3GPP TS 23.501 V17.3.0 (2021-12), Third Generation Partnership Project; 3GPP: Sophia Antipolis, France, 2021. [Google Scholar]
  46. Aiash, M.; Loo, J. Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. Int. J. Commun. Syst. 2014, 27, 3600–3618. [Google Scholar] [CrossRef]
  47. Liu, L.; Yu, W. A D2D-based Protocol for Ultra-Reliable Wireless Communications for Industrial Automation. IEEE Trans. Wirel. Commun. 2018, 17, 5045–5058. [Google Scholar] [CrossRef]
  48. Chandrasekaran, G.; Wang, N.; Hassanpour, M.; Xu, M.; Tafazolli, R. Mobility as a Service (MaaS): A D2D-Based Information Centric Network Architecture for Edge-Controlled Content Distribution. IEEE Access 2018, 6, 2110–2129. [Google Scholar] [CrossRef]
  49. Armando, A.; Basin, D.A.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuellar, J.R.; Drielsma, P.H.; Heam, P.C.; Kouchnarenko, O.; Mantovani, J.; et al. The AVISPA tool for the automated validation of Internet security protocols and applications. Comput. Aided Verif. Proc. 2005, 3576, 281–285. [Google Scholar]
  50. Meier, S.; Schmidt, B.; Cremers, C.; Basin, D. The TAMARIN Prover for the Symbolic Analysis of Security Protocols. In Proceedings of the Computer Aided Verification, Saint Petersburg, Russia, 13–19 July 2013; Sharygina, N., Veith, H., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; Volume 8044, pp. 696–701. [Google Scholar] [CrossRef]
  51. Blanchet, B. Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif. Found. Trends Priv. Secur. 2016, 1, 1–135. [Google Scholar] [CrossRef]
  52. Edris, E.K.K.; Aiash, M.; Loo, J. 5G Security Protocol Performance Evaluation using Applied Pi Calculus and Markov Chain. Comput. Secur. 2021, Submitted. [Google Scholar]
  53. Nsnam. ns-3 a Discrete-Event Network Simulator for Internet Systems; Nsnam: Sleepy Hollow, NY, USA, 2021. [Google Scholar]
  54. Mezzavilla, M.; Zhang, M.; Polese, M.; Ford, R.; Dutta, S.; Rangan, S.; Zorzi, M. End-to-End Simulation of 5G mmWave Networks. IEEE Commun. Surv. Tutor. 2018, 20, 2237–2263. [Google Scholar] [CrossRef]
  55. Edris, E.K.K.; Aiash, M.; Loo, J. The Case for Federated Identity Management in 5G Communications. In Proceedings of the 5th IEEE International Conference on Fog and Mobile Edge Computing (FMEC 2020), Paris, France, 20–23 April 2020; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar]
Figure 1. 5G security entities.
Figure 1. 5G security entities.
Network 02 00026 g001
Figure 2. Unified modular architecture.
Figure 2. Unified modular architecture.
Network 02 00026 g002
Figure 3. Security framework.
Figure 3. Security framework.
Network 02 00026 g003
Figure 4. Security Model.
Figure 4. Security Model.
Network 02 00026 g004
Figure 5. Interface of the Security Protocols.
Figure 5. Interface of the Security Protocols.
Network 02 00026 g005
Figure 6. Key Hierarchy and Derivation.
Figure 6. Key Hierarchy and Derivation.
Network 02 00026 g006
Figure 7. Integrated Security Solution.
Figure 7. Integrated Security Solution.
Network 02 00026 g007
Table 1. Comparison of Related Work Based on the Proposed Conceptual Framework.
Table 1. Comparison of Related Work Based on the Proposed Conceptual Framework.
AuthorsYearDescriptionDifferences
1234567
[27]2004proposed a framework with self-delegation and handover protocolsxxxx
[28]2014introduced a framework with two AKA security protocolsxx
[29]2020presented a blockchain for privacy preservation in MEC systemsxxxx
[30]2020presented a framework that provides privacy preservation and is spectrum-efficientxxxxx
[31]2020proposed a framework for the IoV architecture model and an authentication protocolxxxx
Proposed in this paper.proposes conceptual framework with 5 security protocols for 5G communications
Parameters—1: privacy preservation; 2: authentication; 3: authorisation; 4: SSO;
5: key hierarchy and interface; 6: formal verification; 7: performance evaluation
Notations—: considered; and x: not considered
Table 2. Cost Description.
Table 2. Cost Description.
TermDescription
nsize of the message
m i size of the ith encryption
ecost of unitary encryption
dcost of unitary decryption
scost of unitary output
l i label in relation to the state
c i cost in relation to the label
Table 3. Metrics Variables.
Table 3. Metrics Variables.
VariableDescription
as + e
b2s + 2e
c3s + 3e
f4s + 4e
g5s + 5e
h6s + 6e
i7s + 7e
Table 4. Protocols Performance Evaluation.
Table 4. Protocols Performance Evaluation.
ProtocolsEfficiencyThroughput
5G Protocols
3GPP-5G-AKA 3 G P P P 5 G A K A 3 d d 21 s + 5 e + 5 d
SAP-AKA A 8 d 3 d 20 s + 19 e + 19 d
NS-FId B 10 d 2 d 28 s + 28 e + 28 d
DCSS C 8 d 2 d 20 s + 20 e + 20 d
5G D2D Protocols
DDSec D 7 d 4 d 27 s + 27 e + 27 d
DDAcap E 4 d 4 d 22 s + 19 e + 19 d
Table 5. Approximate Time for Cryptographic Operations.
Table 5. Approximate Time for Cryptographic Operations.
NotationDescription (Time to Compute)Rough Computation Time (ms)
T A v authentication vectors33.5
T h hash function5
T S e symmetric encryption4
T S d symmetric decryption5.5
T A e asymmetric encryption8
T A d asymmetric decryption9.5
T T n token5
T T s timestamp5
T K D F NAC/SL key12.0
T D 2 D D2D key20.0
T E execute21.5
T V verify12.5
Table 6. Cryptographic Primitive Size.
Table 6. Cryptographic Primitive Size.
PrimitiveValue
Symmetric key128 bits
Asymmetric key256 bits
SHA256256 bits
Token128 bits
Nonce128 bits
5G IDs64 bits
D2D IDs256 bits
Nonce key256 bits
D1256 bits
Strings32 bits
MAC64 bits
SQN48 bits
Timestamp16 bits
RES256 bits
Table 7. Evaluation Metrics.
Table 7. Evaluation Metrics.
ParametersValues
Throughputbits/ms
Latencyms
mmessages primitive cost
ntotal sum of m
Table 8. Computational Cost of the Protocols.
Table 8. Computational Cost of the Protocols.
ProtocolsComputational Time (ms)Total Time
(ms)(ms)
5G Protocols
SAP-AKA T E + 6 T S e + T A e + 6 T S d + T A d + 1 T A v + 13 T K D F + 6 T V 439.2
NS-FId T E + 6 T S e + 4 T A e + 6 T S d + 4 T A d + 1 T A v + 2 T K D F + 5 T h + 2 T n + 10 T V 396
DCSS T E + 8 T S e + 8 T S d + 4 T h + 2 T n + 10 T V 285
5G-AKA T E + 6 T S e + T A e + 6 T S d + T A d + 1 T A v + 8 T K D F + 2 T h + 11 T V 545.5
5G D2D Protocols
DDSec T E + 4 T S e + 3 T A e + 4 T S d + 3 T A d + 2 T K D 2 D + 7 T h + 1 T n + 2 T s + 7 T V 360.5
DDACap T E + 5 T A e + 5 T A d + 2 T K D 2 D + 7 T h + 1 T s + 8 T V 307.5
Table 9. Communicational Cost of the Protocols based on Simulation Modelling.
Table 9. Communicational Cost of the Protocols based on Simulation Modelling.
ProtocolsTotal Communication Cost (Bits) (n)Number of Messages (m)
5G Protocols
SAP-AKA31369
NS-FId547210
DCSS40968
5G-AKA589810
5G D2D Protocols
DDSec79047
DDACap57605
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Edris, E.K.K.; Aiash, M.; Loo, J. An Introduction of a Modular Framework for Securing 5G Networks and Beyond. Network 2022, 2, 419-439. https://doi.org/10.3390/network2030026

AMA Style

Edris EKK, Aiash M, Loo J. An Introduction of a Modular Framework for Securing 5G Networks and Beyond. Network. 2022; 2(3):419-439. https://doi.org/10.3390/network2030026

Chicago/Turabian Style

Edris, Ed Kamya Kiyemba, Mahdi Aiash, and Jonathan Loo. 2022. "An Introduction of a Modular Framework for Securing 5G Networks and Beyond" Network 2, no. 3: 419-439. https://doi.org/10.3390/network2030026

APA Style

Edris, E. K. K., Aiash, M., & Loo, J. (2022). An Introduction of a Modular Framework for Securing 5G Networks and Beyond. Network, 2(3), 419-439. https://doi.org/10.3390/network2030026

Article Metrics

Back to TopTop