5G Security
5G Security
Abstract
5G is the next generation of mobile communication systems. As it is being finalized, the
specification is stable enough to allow giving an overview. This paper presents the security
aspects of the 5G system specified by the 3 rd Generation Partnership Project (3GPP),
especially highlighting the differences to the 4G (LTE) system. The most important 5G
security enhancements are access agnostic primary authentication with home control,
security key establishment and management, security for mobility, service based
architecture security, inter-network security, privacy and security for services provided
over 5G with secondary authentication.
Keywords
LTE
5G
5G Core
NR
Authentication
Services
Security
Privacy
1 Introduction
The 5G system is an evolution of the 4G mobile communication system, i.e. System
Architecture Evolution/Long Term Evolution (SAE/LTE). Accordingly, the 5G security
architecture has been designed to integrate 4G equivalent security into the 5G system. In
addition, reassessment of other security threats such as attacks on radio interfaces,
signalling plane, user plane, masquerading, privacy, replay, bidding down, man-in-the-
middle, service based interfaces (SBI), and inter-operator network security have led to
integration of further security mechanisms. This paper gives an overview of the security in
phase 1, also called release 15 in 3GPP, and highlights the security features and security
mechanisms offered by the 5G system, and the security procedures performed within the
5G System including the 5G Core (5GC) and the 5G new radio (NR), i.e. the 5G radio
interface.
The paper starts by laying out the underlying trust models in 5G system considering
roaming and non-roaming cases in Section 2 along with a brief summary on 5G key
hierarchy. The enhancements in authentication and privacy are dealt with in Section 3.
Section 4 discusses the multiple registration scenarios of User Equipment (UE) considering
different cases such as same Public Land Mobile Network (PLMN) and different PLMN
scenarios. The mobility procedures and intra-/inter-network security are discussed in
Sections 5 and 6 respectively. The role of secondary authentication in services security is
briefed in Section 7. Section 8 discusses the security aspects of network interconnects and
Section 9 elaborates the migration and interworking security. Finally the paper is
concluded in Section 10.
3.1 Overview
Access to the network requires subscriber authentication, which is done by primary
authentication mechanism in 5G system. So that the network can identify the subscriber,
the UE has to send the subscription permanent identifier (SUPI in 5G). This permanent
subscription identifier was sent in clear until 4G leading to various privacy related attacks.
In 5G privacy is achieved, even before authentication and key agreement, by encrypting
the SUPI before transmitting using a HN public key which is stored in the USIM. Although
specified, privacy enablement is under the control of the home network of the subscriber.
Privacy in 5G is elaborated in Section 3.2. Up to 4G, the home network had to trust the
visited network through which the authentication took place. Subsequent procedures such
as location updates or submission of Customer Data Records (CDRs) would need to be
taken at face value. This lead to fraud cases impacting operator’s revenue. Another case is
the fraudulent registration attempt by an attacker to register the subscriber’s serving AMF
in UDM when UE is not present in the serving AMF. To resolve these issues, in 5G the
concept of increased home control was introduced, where the home network receives proof
of UE participation in a successful authentication.
3.2 Privacy
The subscription identifier SUPI, see Figure 4, contains sensitive subscriber as well as
subscription information thus it should not be transferred in clear text except for parts
necessary for proper functioning of the system, i.e. routing information in the form of
Mobile Country Code (MCC) and Mobile Network Code (MNC). As explained in 3.1, the
subscriber privacy enablement is under the control of the home network of the subscriber.
Note that in case of unauthenticated emergency calls, privacy protection is not required.
So as to provide privacy the UE generates and transmits the Subscription Concealed
Identifier (SUCI1) using a protection scheme, i.e. one of the Elliptic Curve Integrated
Encryption Scheme (ECIES) profiles, with the public key that was securely provisioned in
control of the home network.
The UE constructs the SUCI from the protection scheme identifier, the home network
public key identifier, the home network identifier and the protection scheme-output that
represents the output of a public key protection scheme. The SUCI will contain routing
information in the clear, which is the mobile network and mobile country code of the home
network, as well as potentially some routing information within the home network, where
the home network is so large that it needs to be segmented. At the home network de-
conealment of the SUPI from SUCI is done by the Subscription Identifier De-concealing
Function (SIDF) that is located at the ARPF/UDM. To meet the LI requirements along with
privacy, binding of SUPI to the derivation of the KAMF is done.
4 Multiple Registrations
5 Mobility
Depending on an operator’s security requirements, the operator can decide whether to
have Xn or N2 handovers for a particular gNB according to the security characteristics of a
particular gNB. Where Xn handover is handover over Xn interface without involvement of
AMF and N2 handover involves the AMF. The 5G mobility scenarios are depicted in Figure 7
is briefed as follows.
9 Interworking Security
Since ubiquitous coverage of 5G will not be available from day-one, it is essential to
provide 4G to 5G interworking solutions that give a migration path to stand-alone 5G
network. There are two cases of interworking we discuss in this Section 1 Non-Stand Alone
(NSA) case, this is discussed in detail here and 2 case where 5G stand-alone and 4G
networks are connected to each other and UE moves between the networks, this case is
briefly discussed.
10 Near Future
NSA and 5G Phase-1 gives us a taste of the new generation with mobile broadband. The
next step will be solutions for IoT covering several scenarios in the form of massive
Machine Type Communication (mMTC) and Ultra-Reliable and Low Latency
Communications (URLLC). Where mMTC relates to very large number of devices
transmitting a relatively low volume of non-delay-sensitive data and URLLC relates to
services with stringent requirements for capabilities such as throughput, latency and
availability.
For (mMTC) very low data-rates, going down to few bits per day, we will have to consider
the extent of security (be it authentication, confidentiality, integrity or otherwise) that can
be provisioned. Several IoT or Machine-to-Machine (M2M) services and devices fall under
this category, examples are temperature sensors giving hourly updates, sensors on farm
animals giving vital signature couple of times a day etc. Such devices will also be resource
constrained in terms of battery, computation and memory. This brings us to several
requirements on security like complete security related message sequence, e.g.
authentication, should not run for every communication and even when run, they should
be performed with minimum payload and round-trip. Other requirement will be to reduce
security related bits, e.g. integrity, for every communication. Security and cryptographic
algorithms must be energy efficient and optimized to work for resource constrained
devices.
On the other end (URLLC) are high data-rate devices with potentially higher battery and
computational resources; examples include cars, Industrial IoT (IIoT) devices like
machineries in factories and virtual or augmented reality (VR or AR) devices used for
gaming or real-time services. Provisioning of higher data rates also means that complexity
of security functions should be considered to avoid processing delay. At the same time,
higher data rates are provisioned by decreasing the overhead bits in radio interface that in
turn has implications on bits that can be budgeted for security.
11 Conclusion
Overview of 5G Phase-1 security requirements and solutions is presented in this paper.
Major differences from 4G security are the trust model, key hierarchy, security for inter-
operator network, privacy and service based architecture security. Current specification
supports security for 4G to 5G migration and interworking with 4G. The 5G phase 2
specifications will provide enhanced security for scenarios covered by mMTC and URLLC.
References
[1] 3GPP TS 33.401, “Technical Specification Group Services and System Aspects: 3GPP
System Architecture Evolution (SAE) Security architecture”, Release 15, v 15.3.0, March
2018.
[2] 3GPP TS 33.501, “Security architecture and procedures for 5G system”, Release 15, v
15.0.0, March 2018.
[3] 3GPP TS 24.501, “Non-Access-Stratum (NAS) protocol for 5G System (5GS)”, Release
15, v 1.0.0, March 2018.
[4] 3GPP TS 38.331, “NR-Radio Resource Control (RRC) protocol specification”, Release
15, v 15.0.0, March 2018.
[5] 3GPP TS 38.470, “NG-RAN: F1 general aspects and principles”, Release 15, v 15.0.0,
March 2018.
[6] 3GPP TS 38.472, “NG-RAN: F1 signalling transport”, Release 15, v 15.0.0, December
2017.
[7] 3GPP TS 36.300, “Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved
Universal Terrestrial Radio Access Network (E-UTRAN) - Overall description”, Release 15, v
15.0.0, March 2018.
[8] 3GPP TS 33.102, “3G Security - Security architecture”, Release 14, v 14.1.0, March
2017.
[9] RFC 5448, “Improved Extensible Authentication Protocol Method for 3rd Generation
Authentication and Key Agreement (EAP-AKA’)”, Nokia, May 2009.
[10] 3GPP TS 23.502, “Procedures for the 5G System”, Release 15, v 15.1.0, March 2018.
[11] 3GPP TS 33.210, “3G security; Network Domain Security (NDS); IP network layer
security”, Release 14, v 14.0.0, December 2016.
[12] RFC-7296, “Internet Key Exchange Protocol Version 2 (IKEv2)”.
[13] RFC-7321: “Cryptographic Algorithm Implementation Requirements and Usage
Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)”.
[14] RFC-3748: “Extensible Authentication Protocol (EAP)”.
[15] NEC White paper, “Making 5G a Reality”, 2018,
https://www.nec.com/en/global/solutions/nsp/5g_vision/doc/wp2018ar.pdf.
[16] Tobias Engel. (December 2014). “SS7: Locate. Track. Manipulate”,
http://berlin.ccc.de/∼tobias/31c3-ss7-locate-track-manipulate.pdf
[17] GSMA RIFS: “Diameter Roaming Security – Proposed Permanent Reference
Document”.
[18] 3GPP TS 33.899, “Study on the security aspects of the next generation system”,
Release 14, v 1.3.0, August 2017.
[19] Anand R. Prasad and Seung-Woo Seo, Security in Next Generation Mobile Networks:
SAE/LTE and WiMAX, River Publishers, September 2011.