Skip to main content

New Security Architecture of Access Control in 5G MEC

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2020)

Abstract

The currently developed 5G networks using MEC technology (5G MEC) allow for the harmonious cooperation of many areas of the economy (called the vertical industries) within an integrated information network. Providing the necessary security in such a complex configuration of business partners requires the design of consistent and effective security architecture. In this paper, we present a new concept of an access control architecture for the 5G MEC network in line with the 5G network model and MEC architecture proposed by international standardization organizations. We give an overview of the high-level security architecture of 5G MEC networks, which provides security solutions for the network’s components and establishes secure access to all cooperating entities. Next, we introduce the MEC Enabler, a new network’s module, which manages security credentials required to access resources of MEC-hosted services. We consider a series of several use cases with increasing demands on network data resources and computing power. Finally, we present a sample protocol diagram for gaining access to resources (authentication in a service using MEC technology) in our access control architecture.

This paper has been supported by The National Center for Research and Development, Poland, under Decision No. DWM/POLTAJ7/9/2020.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Minimum requirements related to technical performance for IMT-2020 radio interface(s), Report ITU-R M.2410-0, ITU (2017)

    Google Scholar 

  2. Blanco, B., et al.: Technology pillars in the architecture of future 5G mobile networks: NFV MEC and SDN. Computer Standards and Interfaces 54(4), 216–228 (2017). https://doi.org/10.1016/j.csi.2016.12.007

    Article  Google Scholar 

  3. Hu, Y.Ch., Patel, M., Sabella, D., Sprecher N., Young, V.: Mobile edge computing. A key technology towards 5G, ETSI White Paper No. 11, September 2015

    Google Scholar 

  4. Harmonizing standards for edge computing - A synergized architecture leveraging ETSI ISG MEC and 3GPP specifications, ETSI White Paper No. 36, July 2020

    Google Scholar 

  5. 5G empowering vertical industries, The white paper on vertical sectors published by the 5G Public Private Partnership (2016)

    Google Scholar 

  6. Requirements definition and analysis from vertical industries and core applications, 5G EVE. Deliverable D1.2 (2019)

    Google Scholar 

  7. Kekki, S. et al.: MEC in 5G networks, ETSI White Paper No. 28, June 2018

    Google Scholar 

  8. Ferrag, M.A., Maglaras, L., Argyriou, A., Kosmanos, D., Janicke, H.: Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101, 55–82 (2018). https://doi.org/10.1016/j.jnca.2017.10.017

    Article  Google Scholar 

  9. A guide to 5G network security. Conceptualizing security in mobile communication networks - how does 5G fit in? Ericsson AB (2018)

    Google Scholar 

  10. Han, B., Wong, S., Mannweiler, C.H., Rates Crippa, M., Schotten, H.D.: Context-awareness enhances 5G Multi-access edge computing reliability. IEEE Access 7, 21290–21299 (2019). https://doi.org/10.1109/ACCESS.2019.2898316

    Article  Google Scholar 

  11. Nife, F., Kotulski, Z., Reyad, O.: New SDN-oriented distributed network security system. Appl. Math. Inf. Sci. 12(4), 673–683 (2018). https://doi.org/10.18576/amis/120401

    Article  Google Scholar 

  12. Nife, F., Kotulski, Z.: Application-aware firewall mechanism for software defined networks. J. Netw. Syst. Manage. 28, 605–626 (2020). https://doi.org/10.1007/s10922-020-09518-z

    Article  Google Scholar 

  13. Kotulski, Z., et al.: Towards constructive approach to End-to-End slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018(2), 1–23 (2018). https://doi.org/10.1186/s13635-018-0072-0

  14. Kotulski, Z., Nowak, T., Sepczuk, M., Tunia, M.: 5G networks: types of isolation and their parameters in RAN and CN slices. Comput. Netw. 171, 107135 (2020). https://doi.org/10.1016/j.comnet.2020.107135

    Article  Google Scholar 

  15. Aikat, J., et al.: Rethinking security in the era of cloud computing. IEEE Secur. Priv. 15(3), 60–69 (2017). https://doi.org/10.1109/MSP.2017.80

    Article  Google Scholar 

  16. Kumar, R., Goyal, R.: On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput. Sci. Rev. 33, 1–48 (2019). https://doi.org/10.1016/j.cosrev.2019.05.002

    Article  MathSciNet  Google Scholar 

  17. ENISA Threat Landscape for 5G Networks. Threat assessment for the fifth-generation of mobile telecommunications networks (5G), European Union Agency for Cybersecurity, November 2019

    Google Scholar 

  18. Gong, S., Azzaoui, E.L., A., Cha, J., Park, J.H.: Secure secondary authentication framework for efficient mutual authentication on a 5G data network. Appl. Sci. 10(2), 727 (2020). https://doi.org/10.3390/app10020727

  19. Ji, X., Huang, K., Jin, L., et al.: Overview of 5G security technology, SCIENCE CHINA. Inf. Sci. 61, 081301:1–081301:25 (2018). https://doi.org/10.1007/s11432-017-9426-4

  20. Silva, E.F., Muchaluat-Saade, D.C., Castro Fernandes, N.: ACROSS: a generic framework for attribute-based access control with distributed policies for virtual organizations. Future Gener. Comput. Syst. 78(1), 1–17 (2018). https://doi.org/10.1016/j.future.2017.07.049

    Article  Google Scholar 

  21. Baltaci Akhuseyinoglu, N., Joshi, J.: A constraint and risk-aware approach to attribute-based access control for cyber-physical systems. Comput. Secur. 96, 101802 (2020). https://doi.org/10.1016/j.cose.2020.101802

    Article  Google Scholar 

  22. ISO/IEC: ISO/IEC 7498–1:1994(E) Information technology - open systems interconnection - basic reference model: the basic model (1996)

    Google Scholar 

  23. Arfaoui, G., et al.: A security architecture for 5G networks. IEEE Access 6, 22466–22479 (2018). https://doi.org/10.1109/ACCESS.2018.2827419

    Article  Google Scholar 

  24. Security architecture and procedures for 5G System (3GPP TS 33.501 version 16.3.0 Release 16), ETSI TS 133 501 V16.3.0, August 2020

    Google Scholar 

  25. Functional architecture and information flows to support Common API Framework for 3GPP Northbound APIs, 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3GPP TS 23.222 V17.1.0, July 2020

    Google Scholar 

  26. Li, C., et al.: Transparent AAA security design for low-latency MEC-integrated cellular networks. IEEE Trans. Veh. Technol. 69(3), 3231–3243 (2020). https://doi.org/10.1109/TVT.2020.2964596

    Article  Google Scholar 

  27. Doan, T.V., et al.: Reusing sub-chains of network functions to support MEC services. In: IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, pp. 1–8 (2019). https://doi.org/10.1109/ISCC47284.2019.8969699

  28. Brik, B., Frangoudis, P.A., and Ksentini, A.: Service-oriented MEC applications placement in a federated edge cloud architecture. In: IEEE International Conference on Communications (ICC), Dublin, Ireland, pp. 1–6 (2020). https://doi.org/10.1109/ICC40277.2020.9148814

  29. 5G; Procedures for the 5G System (5GS) (3GPP TS 23.502 version 16.5.0 Release 16), ETSI TS 123 502 V16.5.0, July 2020

    Google Scholar 

  30. Sabella, et al.: Developing software for multi-access edge computing, ETSI White Paper No. 20, February 2019

    Google Scholar 

  31. Jones, M., Bradley, J., Sakimura, N.: JSON Web Token (JWT), Internet Engineering Task Force, RFC 7519, May 2015. https://doi.org/10.17487/RFC7519

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zbigniew Kotulski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kotulski, Z., Niewolski, W., Nowak, T.W., Sepczuk, M. (2021). New Security Architecture of Access Control in 5G MEC. In: Thampi, S.M., Wang, G., Rawat, D.B., Ko, R., Fan, CI. (eds) Security in Computing and Communications. SSCC 2020. Communications in Computer and Information Science, vol 1364. Springer, Singapore. https://doi.org/10.1007/978-981-16-0422-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0422-5_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0421-8

  • Online ISBN: 978-981-16-0422-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics