Font Size: a A A

Research On Access Authentication Technology For 5G Mobile Private Network

Posted on:2022-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y SongFull Text:PDF
GTID:2518306575962179Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
5G,the abbreviation of the fifth-generation mobile communication system,it mainly supports the Internet of Everything and meet the needs of application scenarios such as e MBB,u RLLC,m MTC.It works with new information technologies such as artificial intelligence,industrial Internet,and big data to promote the fourth industrial revolution of mankind.5G mobile private network is a new type of private network for customized transformation of 5G network and equipment.It not only has the high speed,low latency and large connection of 5G network,but also has the characteristics of mobility and customization.It is universally applicable to scenarios such as station blindness compensation,emergency communications,rescue and disaster relief,and unmanned platforms.The concept and application prospects of 5G mobile private networks have been generally accepted by the industry.The 3GPP International Standards Organization is currently studying and formulating R17 5G related standards,but related security research is still in the preliminary stage.The use environment,application methods,supported users and services carried of5 G mobile private network are different from those of fixed networks.The application scenarios,security requirements and security threats it faces are also quite different from those of fixed 5G networks.This article mainly focuses on the research of terminal access authentication in special application environment of 5G mobile private network,user secondary authentication after terminal access,and D2 D security of service direct communication in terminal mobile environment.The research idea of terminal access authentication is mainly based on the 5G-AKA master authentication to make customized and lightweight improvements according to the application scenarios of the mobile private network.The research idea of secondary authentication is mainly based on 3GPP related standards,and it can be quickly realized under the mobile private network combined with the main authentication.The research of terminal pass-through authentication is still in the stage of LTE network based on the Pro Se.This thesis proposes an authentication and key agreement mechanism.The research work of this thesis mainly includes the following aspects:1.According to the deficiencies of 5G network infrastructure in solving special occasions,the concept and concept of 5G mobile private network are described,and the application scenarios and network deployment diagrams of the 5G mobile private network are proposed.Then,referring to the 5G system architecture of the 3GPP standard,the network architecture of the 5G mobile private network is proposed.2.Refer to the main authentication protocol process and secondary authentication protocol process of 5G-AKA and EAP-AKA' of the 3GPP 5G access authentication standard,and combine the application scenarios and network characteristics of the 5G mobile private network and the security architecture of the terminal access to the core network.Proposed a lightweight primary authentication and a secondary authentication technology suitable for 5G mobile private networks,and conducted a security analysis;3.Analyze the security requirements and application scenarios of 5G mobile private network D2 D communication technology,based on 5G-AKA identity registration and DH key exchange methods,propose a D2 D identity authentication and key agreement protocol suitable for mobile application scenarios,and finally do security analysis and security certification based on BAN logic on the D2 D authentication protocol;4.Design the lightweight primary certification and secondary certification simulation test verification program,build a simulation test platform,and do simulation tests on the lightweight primary certification and secondary certification technology proposed in this thesis to verify its safety performance.
Keywords/Search Tags:5G, Mobile Private Network, Access Authentication, Secondary Authentication, D2D Authentication, Key Agreement
PDF Full Text Request
Related items