Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (1): 95-105.doi: 10.11959/j.issn.2096-109x.2022006

• Research and Development • Previous Articles     Next Articles

Research on network slicing security for 5G mMTC

Zijun XU1, Jianwei LIU1, Geng LI1,2   

  1. 1 School of Cyber Science and Technology, Beihang University, Beijing 100191, China
    2 National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China
  • Revised:2021-07-08 Online:2022-02-15 Published:2022-02-01
  • Supported by:
    The National Key R&D Program of China(2017YFB1400702);The Natural Science Foundation of China(61932014);The Natural Science Foundation of China(61972018)

Abstract:

With the emergence of new 5G business, architecture and technology, more and more researchers pay attention to security issues and potential security risks.Massive machine type communication is one of the three major application scenarios of 5G.It provides high performance such as large connection and low power consumption.Due to factors such as limited resources of MTC equipment, it may also weaken the security of 5G networks.At the same time, different scenarios and applications have obvious demands for network performance, service quality and security level.The flexibility of 5G networking is realized by network slicing technology.It meets the diversity and customization of 5G network services, but also brings new security threats.5G commercial rapid development.The number of IoT devices has increased exponentially.In order to ensure that 5G networks provide more efficient and safe on-demand services, it is particularly important to study the security mechanism and strategy of network slicing for 5G mMTC application scenarios.Therefore, the characteristics and security requirements of 5G mMTC were analyzed.The main security threats of network slicing were listed.In view of the above security requirements and threats, the contribution and deficiency of existing security schemes around the aspects of specific network slice authentication, slice security isolation, security management and arrangement were summarized and expounded.And the future research in this field was prospected.A SM2-based secondary authentication and security isolation model for 5G mMTC network slicing was proposed.This model framework meeted the efficiency of large-scale authentication for 5G devices and users by introducing batch authentication and pre-authentication mechanisms.By hierarchical encryption of different communication data, the security isolation between 5G mMTC network slices was realized.The performance and security of the model were also analyzed.

Key words: network slicing, 5G mMTC, safe isolation, access authentication

CLC Number: 

No Suggested Reading articles found!