5G NR Security
Article by Abhijeet Kumar
Introduction to 5G Security
The advent of 5G technology heralds a transformative era for digital communications, offering unprecedented speeds and connectivity for a wide array of devices and services. However, integrating new IT technologies and architectures also brings complex cybersecurity challenges. 5G's architecture not only supports enhanced mobile broadband (eMBB) but also massive machine-type communications (mMTC) and ultra-reliable low-latency communications (URLLC), each with unique security needs.
Securing 5G: Navigating New Cybersecurity Terrain
Key Security Challenges in 5G
Strategies for Enhancing 5G Security
Components of the 5G Security Architecture
User Equipment (UE)
AMF (Access and Mobility Management Function)
AUSF (Authentication Server Function)
UDM (Unified Data Management)
Security Protocols and Authentication Mechanisms
Key Factors in 5G Security Checks
Security Edge with Network Slicing
4G & 5G Key Architecture.
Understanding 5G Authentication Methods
1. EAP-AKA' (Enhanced Authentication Protocol - Authentication and Key Agreement Prime)
Practical Example: A mobile operator might deploy EAP-AKA' to secure a Wi-Fi calling service, allowing seamless and secure authentication when users switch between LTE and Wi-Fi networks. This scenario is common in urban settings where indoor cellular coverage might be poor, and Wi-Fi networks provide a better connection. By using EAP-AKA', the network ensures that authentication is robust and adheres to the security standards required for voice and data services transmitted over public or private Wi-Fi.
2. 5G AKA (5th Generation Authentication and Key Agreement)
Practical Example: Consider an international traveler roaming with their 5G-enabled smartphone. When the UE attempts to connect to the roaming partner's network, 5G AKA ensures that the authentication process is securely managed through the home network's AMF and AUSF, preventing the possibility of the roaming partner spoofing the home network. This mechanism is particularly critical in ensuring that roaming agreements and security protocols are adhered to, protecting the user's data from unauthorized access or fraud during international travel.
Choosing the Right Authentication Method
Carriers must select the appropriate authentication method based on a variety of factors:
Understanding the 4G and 5G Key Architectures
The image you provided illustrates the key architecture differences between 4G and 5G networks. Let’s break down each architecture and understand the specific enhancements that make 5G security superior to 4G.
4G Key Architecture
Key Derivation:
K: The master key stored in the Authentication Center (AuC) and the USIM.
CK, IK: Ciphering Key and Integrity Key derived from K and used for encryption and integrity protection of signaling.
K_ASME: Key derived from CK and IK used by the Mobility Management Entity (MME) to derive NAS (Non-Access Stratum) keys.
Recommended by LinkedIn
Authentication and Key Management:
HSS (Home Subscriber Server): Manages authentication vectors and subscriber information.
MME: Manages NAS signaling security using keys K_NASint and K_NASenc.
eNodeB: Manages radio signaling and user plane security with keys derived from K_ASME.
Security Keys:
KeNB, NH: Keys derived from K_ASME used for radio resource control (RRC) and user plane encryption (UP).
KRRCint, KRRCenc, KUPenc: Derived keys for integrity and encryption of RRC and UP messages.
5G Key Architecture
Key Derivation:
K: The master key stored in the Unified Data Management (UDM) and the USIM.
CK, IK: Ciphering and Integrity Keys, similar to 4G, but with enhanced management.
K_AUSF: Derived by the AUSF for secure authentication.
K_SEAF: Derived by the SEAF (Security Anchor Function) for anchoring security between AMF (Access and Mobility Management Function) and UE.
K_AMF: Specific to the AMF, derived from K_SEAF for NAS signaling protection.
Authentication and Key Management:
UDM: Stores subscriber root keys and handles authentication data.
AUSF: Manages authentication processes and derives K_AUSF.
AMF: Derives K_AMF from K_SEAF and manages NAS signaling security.
Security Keys:
K_N3IWF: Used for untrusted non-3GPP access.
KgNB, NH: Keys used for securing gNodeB communications.
KRRCint, KRRCenc, KUPint, KUPenc: Derived keys for integrity and encryption of RRC and user plane messages, respectively.
Differences from 4G Security and Improvements in 5G Security
Unified Security Framework:
4G: Uses different authentication methods for 3GPP and non-3GPP accesses.
5G: Employs a unified framework that supports both 3GPP and non-3GPP accesses, simplifying security management and reducing potential vulnerabilities.
Enhanced Authentication Protocols:
EAP-AKA': Enhanced Authentication and Key Agreement protocol for non-3GPP access, providing better integration and security.
5G AKA: An improved version of EPS AKA with added home network authentication confirmation to prevent spoofing attacks during roaming.
Advanced Key Management:
Dynamic Key Derivation: 5G dynamically derives keys at multiple levels (e.g., K_SEAF, K_AMF) to isolate different security domains and prevent key reuse.
Session-Specific Keys: Unique keys for each session and service (e.g., KUPint, KUPenc) enhance security granularity and minimize the impact of key compromise.
Improved Privacy Protection:
SUCI: Subscription Concealed Identifier used to protect subscriber identity over the air, preventing tracking and eavesdropping.
How 5G Security Works: Algorithms and Processes
Initial Authentication:
UE Initialization: The UE generates a Subscription Concealed Identifier (SUCI) and sends it to the network.
AMF and AUSF Interaction: The AMF receives the SUCI, retrieves subscriber data from the UDM, and coordinates with the AUSF for authentication.
Key Derivation and Distribution:
K_AUSF Generation: AUSF derives K_AUSF from the master key K.
K_SEAF Derivation: SEAF uses K_AUSF to derive K_SEAF.
K_AMF Derivation: AMF derives K_AMF from K_SEAF, providing a session-specific key for NAS signaling.
Service-Specific Security:
Radio Access Security: gNodeB uses KgNB and NH keys for RRC and user plane encryption and integrity.
Non-3GPP Access: K_N3IWF secures untrusted non-3GPP access points.
Ongoing Security Maintenance:
Key Refresh and Rotation: Regularly updates keys to prevent long-term usage vulnerabilities.
Re-authentication Procedures: Periodically re-authenticates UE to ensure continuous security.
Individual Contributor, Sales Eng, Network Architect - Retired Available for Select Challenges Security, IoT, RF 5G, VoIP, Optical
5moLot of valuable information in the article
Telecommunication, RF, Measurement, Signal Processing expert
5moWhy publishing this new article, since there was another, by the same author on the same topic, published recently ?