NR 5G Security Architecture Overview

Security Architecture Overview

Security Domain

Security Architecture Overview
Here Insert Picture Description
The figure illustrates the following security domains:

  • Network access security (I): a set of security features that enable the UE to perform authentication and secure access to services through a network, including 3GPP access and non-3GPP access, in particular to prevent attacks on the (radio) interface. It also includes access to safe delivery from SN AN context of security.
  • Safety (II) domains: a set of security features that make the network nodes capable of exchanging signaling data and user plane data safely.
  • Safety (III) user domain: the user access to a set of security protection functions of the mobile device.
  • Safety (IV) application flow field: a set of security features that make the application processes the user domain and the provider domain can securely exchange messages. Application Process Domain Security is beyond the scope of this document.
  • SBA security domain (V): a set of security features that make the network function SBA architecture capable of secure communications with other network domain serving network domain. These functions include network functionality registration, discovery and authorization security, and the protection of the interface-based services.
    And TS 33.401 [10] compared, SBA domain security is a new security feature.
  • Safety (VI) may be configured and visibility of: a set of functions, enabling a user to know whether the security function is running.
    NOTE: the figure of visibility and security configuration is not shown.

5G core network perimeter security entity

In order to protect the message sent via the interface N32, 5G system architecture introduces safety edge protection agent (SEPP is) located at a boundary of the PLMN entities:

  • Receives all messages from the network service layer function, and to protect them before they are transmitted from the network interfaces on N32
  • N32 receives all messages on the interface, and after verifying the security of which is forwarded to the appropriate network functions (if present).
    All services between two layers of information SEPP NF across two different PLMN exchanged achieve application-layer security.

5G security entity in the core network

5G 5G system architecture introduced in the core network in the following security entities:
Ausf: AU authentication server functions;
ARPF: authentication credentials repository and processing functions;
SIDF: user identifier hidden features;
SEAF: Security anchor function.

Published 44 original articles · won praise 46 · views 50000 +

Guess you like

Origin blog.csdn.net/baidu_41616132/article/details/96424364