论文标题

SANS:网络切片的自我主张身份验证

SANS: Self-sovereign Authentication for Network Slices

论文作者

Salleras, Xavier, Daza, Vanesa

论文摘要

5G通信在效率和安全性方面提出了对4G的重大改进。在这些新颖性中,5G网络切片似乎具有重要的作用:部署多个虚拟网络切片,每个切片都提供不同的服务以及不同的需求和功能。这样,裁定特定切片的切片操作员(因此)可能希望为满足某些要求的用户提供服务。提供强大的身份验证协议,能够确保用户满足要求,但同时提供隐私划分的架构,这一点至关重要。这更有意义,具有越来越多的物联网(IoT)设备通过网络交换私人信息的设备。在本文中,我们使用自称身份(SSI)方案改进5G网络切片认证:授予用户对其数据的完全控制。我们介绍了一种方法,以允许用户证明其访问特定服务的权利而无需泄露有关他的任何信息。这种方法是SANS,该协议可为任何已发行的信息提供不可链接的保护,从而阻止SO或Evesdropper跟踪用户的活动并将其与其真实身份联系起来。此外,我们的协议是可扩展的,可以作为改进相似方案中相关技术的框架,例如5G无线电访问网络(RAN)或其他无线网络和服务中的身份验证。可以使用称为零知识证明(ZKP)的加密原语(ZKP)来实现此类功能。在使用最先进的ZKP库实施解决方案并执行多个实验后,我们提供了基准测试,以表明我们的方法在速度和内存消耗方面负担得起。

5G communications proposed significant improvements over 4G in terms of efficiency and security. Among these novelties, the 5G Network Slicing seems to have a prominent role: deploy multiple virtual network slices, each providing a different service with different needs and features. Like this, a Slice Operator (SO) ruling a specific slice may want to offer a service for users meeting some requirements. It is of paramount importance to provide a robust authentication protocol, able to ensure that users meet the requirements, but providing at the same time a privacy-by-design architecture. This makes even more sense having a growing density of Internet of Things (IoT) devices exchanging private information over the network. In this paper, we improve the 5G network slicing authentication using a Self-Sovereign Identity (SSI) scheme: granting users full control over their data. We introduce an approach to allow a user to prove his right to access a specific service without leaking any information about him. Such an approach is SANS, a protocol that provides non-linkable protection for any issued information, preventing an SO or an eavesdropper from tracking users' activity and relating it with their real identities. Furthermore, our protocol is scalable and can be taken as a framework for improving related technologies in similar scenarios, like authentication in the 5G Radio Access Network (RAN) or other wireless networks and services. Such features can be achieved using cryptographic primitives called Zero-Knowledge Proofs (ZKP). Upon implementing our solution using a state-of-the-art ZKP library and performing several experiments, we provide benchmarks demonstrating that our approach is affordable in speed and memory consumption.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源