Useful Links
Computer Science
Computer Networking
Wireless Communication
5G Cyber Security
1. Introduction to 5G Cyber Security
2. 5G System Architecture and Security Domains
3. Security of Key 5G Technologies
4. Identity, Authentication, and Authorization
5. Network Slicing Security
6. Securing 5G Use Cases
7. 5G Security Operations and Management
8. 5G Security Standards, Regulation, and Governance
Identity, Authentication, and Authorization
Subscriber Identity Management
Subscription Permanent Identifier (SUPI)
SUPI Format and Storage
Protection of SUPI in Transmission
SUPI Privacy Protection
Subscription Concealed Identifier (SUCI)
SUCI Generation and Usage
Cryptographic Protection of SUCI
Public Key Infrastructure for SUCI
Privacy Considerations for Subscriber Identity
Preventing Identity Exposure
Regulatory Compliance for Privacy
Identity Correlation Prevention
5G Authentication and Key Agreement (5G-AKA)
Mutual Authentication Process
Authentication Steps and Message Flow
Protection Against Replay Attacks
Authentication Vector Generation
Key Hierarchy and Derivation
Master Key Management
Session Key Generation and Distribution
Key Separation and Isolation
Protection Against Linkability Attacks
Use of Temporary Identifiers
Randomization Techniques
Unlinkability Mechanisms
Enhanced Authentication Features
Anti-Bidding Down Protection
Sequence Number Management
Authentication Failure Handling
Extensible Authentication Protocol (EAP) Framework
EAP-AKA Prime
Protocol Overview
Security Enhancements over EAP-AKA
Key Derivation Functions
EAP-TLS
Certificate-Based Authentication
Mutual Authentication Process
Certificate Management
EAP Method Selection
Method Negotiation
Security Considerations
Authentication of Non-3GPP Access
Trusted Non-3GPP Access Networks
Security Requirements for Trusted Access
Integration with 5G Core
Trust Establishment Procedures
Untrusted Non-3GPP Access Networks
Secure Tunneling Mechanisms
Threats from Untrusted Access Points
Security Gateway Functions
Non-3GPP Interworking Function (N3IWF)
Role and Security Functions
Secure Communication with 5G Core
IPSec Tunnel Management
Device Identity and Attestation
Device Certificate Management
Certificate Provisioning
Certificate Validation
Certificate Revocation
Hardware Security Modules
Secure Element Integration
Trusted Platform Modules
Hardware Root of Trust
Previous
3. Security of Key 5G Technologies
Go to top
Next
5. Network Slicing Security