Skip to main content

The Study on AUSF Fault Tolerance

  • Conference paper
  • First Online:
  • 888 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 47))

Abstract

In this study, we propose a fault tolerant mechanism for 5G end-device authentication, named Fault Tolerant 5G Authentication Scheme (FT5AS), in which a machine, named Mediator, is added to manage and keep track of authentication steps of end devices (UEs as the examples in the following). The purpose is that when a VM fails, other AUSFs can successfully take over its authentication tasks on UEs. Also, the FT5AS can detect this failure immediately and response properly, aiming to increase the QoS that an UE can receive from 5G networks. The second is that the VMs of each network entity are managed by VMware ESXi. If a VM fails, it can be restarted and restored autonomously. Our simulation results show that the FT5AS has better performance than that of compared scheme which is VSphere FT.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Dehnel-Wild, M., Cremers, C.: Security vulnerability in 5G-AKA draft (3GPP TS 33.501 draft v0.7.0). Department of Computer Science, University of Oxford (2018)

    Google Scholar 

  2. Informed Inside. A Comparative Introduction to 4G and 5G Authentication. WINTER 2019. https://www.cablelabs.com/insights/a-comparative-introduction-to-4g-and-5g-authentication. Accessed 23 Aug 2019

  3. Adami, D., Giordano, S., Pagano, M., et al.: Virtual machines migration in a cloud data center scenario: an experimental analysis. In: 2013 IEEE International Conference on Communications (ICC), pp. 2578–2582. IEEE (2013)

    Google Scholar 

  4. Bari, M.F., Boutaba, R., Esteves, R., et al.: Data center network virtualization: a survey. Commun. Surv. Tutor. IEEE 15(2), 909–928 (2013)

    Article  Google Scholar 

  5. GPP TS 33.501 version 15.5.0 Release 15 (2019-07) Security architecture and procedures for 5G System. https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.05.00_60/ts_133501v150500p.pdf. Accessed 2 Sept 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fang-Yie Leu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, WS., Leu, FY. (2020). The Study on AUSF Fault Tolerance. In: Barolli, L., Okada, Y., Amato, F. (eds) Advances in Internet, Data and Web Technologies. EIDWT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 47. Springer, Cham. https://doi.org/10.1007/978-3-030-39746-3_42

Download citation

Publish with us

Policies and ethics