Skip to main content
Log in

A Fault Tolerant Mechanism for UE Authentication in 5G Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Generally, the 5th Generation (5G) network will be soon available in the near future. It will be one with the feature that some of its network functions are handled by Virtual Machines (VMs), rather than by a dedicated one (like that in the 4th generation (4G) networks). Basically, VMs of a specific network function are managed by their own Software Defined Networking (SDN) Controller, which makes the management and operation of these VMs and OpenvSwitches become easier. On the other hand, the connection between Internet of Things (IoT) devices and a network is often intermittent. Consequently, Authentication Server Function (AUSF) has to frequently authenticate these devices. This is also one of the reasons why a 5G network will prepare an AUSF Pool to distribute its authentication burden, particularly when a huge number of user equipment (UEs) and IoT devices are connected to it. Next, when a VM fails, how do other AUSFs take over for the failed to continue the authentication tasks? This is not completely defined in 5G specifications. In this study, we propose a fault tolerant mechanism for 5G end-device authentication, named Fault Tolerant 5G Authentication Scheme (FT5AS), in which a machine, named Mediator, is added to manage and keep track of authentication steps for end devices. The purpose is that when a VM fails, other AUSFs can successfully take over its authentication tasks on UEs. Also, the FT5AS can detect this failure immediately and react properly, aiming to increase the Quality of Service (QoS) that an UE can receive from 5G networks. Our simulation results indicate that the FT5AS is feasible and its performance is not lower than that of tested schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

References

  1. Ericsson Mobility Report. https://www.ericsson.com/assets/local/mobility-report/documents/2017/ericsson-mobility-report-june-2017.pdf. Accessed on 1 Aug 2019

  2. Leu FY, You I, Huang YL, Yim K, Dai CR (2012) Improving security level of LTE authentication and key agreement procedure. IEEE Globecom Workshops:1032–1036

  3. Nguyen VG, Do XT, Kim YH (2016) SDN and virtualization-based LTE mobile network architectures: a comprehensive survey. Wirel Pers Commun 86(3):1401–1438

    Article  Google Scholar 

  4. Nguyen VG, Kim YH (2015) Proposal and evaluation of sdn-based mobile packet core networks. EURASIP J Wirel Commun Netw 2015:272

    Google Scholar 

  5. Chen LM (2018) SDN environment deployment and OpenDaylight getting start. Tsinghua University Press, Beijing (in Chinese)

    Google Scholar 

  6. Li Y, Chen M (2015) Software-defined network function virtualization: a survey. IEEE Access 3:2542–2553

    Article  Google Scholar 

  7. 3GPP TS 33.501 version 15.5.0 Release 15 (2019–07). Security architecture and procedures for 5G System. https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.05.00_60/ts_133501v150500p.pdf. Accessed on 2 Sept 2019

  8. Leu FY, Ku CY (2018) The study of MME pool management and fault tolerance in 5G networks with SDN controllers. In: The 12th international conference on innovative mobile and internet services in ubiquitous computing, pp 585–595

    Google Scholar 

  9. Chen WS, Leu FY, Susanto H (2019) System Implementation of AUSF Fault Tolerance. the International Conference on Broad-Band Wireless Computing, Communication and Applications, 678-687

  10. Cisco, Load Balance MME in Pool: https://www.cisco.com/c/en/us/support/docs/wireless/mme-mobility-management-entity/119021-config-mme-00.html

  11. Aujla GS, Chaudhary R, Kumar N, Rodriques JJ, VinelM A (2017) Data offloading in 5G-enabled software-defined vehicular networks: a stackelberg game-based approach. IEEE Commun Mag 55(8):100–108

    Article  Google Scholar 

  12. Yuan B, Qian W, Qi-lan J, Hui-bing H (2015) An efficient and secured AKA for EPS networks. J Beijing Univ Posts Telecommun 3(8):10–14 (in Chinese)

    Google Scholar 

  13. Garzon JP, Ramos-Munoz JJ, Ameigeiras P, Maldonado PA, Lopez-Soler JM (2016) Latency evaluation of a virtualized MME. In: IEEE Wireless Days, pp 1–3

    Google Scholar 

  14. Tanabe K, Nakayama H, Hayashi T, Yamaoka K (2017) A study on resource granularity of vEPC optimal resource assignment. In: IEEE IWQoS, pp 1–2

    Google Scholar 

  15. Hu KC (2016) The study of OpenFlow protocol: detailed comparison mechanism in flow table [Online] (in Chinese): http://www.netadmin.com.tw/article_content.aspx?sn=1610070003. Access 21 Oct 2016

  16. Wang HC, Lin ID (2016) Comparison on two SDNs: ONOS vs OpenDayLight. CIS. National ChiaoTung University Hsin-Chu, Sep 23, 2016. (in Chinese)

  17. OpenDaylight wiki (2019) https://wiki.opendaylight.org/view/Main_Page. Access 1 June 2019

  18. OpenDaylight Tutorial (2019) https://www.opendaylight.org/technical-community/getting-started-for-developers/tutorials. Access 25 May 2019

  19. OpenDaylight Application Developer’s tutorial, SDN Hub (2019) http://sdnhub.org/tutorials/opendaylight/. Access 25 May 2019

  20. Dehnel-Wild M, Cremers C (2018) Security vulnerability in 5G-AKA draft (3GPP TS 33.501 draft v0.7.0). Department of Computer Science, University of Oxford

  21. Informed Inside A comparative introduction to 4G and 5G authentication. WINTER 2019. https://www.cablelabs.com/insights/a-comparative-introduction-to-4g-and-5g-authentication. Accessed on 23 August 2019

  22. Open EPC – Evolved Packet Core (vEPC) by Core Network Dynamics (2009) https://www.openepc.com/

  23. OAI/OpenAirInterface 5G GitLab (2019) https://gitlab.eurecom.fr/oai/openairinterface5g. Access 28 May

  24. Arkko J (2017) Service-based architecture in 5G. https://www.ericsson.com/en/blog/2017/9/service-based-architecture-in-5g. Accessed on 30 Aug 2019

  25. OpenDaylight Openflow Manager (OFM) App. (2014) [Online]: https://d1nmyq4gcgsfi5.cloudfront.net/site/devnetcreations/openflow-mgr/. Accessed on 23 Aug 2019

  26. The Open vSwitch Database Management Protocol. RFC 7047 (2019) https://tools.ietf.org/html/rfc7047. Accessed on 2 Sept 2019

  27. mysql command (linux and windows) (2019, in Chinese): http://registerboy.pixnet.net/blog/post/21684093-mysql%E5%91%BD%E4%BB%A4%E8%A1%8C%E7%9A%84%E5%9F%BA%E6%9C%AC%E7%94%A8%E6%B3%95%28%E9%80%9A%E7%94%A8linux%E5%92%8Cwindows%29. Access 24 May 2019

  28. MySQL :: MySQL Documentation (2019): https://dev.mysql.com/doc/. Access 23 May 2019

  29. OpenFlow Switch Specification (version 1.3.0). Open Networking Foundation (ONF). (2019): http://www.cs.yale.edu/homes/yu-minlan/teach/csci599-fall12/papers/openflow-spec-v1.3.0.pdf. Accessed on 3 Sept 2019

  30. OpenFlow Switch Specification (version 1.3.1). Open Networking Foundation (ONF). Sep. 2012: https://www.opennetworking.org/wp-content/uploads/2013/04/openflow-spec-v1.3.1.pdf. Accessed 23 Aug 2019

  31. Choudhary G, Kim J, Sharma V (2018) Security of 5G-mobile backhaul networks: a survey. J Wirel Mob Netw Ubiquitous Comput Dep Appl 9(4):41–70. https://doi.org/10.22667/JOWUA.2018.12.31.041

    Article  Google Scholar 

  32. Tsai KL, Huang YL, Leu FY, You I, Huang YL, Tsai CH (2018) AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE ACCESS 6(1):45325–45334

    Article  Google Scholar 

  33. Eslami Z, Noroozi M, Baek J (2019) On the security of a privacy-preserving ranked multi-keyword search scheme. J Wirel Mob Netw Ubiquitous Comput Dep Appl 10(1):75–85. https://doi.org/10.22667/JOWUA.2019.03.31.075

    Article  Google Scholar 

  34. Joosten AR, Nieuwenhuis LJM (2017) Comparing alternatives to measure the impact of DDoS attack announcements on target stock prices. 8(4):1–18. https://doi.org/10.22667/JOWUA.2017.12.31.00

Download references

Acknowledgements

This study is partially supported by Ministry of Science and Technology under the grant of MOST 107-2221-E-029-010- as well as the Soonchunhyang University Research Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ilsun You.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Leu, FY., Tsai, KL., Susanto, H. et al. A Fault Tolerant Mechanism for UE Authentication in 5G Networks. Mobile Netw Appl 26, 1650–1667 (2021). https://doi.org/10.1007/s11036-019-01502-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01502-5

Keywords

Navigation