Evaluation of EAP Usage for Authenticating Eduroam Users in 5G Networks
- URL: http://arxiv.org/abs/2402.10889v1
- Date: Fri, 16 Feb 2024 18:44:57 GMT
- Title: Evaluation of EAP Usage for Authenticating Eduroam Users in 5G Networks
- Authors: Leonardo Azalim de Oliveira, Edelberto Franco Silva,
- Abstract summary: This paper highlights key findings resulting from an analysis on the subject conducted through a test environment.
The implementation of this connectivity requires specific protocols to ensure authentication and reliability.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The fifth generation of the telecommunication networks (5G) established the service-oriented paradigm on the mobile networks. In this new context, the 5G Core component has become extremely flexible so, in addition to serving mobile networks, it can also be used to connect devices from the so-called non-3GPP networks, which contains technologies such as WiFi. The implementation of this connectivity requires specific protocols to ensure authentication and reliability. Given these characteristics and the possibility of convergence, it is necessary to carefully choose the encryption algorithms and authentication methods used by non-3GPP user equipment. In light of the above, this paper highlights key findings resulting from an analysis on the subject conducted through a test environment which could be used in the context of the Eduroam federation.
Related papers
- Advanced Penetration Testing for Enhancing 5G Security [0.0]
This paper reviews penetration testing approaches for identifying security vulnerabilities in 5G networks.
It examines ways adversaries exploit vulnerabilities in 5G networks, covering tactics and strategies targeted at 5G features.
Our research indicates that 5G penetration testing should use a multithreaded approach for addressing current security challenges.
arXiv Detail & Related papers (2024-07-24T13:35:35Z) - Penetration Testing of 5G Core Network Web Technologies [53.89039878885825]
We present the first security assessment of the 5G core from a web security perspective.
We use the STRIDE threat modeling approach to define a complete list of possible threat vectors and associated attacks.
Our analysis shows that all these cores are vulnerable to at least two of our identified attack vectors.
arXiv Detail & Related papers (2024-03-04T09:27:11Z) - 5G Network Security Practices: An Overview and Survey [0.10742675209112622]
This document provides an overview of 5G network security, describing various components of the 5G core network architecture and what kind of security services are offered by these 5G components.
It also explores the potential security risks and vulnerabilities presented by the security architecture in 5G.
arXiv Detail & Related papers (2024-01-25T17:54:45Z) - SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis [12.073927880523305]
SPEC5G is the first-ever public 5G dataset for NLP research.
The dataset contains 3,547,586 sentences with 134M words, from 13094 cellular network specifications and 13 online websites.
Our results show the value of our 5G-centric dataset in 5G protocol analysis automation.
arXiv Detail & Related papers (2023-01-22T20:59:40Z) - Deep Reinforcement Learning for Combined Coverage and Resource
Allocation in UAV-aided RAN-slicing [1.7214664783818676]
This work presents a UAV-assisted 5G network, where the aerial base stations (UAV-BS) are empowered with network slicing capabilities.
A first application of multi-agent and multi-decision deep reinforcement learning for UAV-BS in a network slicing context is introduced.
The performance of the presented strategy have been tested and compared to benchmarks, highlighting a higher percentage of satisfied users (at least 27% more) in a variety of scenarios.
arXiv Detail & Related papers (2022-11-15T06:50:00Z) - Towards Supporting Intelligence in 5G/6G Core Networks: NWDAF
Implementation and Initial Analysis [3.5573601621032935]
The work presented in this paper incorporates a functional NWDAF into a 5G network developed using open source software.
The expected limitations of 5G networks are discussed as motivation for the development of 6G networks.
arXiv Detail & Related papers (2022-05-30T14:15:46Z) - A Practical Cross-Device Federated Learning Framework over 5G Networks [47.72735882790756]
The concept of federated learning (FL) was first proposed by Google in 2016.
We propose a novel cross-device federated learning framework using anonymous communication technology and ring signature.
In addition, our scheme implements a contribution-based incentive mechanism to encourage mobile users to participate in FL.
arXiv Detail & Related papers (2022-04-18T02:31:06Z) - On Topology Optimization and Routing in Integrated Access and Backhaul
Networks: A Genetic Algorithm-based Approach [70.85399600288737]
We study the problem of topology optimization and routing in IAB networks.
We develop efficient genetic algorithm-based schemes for both IAB node placement and non-IAB backhaul link distribution.
We discuss the main challenges for enabling mesh-based IAB networks.
arXiv Detail & Related papers (2021-02-14T21:52:05Z) - To Talk or to Work: Energy Efficient Federated Learning over Mobile
Devices via the Weight Quantization and 5G Transmission Co-Design [49.95746344960136]
Federated learning (FL) is a new paradigm for large-scale learning tasks across mobile devices.
It is not clear how to establish an effective wireless network architecture to support FL over mobile devices.
We develop a wireless transmission and weight quantization co-design for energy efficient FL over heterogeneous 5G mobile devices.
arXiv Detail & Related papers (2020-12-21T01:13:44Z) - True-data Testbed for 5G/B5G Intelligent Network [46.09035008165811]
We build the world's first true-data testbed for 5G/B5G intelligent network (TTIN)
TTIN comprises 5G/B5G on-site experimental networks, data acquisition & data warehouse, and AI engine & network optimization.
This paper elaborates on the system architecture and module design of TTIN.
arXiv Detail & Related papers (2020-11-26T06:42:36Z) - A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From
Communications to Sensing and Intelligence [152.89360859658296]
5G networks need to support three typical usage scenarios, namely, enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC) and massive machine-type communications (mMTC)
On the one hand, UAVs can be leveraged as cost-effective aerial platforms to provide ground users with enhanced communication services by exploiting their high cruising altitude and controllable maneuverability in 3D space.
On the other hand, providing such communication services simultaneously for both UAV and ground users poses new challenges due to the need for ubiquitous 3D signal coverage as well as the strong air-ground network interference.
arXiv Detail & Related papers (2020-10-19T08:56:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.