IoT security verification framework based on 5G network slice and service method thereof

A network slicing and security verification technology, applied in the Internet of Things architecture and its services, can solve the problems of neglecting to establish secure communication, unable to meet QoS and security, and achieve the effect of ensuring anonymity and authenticity

Pending Publication Date: 2020-02-18
EDGE INTELLIGENCE RES INST NANJING CO LTD +1
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The introduction of network slicing and fog computing by 5G communication technology brings various unique advantages to customized services in IoT, but they also raise considerable issues in terms of security and privacy protection
[0003] Existing 5G network security verification mechanisms based on 5G network slice architecture generally focus on the strategy of slice selection, while ignoring the service-oriented authentication using network slices to establish secure communication between user equipment and IoT servers in 5G networks
In addition, the existing secure communication protocol is based on the machine type communication (MTC) security network certification in the 4G / LTE network architecture, which cannot meet the bandwidth, QoS and security requirements of 5G-IoT large-scale machine type communication. The security protection of network slice selection needs to be considered based on the network slice architecture

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IoT security verification framework based on 5G network slice and service method thereof
  • IoT security verification framework based on 5G network slice and service method thereof
  • IoT security verification framework based on 5G network slice and service method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings. It should be understood that the embodiments provided below are only intended to disclose the present invention in detail and completely, and fully convey the technical concept of the present invention to those skilled in the art. The present invention can also be implemented in many different forms, and does not Limited to the embodiments described herein. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention.

[0018] In order to support different IoT services in the 5G network, the present invention introduces a network slicing architecture, which realizes the separation and prioritization of resources on public infrastructure, including network functions, computing resources, virtual network functions and wireless access technology settings. 5G communication devices are divided into different n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an IoT security verification framework based on a 5G network slice and a service method thereof. Under this frame, the Internet of Things architecture comprises user equipment,an access network, a core network and an Internet of Things server, the user equipment is divided into different network slices according to different required service types and then accessed to the core network through the access network, and is connected with a data network and communicated with the Internet of Things server. A privacy protection slice selection mechanism is introduced, so thatthe fog node is allowed to select a proper network slice to carry out data forwarding, and the access service type of a user is hidden. In addition, service-oriented anonymous authentication and key agreement are realized, and the anonymity and authenticity of the user and the confidentiality of service data are ensured. Based on the framework, a user can carry out anonymous authentication on an Internet of Things server based on authorization of a 5G core network and the Internet of Things server and construct a security data channel so as to access service data cached on local fog and maintained on a remote Internet of Things server.

Description

technical field [0001] The invention relates to an Internet of Things framework and service method based on 5G network slicing that supports verification and belongs to the technical field of wireless communication. Background technique [0002] The introduction of network slicing and fog computing by 5G communication technology brings various unique advantages to customized services in IoT, but they also cause considerable problems in terms of security and privacy protection. First, both IoT services and 5G infrastructure (specific fog nodes) face serious threats to privacy, integrity, availability, and authentication, such as eavesdropping attacks, impersonation attacks, tracking attacks, and tampering attacks. Second, it is difficult to ensure that users access 5G networks and IoT services with authentic information. For example, some users will pretend to be legitimate users to access the core network and enjoy IoT services without charging. In addition, IoT service pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0861H04L9/0838H04L67/12H04L67/14H04L63/10H04L63/0407H04L63/06H04L63/08H04L67/51
Inventor 郭永安钟耀慧乔露雨张天宇朱洪波杨龙祥
Owner EDGE INTELLIGENCE RES INST NANJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products