SANS: Self-Sovereign Authentication for Network Slices

5G communications proposed significant improvements over 4G in terms of efficiency and security. Among these novelties, the 5G network slicing seems to have a prominent role: deploy multiple virtual network slices, each providing a different service with different needs and features. Like this, a Sl...

Full description

Bibliographic Details
Main Authors: Xavier Salleras, Vanesa Daza
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/8823573
id doaj-02dfa43676a949a4a64615459fcd124b
record_format Article
spelling doaj-02dfa43676a949a4a64615459fcd124b2020-12-07T09:08:22ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/88235738823573SANS: Self-Sovereign Authentication for Network SlicesXavier Salleras0Vanesa Daza1Department of Information and Communication Technologies, Universitat Pompeu Fabra, Barcelona, SpainDepartment of Information and Communication Technologies, Universitat Pompeu Fabra, Barcelona, Spain5G communications proposed significant improvements over 4G in terms of efficiency and security. Among these novelties, the 5G network slicing seems to have a prominent role: deploy multiple virtual network slices, each providing a different service with different needs and features. Like this, a Slice Operator (SO) ruling a specific slice may want to offer a service for users meeting some requirements. It is of paramount importance to provide a robust authentication protocol, able to ensure that users meet the requirements, providing at the same time a privacy-by-design architecture. This makes even more sense having a growing density of Internet of Things (IoT) devices exchanging private information over the network. In this paper, we improve the 5G network slicing authentication using a Self-Sovereign Identity (SSI) scheme: granting users full control over their data. We introduce an approach to allow a user to prove his right to access a specific service without leaking any information about him. Such an approach is SANS, a protocol that provides nonlinkable protection for any issued information, preventing an SO or an eavesdropper from tracking users’ activity and relating it to their real identities. Furthermore, our protocol is scalable and can be taken as a framework for improving related technologies in similar scenarios, like authentication in the 5G Radio Access Network (RAN) or other wireless networks and services. Such features can be achieved using cryptographic primitives called Zero-Knowledge Proofs (ZKPs). Upon implementing our solution using a state-of-the-art ZKP library and performing several experiments, we provide benchmarks demonstrating that our approach is affordable in speed and memory consumption.http://dx.doi.org/10.1155/2020/8823573
collection DOAJ
language English
format Article
sources DOAJ
author Xavier Salleras
Vanesa Daza
spellingShingle Xavier Salleras
Vanesa Daza
SANS: Self-Sovereign Authentication for Network Slices
Security and Communication Networks
author_facet Xavier Salleras
Vanesa Daza
author_sort Xavier Salleras
title SANS: Self-Sovereign Authentication for Network Slices
title_short SANS: Self-Sovereign Authentication for Network Slices
title_full SANS: Self-Sovereign Authentication for Network Slices
title_fullStr SANS: Self-Sovereign Authentication for Network Slices
title_full_unstemmed SANS: Self-Sovereign Authentication for Network Slices
title_sort sans: self-sovereign authentication for network slices
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description 5G communications proposed significant improvements over 4G in terms of efficiency and security. Among these novelties, the 5G network slicing seems to have a prominent role: deploy multiple virtual network slices, each providing a different service with different needs and features. Like this, a Slice Operator (SO) ruling a specific slice may want to offer a service for users meeting some requirements. It is of paramount importance to provide a robust authentication protocol, able to ensure that users meet the requirements, providing at the same time a privacy-by-design architecture. This makes even more sense having a growing density of Internet of Things (IoT) devices exchanging private information over the network. In this paper, we improve the 5G network slicing authentication using a Self-Sovereign Identity (SSI) scheme: granting users full control over their data. We introduce an approach to allow a user to prove his right to access a specific service without leaking any information about him. Such an approach is SANS, a protocol that provides nonlinkable protection for any issued information, preventing an SO or an eavesdropper from tracking users’ activity and relating it to their real identities. Furthermore, our protocol is scalable and can be taken as a framework for improving related technologies in similar scenarios, like authentication in the 5G Radio Access Network (RAN) or other wireless networks and services. Such features can be achieved using cryptographic primitives called Zero-Knowledge Proofs (ZKPs). Upon implementing our solution using a state-of-the-art ZKP library and performing several experiments, we provide benchmarks demonstrating that our approach is affordable in speed and memory consumption.
url http://dx.doi.org/10.1155/2020/8823573
work_keys_str_mv AT xaviersalleras sansselfsovereignauthenticationfornetworkslices
AT vanesadaza sansselfsovereignauthenticationfornetworkslices
_version_ 1715013447777779712