Beyond Certificates: 6G-ready Access Control for the Service-Based Architecture with Decentralized Identifiers and Verifiable Credentials (2310.19366v3)
Abstract: Next generation mobile networks are poised to transition from monolithic structures owned and operated by single mobile network operators into multi-stakeholder networks where various parties contribute with infrastructure, resources, and services. However, a federation of networks and services brings along a crucial challenge: Guaranteeing secure and trustworthy access control among network entities of different administrative domains. This paper introduces a novel technical concept and a prototype, outlining and implementing a 5G Service-Based Architecture that utilizes Decentralized Identifiers and Verifiable Credentials instead of traditional X.509 certificates and OAuth2.0 access tokens to authenticate and authorize network functions among each other across administrative domains. This decentralized approach to identity and permission management for network functions reduces the risk of single points of failure associated with centralized public key infrastructures. It unifies access control mechanisms and lays the groundwork for lesser complex and more trustful cross-domain key management for highly collaborative network functions in a multi-party Service-Based Architecture of 6G.
- X. An, J. Wu, W. Tong, P. Zhu, and Y. Chen, “6G Network Architecture Vision,” in 2021 Joint European Conf. on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2021, pp. 592–597.
- GSM Association (GSMA), “Key Management for 4G and 5G inter-PLMN Security,” accessed: 2024-01-25. [Online]. Available: https://www.gsma.com/security/resources/fs-34-key-management-for-4g-and-5g-inter-plmn-security/
- J. Won, A. Singla, E. Bertino, and G. Bollella, “Decentralized Public Key Infrastructure for Internet-of-Things,” in IEEE Military Communications Conf. (MILCOM), 2018, pp. 907–913.
- World Wide Web Consortium (W3C), “Decentralized Identifiers v1.0,” https://www.w3.org/TR/did-core/, accessed: 2024-01-25.
- ——, “Verifiable Credentials Data Model v2.0,” https://www.w3.org/TR/vc-data-model-2.0/, accessed: 2024-01-25.
- M. Sabadello, K. D. Hartog, C. Lundkvist, C. Franz, A. Elias, A. Hughes, J. Jordan, and D. Zagidulin, “Introduction to DID Auth,” Tech. Rep., 07 2018.
- Z. A. Lux, D. Thatmann, S. Zickau, and F. Beierle, “Distributed-Ledger-based Authentication with Decentralized Identifiers and Verifiable Credentials,” in 2020 2nd Conf. on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 2020, pp. 71–78.
- H. Yildiz, C. Ritter, L. T. Nguyen, B. Frech, M. M. Martinez, and A. Küpper, “Connecting Self-Sovereign Identity with Federated and User-centric Identities via SAML Integration,” in IEEE Symposium on Computers and Communications (ISCC), 2021, pp. 1–7.
- R. Belchior, B. Putz, G. Pernul, M. Correia, A. Vasconcelos, and S. Guerreiro, “SSIBAC: Self-Sovereign Identity Based Access Control,” in IEEE 19th Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020, pp. 1935–1943.
- D. Lagutin, Y. Kortesniemi, N. Fotiou, and V. A. Siris, “Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation,” in Proc. of the Workshop on Decentralized IoT Systems and Security (DISS 2019), vol. 24, 2019.
- E. Jung, “A Decentralized Access Control Model for IoT with DID,” in IT Convergence and Security, H. Kim and K. J. Kim, Eds. Singapore: Springer Singapore, 2021, pp. 141–148.
- H. Saidi, N. Labraoui, A. A. A. Ari, L. A. Maglaras, and J. H. M. Emati, “DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data,” IEEE Access, vol. 10, pp. 101 011–101 028, 2022.
- K. Yue, Y. Zhang, Y. Chen, Y. Li, L. Zhao, C. Rong, and L. Chen, “A Survey of Decentralizing Applications via Blockchain: The 5G and Beyond Perspective,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2191–2217, 2021.
- J. Xu, K. Xue, H. Tian, J. Hong, D. S. L. Wei, and P. Hong, “An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks,” IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp. 6688–6698, 2020.
- Z. Haddad, M. M. Fouda, M. Mahmoud, and M. Abdallah, “Blockchain-based Authentication for 5G Networks,” in IEEE Int. Conf. on Informatics, IoT, and Enabling Technologies (ICIoT), 2020, pp. 189–194.
- “View on 5G Architecture,” https://5g-ppp.eu/wp-content/uploads/2021/11/Architecture-WP-V4.0-final.pdf, 5G PPP Architecture Working Group, Tech. Rep., 2021, accessed: 2024-01-25.
- S. Rodriguez Garzon, H. Yildiz, and A. Küpper, “Decentralized Identifiers and Self-Sovereign Identity in 6G,” IEEE Network, vol. 36, no. 4, pp. 142–148, 2022.
- J. M. J. Valero, P. M. S. Sánchez, A. Lekidis, J. F. Hidalgo, M. G. Pérez, M. S. Siddiqui, A. H. Celdrán, and G. M. Pérez, “Design of a Security and Trust Framework for 5G Multi-domain Scenarios,” Journal of Network and Systems Management, vol. 7, 2021.
- S. Rodriguez Garzon, H. Yildiz, and A. Küpper, “Towards Decentralized Identity Management in Multi-stakeholder 6G Networks,” in 1st Int. Conf. on 6G Networking (6GNet), 2022, pp. 1–8.
- L. Perugini, “SSI-aware TLS handshake in OpenSSL,” Master’s thesis, Politecnico di Torino, 2023.
- Decentralized Identity Foundation (DIF), “DIDComm Messaging v2.1,” https://identity.foundation/didcomm-messaging/spec/v2.1/, accessed: 2024-01-25.
- ——, “Presentation Exchange 2.X.X,” https://identity.foundation/presentation-exchange/, accessed: 2024-01-25.