Industrial Consultancy & Sponsored Research (IC&SR) , IIT Madras

Group Anonymous Dynamic Slice enabled 5G Systems with Privacy Preserving Service Access

Technology Category/ Market

Category: 5G & Next Generation Networks

Industry: Telecommunications, Network Security

Applications: It focuses on privacy-preserving authentication, secure slice formation, Network Slicing Management, dynamic association between network elements, addressing critical security needs in evolving telecommunications Services, Device-to-Device D2D Communication

Market: The global 5G services market size was valued at USD 60.61 Bn in 2022. It is expected to grow at 59.4% CAGR of from 2023 to 2030.

Image Gallery

Problem Statement

  • Existing networks lack the adaptability to securely manage diverse services across industries within a 5G infrastructure, leading to vulnerabilities and potential breaches.
  • Current authentication methods compromise user privacy very often, especially in Device-to-Device (D2D) communications, hindering secure interaction and limiting service access.
  • Hence, there is a need for a robust method to enable secure independent formation and management of network slices, ensuring authenticity, and resistance against attacks or unauthorized access.

Technology

The present patent invention discloses a Group Anonymous Dynamic Slice enabled 5G Systems with Privacy Preserving Service Access. It revolves around creating secure, private, efficient communication in 5G network, emphasizing privacy and authentication.

Secure Network Slicing:

  • Utilizes NFV in 5G to create diverse network slices for different industries.
  • Ensures each slice meets specific requirements efficiently.

Dynamic Distributed Associations:

  • Establishes secure links between Network Slice Components (NSCs).
  • Allows NSCs within a slice to securely authenticate without a centralized authority.

Privacy-Preserving Authentication:

  • Implements mutual authentication for entities like service providers and user devices.
  • Maintains user anonymity in interactions and device-to-device (D2D) services.

Key Management and Encryption:

  • Uses cryptographic methods like proxy re-encryption to manage and secure communication.
  • Utilizes elliptic curve cryptography for encryption purposes.

Role of Network Components:

  • Orchestrator, slice manager, & infrastructure manager ensure secure network slice operation.
  • Focuses on security, management, and efficient utilization of resources.

Defense against Attacks:

  • Guards against topology learning attacks via unique key generation.
  • Ensures group anonymity within the network for legitimate entities.

Key Features/ Value Proposition

User Perspective:

  • Ensures secure and private service access, preserving user anonymity and usage behavior.
  • Enables reliable and authenticated connections, fostering trust in network interactions.
  • Facilitates customized offerings while safeguarding user data-identity.

Industrial perspective:

  • Supports industry requirements via customizable network slices, ensuring optimized service supply.
  • Enhances network security and integrity for to deal with sensitive data and critical operations.
  • Enables dynamic associations while maintaining stringent security protocols, optimizing resources.

Technical Perspective:

  • Implements elliptic curve and proxy re-encryption techniques for robust and private authentication.
  • Offers agile creation and management of network slices, improving scalability.
  • Protects user identities, usage history, and slice associations for robust privacy safeguards.

Questions about this Technology?

Contact for Licensing

sm-marketing@imail.iitm.ac.in
ipoffice2@iitm.ac.in

Research Lab

Prof. Siva Ram Murthy C

Department of Computer Science and Engineering

Intellectual Property

  • IITM IDF No.: 1789

  •  IP No.: 478604 (Granted)

Technology Readiness Level

TRL-3

Proof of Concept established

error: Content is protected !!