Dynamic Authorization For 5G Systems: October 2018
Dynamic Authorization For 5G Systems: October 2018
Dynamic Authorization For 5G Systems: October 2018
net/publication/329839002
CITATIONS READS
0 399
4 authors, including:
Alec Brusilovsky
Institute of Telecommunications
12 PUBLICATIONS 46 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Yogendra Shah on 02 January 2019.
5G systems to align the accounting and billing refer to as Basic Services and as deployed in LTE but also
functions of the various stakeholders’ systems with escalating layers of dynamic service authorization, which we
appropriate authorization functions for the services refer to as Restricted and Negotiated Services.
that are consumed by a user.
Dynamic authorization for services that go beyond a
Blanket and static pre-authorization of services may Basic Service set is addressed using concepts of Restricted
pose a risk to the network operator and stakeholders. and Negotiated Services. The service delivery mechanisms
A diversity of devices are expected to attach to 5G are captured in an enhanced SP offering an evolutionary path
networks designed for specific vertical use cases. from the familiar LTE authorization approach centered
These devices require a limited set of service around a simple inspection of the SP. The mechanism allows
requirements and it’s desirable to provide access to a subscriber to dynamically access 5G services that are not
only the services required for the specific application initially enabled as part of an SP (e.g., enable some optional
context and prevent access to other services. For services based on user session context, referred here as
example, using a static SP may lead to over Restricted Services) or to align a service request with an SN
provisioning authorization for services, leading to offering/capability (e.g., provision a new service based on SN
potential denial of service attacks and malicious abuse capabilities), which we refer to as Negotiated Services. By
of services. Conversely, under provisioning way of illustration of the authorization concepts we take as an
authorization may lead to loss of revenues for the example a roaming scenario or a multi-tenant scenario where
MNO due to a poor user experience and under- a third-party infrastructure provider is offering services to a
utilization of the network services available. user.
2) Network Slicing: A New Dimension to Authorization 1) Basic Services
In a traditional LTE mobile network owned and operated A UE may request a service from an SN. Upon receipt of
by a single MNO, it was logical to combine the authentication a service request by the SN, the UE’s SP is inspected for the
and authorization functions at the Mobility Management requested service. If the service is enabled and is a part of the
Entity (MME). The use of statically provisioned Basic Services, then the subscriber is automatically granted
authorization data in an SP was considered sufficient in order access to the service. Basic Services are statically provisioned
to achieve secure deployments with simple management and in current 4G systems.
operation, rather than a dynamic or distributed alternative.
Such a static authorization approach prevailed as the 3GPP 2) Restricted Services
architecture evolved to address optimizations related to Restricted Services may be optional services in the UE’s
operational cost and network performance for Radio Access SP that may have some service flows enabled while other
Network (RAN) sharing [7] or Dedicated Core Networks [8]. service flows may be disabled or turned off by default. These
services may be considered as services that have a set of
In contrast to these earlier efforts, the emerging network characteristics (Quality of Service (QoS), security etc.) that
slice paradigm - thanks to the flexibility of NFV [9] and SDN have been agreed upon between a HN and SN but where
[10] building blocks - is anticipated to evolve the mobile explicit supplementary authorization may be required to
network architecture into full support of multi-tenancy. This enable the services for a User. When an authenticated User
latter capability is crucial for future networks to requests access to a Restricted Service, a dynamic
accommodate new use cases catering to new players in authorization is initiated and upon authorization, the
various vertical industries, tighter alignment with business Restricted Service is enabled in the SP. This explicit
application services and Over The Top (OTT) providers’ authorization enables fine-tuning of the SP and flexibility in
specific service requirements. It may also enable more cost enabling services on a per device basis and may be based on
efficient and dynamic service provisioning on behalf of specific contextual information such as type of device,
network slice tenants that lease resources from infrastructure geographic area, subscriber plan information etc. Such a type
providers. As a result, the 5G mobile network may support a of authorization is based on a Pull Model. Once the UE is
more distributed and dynamic authorization functionality to authorized and as long the Restricted Service remains enabled
control access to a diversity of service offerings. in the SP in the SN, any subsequent request to access the
service is granted automatically, similarly to the Basic
C. Related Work Services authorization process (i.e. without any additional
There have been several efforts to develop standards for messaging towards the HN).
dynamic authorization for web services as well as for the IoT
as part of the Internet Engineering Task Force (IETF) [11]. As an example, in the case of IoT systems, some basic
The OAuth framework [12] is one of the more widely connectivity services may be pre-provisioned in a UE as
deployed mechanisms for services offered over the Internet. Basic Services and a wider set of services recorded as
An access token (e.g., JSON access token) is utilized, Restricted Services. An IoT service provider may be able to
whereby, a service owner may provide an entity (subject) dynamically authorize a UE, for a specific IoT application, in
with access to a service (object) based on the claims made the field after the UE is deployed. Such service-specific
within the token. enabling protects the network from misuse of the IoT device
subscription and restricts service usage to the agreed upon
III. DYNAMIC SERVICE AUTHORIZATION ARCHITECTURE AND IoT services and policy settings. In considering the potential
FRAMEWORK excess signalling due to dynamic authorization messages
coming from an SN, an IoT service provider may implement
A. Types of Services a policy to provision Restricted Services that need to be
We propose an authorization solution that evolves the authorized only once, for example, during the very first
current 3GPP SP based authorization mechanism to support connection and for the lifetime of an IoT device.
not only existing implicit service authorization, which we
3
3) Negotiated Services video from various cameras located around the stadium for a
A Negotiated Service is a service that may not be rich experience of the game. A request to deliver the service
provisioned by the HN Operator in an SP and builds on the to the user is sought by the SN from the HN. Following the
concept of Restricted Services. These services may be offered request and negotiation, upon receipt of the authorization, the
by an SN that caters to a specific set of service characteristics user is seamlessly provisioned with the live video feed of the
deliverable over a NS. When an authenticated UE requests a game. The dynamic request can be as simple as possession of
service, the SP is inspected and if it does not contain the an authorization token. Following activation of the App for
requested service, either as a Basic or Restricted Service, then the live video feed, an authorization from the user may be
a dynamic negotiation may be performed to seek sought by way of a Terms and Conditions dialog box. Upon
authorization for the requested service. For example, the acceptance of the terms, a user consent authorization token is
requested service, as indicated within the UE’s SP for Basic generated by the Sports Stadium. A recorded trace of the
and Restricted Services, may not be aligned with services authorization information enables the Sports Stadium and the
available over a basic NS of an SN. However, the requested HN to settle accounts in a seamless manner, following
services may be available as an optional additional service, consumption of the service by the user.
over a second NS. An alignment of the services and The Sports Stadium may host a RAN sharing
appropriate authorization checks may be performed and
infrastructure service with value-added services offered by
negotiated between the SN and the SP whether it be the HN way of a LBO service. The Sports Stadium has an
or a Data Network (DN) in a Local Break Out (LBO) setting.
arrangement with the SN to host and maintain the
A dynamic service negotiation may be carried out to indicate
infrastructure. The first NS, provisioning such services as
the required service characteristics, such as 5G QoS Class
Internet access, texting and voice calls is classified as Basic
Identifier (QCI), and receive a dynamic authorization.
Services, for which the authorization is provided via the UE’s
In an alternative deployment scenario, service SP. A 4K streaming video service over a second NS is part of
authorization based on a push model may be performed with some Restricted Services recorded in the user’s SP for which
an OTT service provider, DNN or HN to provide pre- access is granted after the SN has sought authorization from
authorization. Such an offering enables service scalability in the HN. Once authorized, the user’s SP is updated with the
terms of seamless inclusion of OTT service providers and authorization information and the services delivered to the
multi-tenant service providers and to provide a broader user. A key feature of Restricted Services is that if the service
geographic reach. In order to enable such an authorization to is logged in the user’s SP as “off” then the HN authorization
an SN who may then perform appropriate authorization is solicited whether in the context of a Home Routed (HR) or
decisions, the policies may be pre-negotiated and a LBO scenario, where data traffic is routed to/from a DN
communicated by way of a Proof-of-Authorization (PoA) through the HN as a home routed service or through the SN
provisioned in the UE. by way of a LBO service. In contrast, Basic Services are
automatically authorized based on a straightforward
B. Use Case Example inspection of the SP provided by the HN during UE
registration.
on the user’s profile, the authorization token, and the optional service flows on a per UE basis. For example,
requested characteristics of the service to determine if the referring to the example of Figure 1, the “4K Streaming”
requested service can be delivered to the user. There may be service may be authorized at home but require explicit
a dialog between the SN and HN authorization functions to dynamic authorization when roaming. In determining an
make adjustments to the duration of the offering and other authorization decision, the AF in the HN may also take into
information to arrive at a mutual agreement. Following a consideration contextual information (e.g. UE type, location,
successful negotiation, the HN sends the authorization to the time of day). This Restricted Services model enables a very
SN. Upon receipt of the authorization, the SN registers the scalable, flexible, and agile architecture to dynamically
authorization information for the user and provisions the user authorize a particular service while a user is roaming or
with the live video feed of the game. After concluding the connected through a particular network in a LBO setting.
service, the SN informs the HN of the service consumption
In the case of Negotiated Services (i.e., a service
information for later billing to the user.
characteristic or feature not specified in the SP), the SN and
C. Service Authorization Architecture HN AFs may enter into a negotiation protocol. For example,
In the general descriptions that follow for an a service alignment may be performed between the services
Authorization Function (AF), a UE wishes to access a service offered in the SN and those recorded in the SP by the HN and
from an SN for which the UE does not have pre-authorization the service request mapped to a service in the SP and
in its SP. The requested service is part of a Restricted Service authorized by the HN. In an example, the service request may
or Negotiated Service that may require dynamic authorization be offered by the SN in a separate NS, managed by a 3rd party
for the specific service(s). infrastructure provider, that requires explicit authorization.
The negotiation between the SN and the 3rd party may result
1) Service Access in the Home Network in an authorization for the SN to provision the requested
In this scenario, a UE attached to its HN requests access services to the UE. This procedure is to be contrasted with the
to use a service provisioned by its HN. The request specifies previous scenario where the HN could unilaterally authorize
a set of network services the UE is seeking from a specific the service request. Additional information from the UE may
slice type (e.g., eMBB, URLLC, MIoT) on behalf of a given be obtained by the HN AF through the SN AF (e.g., user
application. Referring to an illustrative example provided in consent confirmation). Following a successful authorization,
Figure 1 the network services “Internet Access” or access to the service is provided to the UE.
“Messaging” may be delivered through the same eMBB slice
but using service flows with different QoS characteristics IV. DETAILED SOLUTION
(e.g. latency, throughput, delay) which the network is able to Figure 3 depicts a procedure for a Negotiated Service
map to a particular QCI [3]. The HN AF obtains the authorization procedure by an HN (i.e. A Home Public Land
subscription information from a Unified Data Management Mobile Network (HPLMN)) delivered through an SN (i.e.
function (5G equivalent of Home Subscriber Server (HSS)) Visited PLMN (VPLMN)) in a 5G network environment.
and local network authorization policies from a policy control
function (PCF). As part of the authorization logic, the AF The description of the steps is as follows (see Figure 3 for
compares the set of service QCI from the UE request against acronym definitions):
the content of the SP matrix. The services description data 0. A UE has registered with the SN and as a result, the
may be conveyed by the UE by way of a Network Slice SN has obtained the UE SP from the HN and the UE
Selection Assistance Information (NSSAI) identifier or a has obtained information about the NS based services
Service Description Document (SDD) [13]. In the case of being offered by the SN.
Restricted Services, some of these service flow parameters
1. The UE sends a request for an on-demand service
may be present in the SP but turned off by default and turned
provided by an SN but not provisioned by the HN in
on through the authorization process.
the User’s SP. The corresponding single slice
In the case of Negotiated Services, some service flows identifier (i.e. Single NSSAI (S-NSSAI)) may have
may be absent from the SP and may be authorized on demand been communicated by the SN via a prior message
e.g., contingent on a supplementary authorization check, user (e.g. Registration or Configuration). Referring to the
payment confirmation. The AF may perform an SP check, example of Figure 2, the request may be triggered
apply operator policies, evaluate additional UE contextual when the user starts a live AR/VR video app on his
information (such as location or time-of-day), and request device while in the Sports Stadium. In the example,
additional information from the UE (e.g., user consent the given S-NSSAI comprises a standard slice type
confirmation) in the decision-making process to authorize the (eMBB) and a non-standard Slice Differentiator
UE for access to the service. Following a successful (AR/VR). The request is transported though the RAN
authorization, the appropriate network resource allocation to the AMF.
and configurations are performed, and the UE may be granted 2. The AMF checks the User’s SP to verify that the HN
access to the services over one or more NS. has enabled a capability to request Negotiated
Services, since the request refers to a slice identifier
2) Service Access in a Serving Network (S-NSSAI) which is not provisioned by the HN in the
A UE that is authenticated and registered with an SN, may User’s SP.
request a particular service from the SN. The request specifies
the service requirements similarly to the UE request in its HN, 3. The AMF forwards a Policy Check Request message
as described in the previous non-roaming scenario. The SN to the Visited Policy Control Function (V-PCF) in
AF inspects the SP of the UE and forwards the request to the order to determine the right set of policies (e.g. QoS,
HN AF for service authorization since the requested service security policies) to provide the UE access to the
is part of a Restricted Service. Such a request allows the HN requested NS.
AF to administer network policies to authorize access to the
View publication stats
4. The V-PCF determines that the requested NS does compared to existing LTE networks. Negotiated Services go
match the service / slices allowed for by the HN. The even further, introducing a concept of dynamic service
V-PCF sends a service negotiation request to the alignment between networks and opening the door for on-
Home PCF (H-PCF) that includes a description of the demand service enrollment and provisioning on behalf of the
negotiated Service Characteristics (e.g. QoS, Security user. Further work to align the dynamic authorization
policies). A standardized service definition template architecture described here with 3GPP standardization efforts
or fields format (e.g. standard QCI values) may be can benefit the adoption of rich application services in 5G
used for interoperability across various network systems.
domains.
5. Upon receiving the request, the H-PCF obtains the SP
from the UDM
6. The H-PCF uses the HPLMN policy rules, the UE’s
subscription information, the requested service
characteristics (e.g. QoS, security), the capabilities of
the UE, any pre-authorizations, and the roaming
agreements with the SN in order to determine
authorization for access to the service.
7. Upon confirmation of the checks, The H-PCF records
the authorization for the service including any
contextual parameters such as a duration of the
authorization in the UE’s subscription information. In
addition, such data may be recorded in the SN for
faster re-authorization (e.g., for a subsequent request
to use the service from the UE during the allowed
authorization period).
8. The H-PCF sends a Service Negotiation Response
message to the V-PCF that authorizes service delivery
according to the selected service characteristics.
9. The V-PCF sends a positive Policy Check Response
message that contains the authorization information
including the accepted service characteristics to the
AMF. The AMF selects the NS accordingly (e.g. the
AR/VR Slice in Figure 1).
10. The AMF sends a PDU Session Request message to
the appropriate SMF that is associated with the
selected slice instance to perform service setup.
11. The SMF establishes a User Plane connection with the
UPF. Figure 3: Negotiated Service Authorization 5G Mobile Network Call Flow
12. The SMF also completes a User Plane setup in the
RAN (via the AMF) and in the Core network. REFERENCES
13. The SMF replies to the UE via the AMF with a [1] Alliance, N. G. M. N. "5G white paper.": Next Generation Mobile
positive response. Networks, White paper (2015).
[2] 3GPP TS 23.008, Organization of subscriber data
14. The user proceeds to consume the AR/VR service
[3] 3GPP TS 23.501, System Architecture for the 5G System
provided by the SN.
[4] 3GPP TS 33.501, Security architecture and procedures for 5G system
V. CONCLUSION [5] Huawei: 5G Security: Forward Thinking Huawei White Paper:
https://www.huawei.eu/sites/default/files/5G_Security_Whitepaper_e
We have presented a framework for providing dynamic n.pdf, 2015
authorization in 5G networks. The framework enables [6] Ericsson: 5G Security Scenarios and Solutions:
authorization and negotiation of a network service to https://www.ericsson.com/assets/local/publications/white-papers/wp-
requesting UEs/applications in 5G systems that include 5g-security.pdf, June 2017
MNOs and 3rd party service providers. We introduced a [7] 3GPP TS 23.251, Network sharing; Architecture and functional
concept of Restricted and Negotiated Services as an evolution description
of the current Basic Services that are based on the static [8] 3GPP TR 23.707, Architecture Enhancements for Dedicated Core
Subscription Profile and authorization model of 3GPP. Networks
Restricted Services allow for fully standardized service [9] NFVISG ETSI: Network functions virtualization, white paper, 2012.
definitions and persistence of existing pre-provisioning [10] O. N. Foundation: Software-defined networking: The new norm for
networks, tech. rep., Open Network Foundation, 2012.
practices, in a similar fashion to existing Basic Services, but
with the noteworthy advantage of accommodating dynamic [11] IETF: AAA Authorization Framework, RFC 2904, August 2000
service authorization. This capability is enabled due to the [12] IETF: The OAuth 2.0 Authorization Framework, RFC 6749, October
2012
notion of optional service authorizations that may be turned
[13] Vinod Choyi, Ayman Abdel-Hamid, Yogendra Shah, Samir Ferdi,
on or off based on the context of the service request. These Alec Brusilovsky: Network slice selection, assignment and routing
optional service authorizations allow the Home Network to within 5G Networks, IEEE Conference on Standards for
gain more control of the authorization process when Communications and Networking (CSCN), 2016