SlideShare une entreprise Scribd logo
1  sur  13
© 2019 Verizon.
Development of 5G
IAM Architecture
Transitioning to a User Centric
View
Bjorn Hjelm
June 28, 2019
© 2019 Verizon.
Why, What and How
2
© 2019 Verizon. 3
5G Currencies / Capabilities
© 2019 Verizon.
5G Core Network Key Principles and Concepts
4
Service-based interactions between Control Plane Network Functions (NF)
where authorized NFs can access any other NF services.
Separation between Control Plane and User Plane allowing for independent
scalability, evolution and flexible deployments.
Modularization of functions to enable flexible network slicing and support for
capability exposure.
1
2
3
© 2019 Verizon.
5G Core Network redefined as
Service-Based Architecture
(SBA)
5
UE (R)AN UPF
AF
AMF SMF
PCF UDM
DNN6
NRFNEF
N3
N2 N4
AUSF
Nausf Namf Nsmf
NpcfNnrfNnef Nudm Naf
NSSF
Nnssf
SBA entities
User Plane entities
1 3GPP TS 23.501, “System Architecture for the 5G System,” v.15.5.0, March 2019.
5G System Architecture1
© 2019 Verizon. 6
Study on a Layer for User Centric
Identifiers and Authentication followed
by User Identities and Authentication
(UIA) that introduce normative
requirements and study on the Usage
of User Identifiers in the 5G System
for architecture development.
Developed use cases focused on IoT
and generated requirements for a
service- and layer- agnostic Identity
as an Abstraction Layer in 5G as part
of the input to 3GPP.
Defined a 5G Vision around business
context based on use cases, business
models and value creation with a
user-centric view and the identity of
the entity.
Development of 5G IAM Requirements
© 2019 Verizon. 7
Identity as an Abstraction Layer in 5G
Service-
and Layer-
agnostic
Identity
An identity that bridges between network access technologies.
5G IAM architecture needs to abstract from domain related identifiers and network technologies.
An identity that bridges between different services offered by one
provider.
An identity that bridges between operators and other identity
providers, providing a global identity business proposition.
© 2019 Verizon. 8
Basic Concept and Relations of 5G Identity
Management
Relationship between User, Identities, Identifiers and Attributes2
A user is an entity in the context of identity
management.
The identity can depend on the role of the
entity in the system.
A user can have several user identities
(professional, private, etc.).
A user identity is associated with some pieces
of information generally referred to as
attributes where identifiers are one special
form of attribute.
Attributes that are not identifiers may be
associated with one or more identities.
2 3GPP TR 22.904, “Study on user centric identifiers and authentication,” v.16.1.0, Sep. 2018.
© 2019 Verizon. 9
5G User Centric Authentication Layer
2 3GPP TR 22.904, “Study on user centric identifiers and authentication,” v.16.1.0, Sep. 2018.
Shall exist on top of the existing
subscription authentication.
Shall not replace existing subscription
credentials.
Shall support various authentication
mechanisms and interactions with
authentication system.
Shall support a service- and layer-
identity of the user.
The user centric authentication layer2…
© 2019 Verizon. 10
• Slice authentication (and
authorization) by 3rd party.
▶ A slice can represent a tier of
service.
• Industrial factory automation and
discrete automation.
• Several users or devices (IoT,
wearables etc.) behind one
gateway.
• Access via non-3GPP device to a
subscription in the 3GPP system.
• Sharing of devices / services
configuration of shared devices.
• Authorizing others to access one’s
resources.
5G UIA Use Cases
© 2019 Verizon.
In addition...
11
Authorization of 5G Network Function (NF) service access1 and 3rd-
party Application Functions (AF)3 are based on OAuth 2.0 framework.
Identity management and user authentication functionality for 3GPP
Mission Critical (MC) services is based on OpenID Connect and OAuth
2.0.4
1 3GPP TS 23.501, “System Architecture for the 5G System,” v.15.5.0, March 2019.
3 3GPP TS 33.501, “Security architecture and procedures for 5G system,” v.15.4.0, Mar. 2019.
4 3GPP TS 33.180, “Security of the mission critical service,” v.14.6.0, Mar. 2019.
© 2019 Verizon.
Summary
12
The 5G Vision focuses on business context based on use cases, business
models and value creation with a user-centric view.
The concept of User Identity in a 5G system has been defined and agreed upon
within 3GPP with architecture work in development.
Some of the basic building blocks to support 5G User Centric Authentication
Layer already exist.
1
2
3
© 2019 Verizon.

Contenu connexe

Tendances

CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 

Tendances (20)

5G Core Network - ZTE 5g Cloude ServCore
5G Core Network - ZTE 5g Cloude ServCore5G Core Network - ZTE 5g Cloude ServCore
5G Core Network - ZTE 5g Cloude ServCore
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
3GPP 5G Control Plane Service Based Architecture
3GPP 5G Control Plane Service Based Architecture3GPP 5G Control Plane Service Based Architecture
3GPP 5G Control Plane Service Based Architecture
 
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) DevicesBeginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
 
VXLAN Practice Guide
VXLAN Practice GuideVXLAN Practice Guide
VXLAN Practice Guide
 
네트워크 가상화 발표자료-SDN/NFV/Cloud
네트워크 가상화 발표자료-SDN/NFV/Cloud네트워크 가상화 발표자료-SDN/NFV/Cloud
네트워크 가상화 발표자료-SDN/NFV/Cloud
 
Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...
 
클라우드 환경을 위한 네트워크 가상화와 NSX(기초편)
클라우드 환경을 위한 네트워크 가상화와 NSX(기초편)클라우드 환경을 위한 네트워크 가상화와 NSX(기초편)
클라우드 환경을 위한 네트워크 가상화와 NSX(기초편)
 
Access Network Evolution
Access Network Evolution Access Network Evolution
Access Network Evolution
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)
3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)
3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)
 
5G Core Network White Paper
5G Core Network White Paper5G Core Network White Paper
5G Core Network White Paper
 
5g architecture, Industrial Training
5g architecture, Industrial Training5g architecture, Industrial Training
5g architecture, Industrial Training
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
 
Dockerと外部ルータを連携させる仕組みを作ってみた
Dockerと外部ルータを連携させる仕組みを作ってみたDockerと外部ルータを連携させる仕組みを作ってみた
Dockerと外部ルータを連携させる仕組みを作ってみた
 
Opinion: The Politics of SA vs NSA 5G & 4G Speeds
Opinion: The Politics of SA vs NSA 5G & 4G SpeedsOpinion: The Politics of SA vs NSA 5G & 4G Speeds
Opinion: The Politics of SA vs NSA 5G & 4G Speeds
 
5G UE Simulator
5G UE Simulator5G UE Simulator
5G UE Simulator
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
Nokia 5G Workshop Taiwan Oct 2016
Nokia 5G Workshop Taiwan Oct 2016Nokia 5G Workshop Taiwan Oct 2016
Nokia 5G Workshop Taiwan Oct 2016
 
閉域網接続の技術入門
閉域網接続の技術入門閉域網接続の技術入門
閉域網接続の技術入門
 

Similaire à Development of 5G IAM Architecture

Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided security
slametarrokhim1
 
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
ijtsrd
 

Similaire à Development of 5G IAM Architecture (20)

Development of 5G IAM Architecture
Development of 5G IAM ArchitectureDevelopment of 5G IAM Architecture
Development of 5G IAM Architecture
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access NetworksArchitecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access Networks
 
An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
 
White paper 5g-user-registration-for-dual-access--dual-connectivity-march2019
White paper 5g-user-registration-for-dual-access--dual-connectivity-march2019White paper 5g-user-registration-for-dual-access--dual-connectivity-march2019
White paper 5g-user-registration-for-dual-access--dual-connectivity-march2019
 
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesNavigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
 
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesUnveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
 
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecuring the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided security
 
Security_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdfSecurity_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdf
 
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
5G Drones with 5G Gaming and Application of 5G in Other Industries A ChatGPT ...
 
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
 
Private-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdfPrivate-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdf
 

Plus de Bjorn Hjelm

Plus de Bjorn Hjelm (20)

MODRNA WG Update - Oct 2023
MODRNA WG Update - Oct 2023MODRNA WG Update - Oct 2023
MODRNA WG Update - Oct 2023
 
MODRNA WG Update - Apr 2023
MODRNA WG Update - Apr 2023MODRNA WG Update - Apr 2023
MODRNA WG Update - Apr 2023
 
MODRNA WG Update - Nov 2022
MODRNA WG Update - Nov 2022MODRNA WG Update - Nov 2022
MODRNA WG Update - Nov 2022
 
MODRNA WG update - OpenID Foundation Workshop at EIC 2022
MODRNA WG update - OpenID Foundation Workshop at EIC 2022MODRNA WG update - OpenID Foundation Workshop at EIC 2022
MODRNA WG update - OpenID Foundation Workshop at EIC 2022
 
MODRNA WG Update - Apr. 2022
MODRNA WG Update - Apr. 2022MODRNA WG Update - Apr. 2022
MODRNA WG Update - Apr. 2022
 
MODRNA WG update - OpenID Foundation Workshop at EIC 2021
MODRNA WG update - OpenID Foundation Workshop at EIC 2021 MODRNA WG update - OpenID Foundation Workshop at EIC 2021
MODRNA WG update - OpenID Foundation Workshop at EIC 2021
 
MODRNA WG Update - Dec 2021
MODRNA WG Update - Dec 2021MODRNA WG Update - Dec 2021
MODRNA WG Update - Dec 2021
 
MODRNA WG Update - April 2021
MODRNA WG Update - April 2021MODRNA WG Update - April 2021
MODRNA WG Update - April 2021
 
MODRNA WG Overview - October 2020
MODRNA WG Overview - October 2020MODRNA WG Overview - October 2020
MODRNA WG Overview - October 2020
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
OpenID Foundation MODRNA WG Overview
OpenID Foundation MODRNA WG OverviewOpenID Foundation MODRNA WG Overview
OpenID Foundation MODRNA WG Overview
 
OpenID Foundation MODRNA WG overview at EIC 2019
OpenID Foundation MODRNA WG overview at EIC 2019OpenID Foundation MODRNA WG overview at EIC 2019
OpenID Foundation MODRNA WG overview at EIC 2019
 
OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)
 
An Overview of the interface of MODRNA and GSMA Mobile Connect
An Overview of the interface of MODRNA and GSMA Mobile ConnectAn Overview of the interface of MODRNA and GSMA Mobile Connect
An Overview of the interface of MODRNA and GSMA Mobile Connect
 
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WGOverview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
 
OpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile Profile
 
Mobile Network Operators and Identity – Crossing the Chasm
Mobile Network Operators and Identity – Crossing the ChasmMobile Network Operators and Identity – Crossing the Chasm
Mobile Network Operators and Identity – Crossing the Chasm
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access Management
 
IIW 27 Wednesday Session 3
IIW 27 Wednesday Session 3IIW 27 Wednesday Session 3
IIW 27 Wednesday Session 3
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 

Dernier

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Dernier (6)

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 

Development of 5G IAM Architecture

  • 1. © 2019 Verizon. Development of 5G IAM Architecture Transitioning to a User Centric View Bjorn Hjelm June 28, 2019
  • 2. © 2019 Verizon. Why, What and How 2
  • 3. © 2019 Verizon. 3 5G Currencies / Capabilities
  • 4. © 2019 Verizon. 5G Core Network Key Principles and Concepts 4 Service-based interactions between Control Plane Network Functions (NF) where authorized NFs can access any other NF services. Separation between Control Plane and User Plane allowing for independent scalability, evolution and flexible deployments. Modularization of functions to enable flexible network slicing and support for capability exposure. 1 2 3
  • 5. © 2019 Verizon. 5G Core Network redefined as Service-Based Architecture (SBA) 5 UE (R)AN UPF AF AMF SMF PCF UDM DNN6 NRFNEF N3 N2 N4 AUSF Nausf Namf Nsmf NpcfNnrfNnef Nudm Naf NSSF Nnssf SBA entities User Plane entities 1 3GPP TS 23.501, “System Architecture for the 5G System,” v.15.5.0, March 2019. 5G System Architecture1
  • 6. © 2019 Verizon. 6 Study on a Layer for User Centric Identifiers and Authentication followed by User Identities and Authentication (UIA) that introduce normative requirements and study on the Usage of User Identifiers in the 5G System for architecture development. Developed use cases focused on IoT and generated requirements for a service- and layer- agnostic Identity as an Abstraction Layer in 5G as part of the input to 3GPP. Defined a 5G Vision around business context based on use cases, business models and value creation with a user-centric view and the identity of the entity. Development of 5G IAM Requirements
  • 7. © 2019 Verizon. 7 Identity as an Abstraction Layer in 5G Service- and Layer- agnostic Identity An identity that bridges between network access technologies. 5G IAM architecture needs to abstract from domain related identifiers and network technologies. An identity that bridges between different services offered by one provider. An identity that bridges between operators and other identity providers, providing a global identity business proposition.
  • 8. © 2019 Verizon. 8 Basic Concept and Relations of 5G Identity Management Relationship between User, Identities, Identifiers and Attributes2 A user is an entity in the context of identity management. The identity can depend on the role of the entity in the system. A user can have several user identities (professional, private, etc.). A user identity is associated with some pieces of information generally referred to as attributes where identifiers are one special form of attribute. Attributes that are not identifiers may be associated with one or more identities. 2 3GPP TR 22.904, “Study on user centric identifiers and authentication,” v.16.1.0, Sep. 2018.
  • 9. © 2019 Verizon. 9 5G User Centric Authentication Layer 2 3GPP TR 22.904, “Study on user centric identifiers and authentication,” v.16.1.0, Sep. 2018. Shall exist on top of the existing subscription authentication. Shall not replace existing subscription credentials. Shall support various authentication mechanisms and interactions with authentication system. Shall support a service- and layer- identity of the user. The user centric authentication layer2…
  • 10. © 2019 Verizon. 10 • Slice authentication (and authorization) by 3rd party. ▶ A slice can represent a tier of service. • Industrial factory automation and discrete automation. • Several users or devices (IoT, wearables etc.) behind one gateway. • Access via non-3GPP device to a subscription in the 3GPP system. • Sharing of devices / services configuration of shared devices. • Authorizing others to access one’s resources. 5G UIA Use Cases
  • 11. © 2019 Verizon. In addition... 11 Authorization of 5G Network Function (NF) service access1 and 3rd- party Application Functions (AF)3 are based on OAuth 2.0 framework. Identity management and user authentication functionality for 3GPP Mission Critical (MC) services is based on OpenID Connect and OAuth 2.0.4 1 3GPP TS 23.501, “System Architecture for the 5G System,” v.15.5.0, March 2019. 3 3GPP TS 33.501, “Security architecture and procedures for 5G system,” v.15.4.0, Mar. 2019. 4 3GPP TS 33.180, “Security of the mission critical service,” v.14.6.0, Mar. 2019.
  • 12. © 2019 Verizon. Summary 12 The 5G Vision focuses on business context based on use cases, business models and value creation with a user-centric view. The concept of User Identity in a 5G system has been defined and agreed upon within 3GPP with architecture work in development. Some of the basic building blocks to support 5G User Centric Authentication Layer already exist. 1 2 3