5G Security Requirements
Security Architecture
Network Access Security
SBA Domain Security
Introduction
In general, there are three security protocols followed to ensure secure communication between two parties:
-
There has to be authentication between the two communication endpoints. This is to prevent a spoofing attack.

-
Protection of the communication, which includes confidentiality, integrity and replay protection. To mitigate tampering, repudiation and information disclosure of messages.

-
Authorisation of the request from both sides to mitigate the elevation of privilege

In SBA domain security, these three measures are realised through two principles, TLS and OAuth 2.0. TLS ensures mutual authentication and transport security. OAuth 2.0 ensures the authorisation of the requests.