Introduction

In general, there are three security protocols followed to ensure secure communication between two parties:

  • There has to be authentication between the two communication endpoints. This is to prevent a spoofing attack. 5G Overview

  • Protection of the communication, which includes confidentiality, integrity and replay protection. To mitigate tampering, repudiation and information disclosure of messages. 5G Overview

  • Authorisation of the request from both sides to mitigate the elevation of privilege 5G Overview

In SBA domain security, these three measures are realised through two principles, TLS and OAuth 2.0. TLS ensures mutual authentication and transport security. OAuth 2.0 ensures the authorisation of the requests.