A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies

Fifth-Generation (5G) cellular networks extensively utilize subscriber identifiers throughout the protocol stack, thereby linking subscribers to their activities on the network. With the inherent use of linked identifiers comes the potential capability to track subscribers’ location and behavior, wh...

Full description

Saved in:
Bibliographic Details
Main Authors: Paul Scalise, Michael Hempel, Hamid Sharif
Format: Article
Language:English
Published: MDPI AG 2025-03-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/17/4/142
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850180392455241728
author Paul Scalise
Michael Hempel
Hamid Sharif
author_facet Paul Scalise
Michael Hempel
Hamid Sharif
author_sort Paul Scalise
collection DOAJ
description Fifth-Generation (5G) cellular networks extensively utilize subscriber identifiers throughout the protocol stack, thereby linking subscribers to their activities on the network. With the inherent use of linked identifiers comes the potential capability to track subscribers’ location and behavior, which poses critical challenges for user identity protections and privacy in sensitive applications like military or healthcare operating over public 5G infrastructure. The reliance on such personal identifiers threatens a user’s right to privacy and brings to light the importance of proper mechanisms to mitigate these risks for current and future cellular network technologies. In this paper, we explore the 5G specifications to understand the most important list of identifiers and their use across Virtual Network Functions (VNF), and points of exposure within the Core Network (CN). We also examine the existing literature regarding identity protections and efforts to mitigate privacy concerns targeted in the CN. Findings include the need for a trust relationship between users and their network providers to protect and safeguard their identity. While 5G technology has greater user identity protections compared to previous cellular generations, our analysis shows that several areas of concern remain, particularly in the exchange of subscriber metadata. This work also finds that new technologies adopted in 5G networks add further complexity to maintaining a strict posture for safeguarding user identity and privacy protections. This paper also reviews the scientific community’s proposed enhancements for future 6G networks’ user identity and privacy protections, with a focus on emerging Artificial Intelligence (AI) and Machine Learning (ML) applications. The ethical implications of private or anonymous communications are also carefully weighed and examined to understand the multifaceted nature of this topic. Our work is concluded by proposing important further research to reduce the prevalence and reliance on personal identifiers such as the SUPI (Subscription Permanent Identifier) within 5G Core operations to help better protect user identity. We also propose replacing the widespread use of the SUPI between VNFs with ephemeral identifiers, building upon efforts by 3GPP aiming for 5G to protect the SUPI from eavesdroppers.
format Article
id doaj-art-a9e76cfe3b8b43fc895aa4f78981f341
institution OA Journals
issn 1999-5903
language English
publishDate 2025-03-01
publisher MDPI AG
record_format Article
series Future Internet
spelling doaj-art-a9e76cfe3b8b43fc895aa4f78981f3412025-08-20T02:18:11ZengMDPI AGFuture Internet1999-59032025-03-0117414210.3390/fi17040142A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G TechnologiesPaul Scalise0Michael Hempel1Hamid Sharif2Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USADepartment of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USADepartment of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USAFifth-Generation (5G) cellular networks extensively utilize subscriber identifiers throughout the protocol stack, thereby linking subscribers to their activities on the network. With the inherent use of linked identifiers comes the potential capability to track subscribers’ location and behavior, which poses critical challenges for user identity protections and privacy in sensitive applications like military or healthcare operating over public 5G infrastructure. The reliance on such personal identifiers threatens a user’s right to privacy and brings to light the importance of proper mechanisms to mitigate these risks for current and future cellular network technologies. In this paper, we explore the 5G specifications to understand the most important list of identifiers and their use across Virtual Network Functions (VNF), and points of exposure within the Core Network (CN). We also examine the existing literature regarding identity protections and efforts to mitigate privacy concerns targeted in the CN. Findings include the need for a trust relationship between users and their network providers to protect and safeguard their identity. While 5G technology has greater user identity protections compared to previous cellular generations, our analysis shows that several areas of concern remain, particularly in the exchange of subscriber metadata. This work also finds that new technologies adopted in 5G networks add further complexity to maintaining a strict posture for safeguarding user identity and privacy protections. This paper also reviews the scientific community’s proposed enhancements for future 6G networks’ user identity and privacy protections, with a focus on emerging Artificial Intelligence (AI) and Machine Learning (ML) applications. The ethical implications of private or anonymous communications are also carefully weighed and examined to understand the multifaceted nature of this topic. Our work is concluded by proposing important further research to reduce the prevalence and reliance on personal identifiers such as the SUPI (Subscription Permanent Identifier) within 5G Core operations to help better protect user identity. We also propose replacing the widespread use of the SUPI between VNFs with ephemeral identifiers, building upon efforts by 3GPP aiming for 5G to protect the SUPI from eavesdroppers.https://www.mdpi.com/1999-5903/17/4/142privacy5Gcore networksupivirtual network functionsservice-based architecture
spellingShingle Paul Scalise
Michael Hempel
Hamid Sharif
A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies
Future Internet
privacy
5G
core network
supi
virtual network functions
service-based architecture
title A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies
title_full A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies
title_fullStr A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies
title_full_unstemmed A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies
title_short A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies
title_sort survey of 5g core network user identity protections concerns and proposed enhancements for future 6g technologies
topic privacy
5G
core network
supi
virtual network functions
service-based architecture
url https://www.mdpi.com/1999-5903/17/4/142
work_keys_str_mv AT paulscalise asurveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies
AT michaelhempel asurveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies
AT hamidsharif asurveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies
AT paulscalise surveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies
AT michaelhempel surveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies
AT hamidsharif surveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies