A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies
Fifth-Generation (5G) cellular networks extensively utilize subscriber identifiers throughout the protocol stack, thereby linking subscribers to their activities on the network. With the inherent use of linked identifiers comes the potential capability to track subscribers’ location and behavior, wh...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-03-01
|
| Series: | Future Internet |
| Subjects: | |
| Online Access: | https://www.mdpi.com/1999-5903/17/4/142 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850180392455241728 |
|---|---|
| author | Paul Scalise Michael Hempel Hamid Sharif |
| author_facet | Paul Scalise Michael Hempel Hamid Sharif |
| author_sort | Paul Scalise |
| collection | DOAJ |
| description | Fifth-Generation (5G) cellular networks extensively utilize subscriber identifiers throughout the protocol stack, thereby linking subscribers to their activities on the network. With the inherent use of linked identifiers comes the potential capability to track subscribers’ location and behavior, which poses critical challenges for user identity protections and privacy in sensitive applications like military or healthcare operating over public 5G infrastructure. The reliance on such personal identifiers threatens a user’s right to privacy and brings to light the importance of proper mechanisms to mitigate these risks for current and future cellular network technologies. In this paper, we explore the 5G specifications to understand the most important list of identifiers and their use across Virtual Network Functions (VNF), and points of exposure within the Core Network (CN). We also examine the existing literature regarding identity protections and efforts to mitigate privacy concerns targeted in the CN. Findings include the need for a trust relationship between users and their network providers to protect and safeguard their identity. While 5G technology has greater user identity protections compared to previous cellular generations, our analysis shows that several areas of concern remain, particularly in the exchange of subscriber metadata. This work also finds that new technologies adopted in 5G networks add further complexity to maintaining a strict posture for safeguarding user identity and privacy protections. This paper also reviews the scientific community’s proposed enhancements for future 6G networks’ user identity and privacy protections, with a focus on emerging Artificial Intelligence (AI) and Machine Learning (ML) applications. The ethical implications of private or anonymous communications are also carefully weighed and examined to understand the multifaceted nature of this topic. Our work is concluded by proposing important further research to reduce the prevalence and reliance on personal identifiers such as the SUPI (Subscription Permanent Identifier) within 5G Core operations to help better protect user identity. We also propose replacing the widespread use of the SUPI between VNFs with ephemeral identifiers, building upon efforts by 3GPP aiming for 5G to protect the SUPI from eavesdroppers. |
| format | Article |
| id | doaj-art-a9e76cfe3b8b43fc895aa4f78981f341 |
| institution | OA Journals |
| issn | 1999-5903 |
| language | English |
| publishDate | 2025-03-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Future Internet |
| spelling | doaj-art-a9e76cfe3b8b43fc895aa4f78981f3412025-08-20T02:18:11ZengMDPI AGFuture Internet1999-59032025-03-0117414210.3390/fi17040142A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G TechnologiesPaul Scalise0Michael Hempel1Hamid Sharif2Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USADepartment of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USADepartment of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USAFifth-Generation (5G) cellular networks extensively utilize subscriber identifiers throughout the protocol stack, thereby linking subscribers to their activities on the network. With the inherent use of linked identifiers comes the potential capability to track subscribers’ location and behavior, which poses critical challenges for user identity protections and privacy in sensitive applications like military or healthcare operating over public 5G infrastructure. The reliance on such personal identifiers threatens a user’s right to privacy and brings to light the importance of proper mechanisms to mitigate these risks for current and future cellular network technologies. In this paper, we explore the 5G specifications to understand the most important list of identifiers and their use across Virtual Network Functions (VNF), and points of exposure within the Core Network (CN). We also examine the existing literature regarding identity protections and efforts to mitigate privacy concerns targeted in the CN. Findings include the need for a trust relationship between users and their network providers to protect and safeguard their identity. While 5G technology has greater user identity protections compared to previous cellular generations, our analysis shows that several areas of concern remain, particularly in the exchange of subscriber metadata. This work also finds that new technologies adopted in 5G networks add further complexity to maintaining a strict posture for safeguarding user identity and privacy protections. This paper also reviews the scientific community’s proposed enhancements for future 6G networks’ user identity and privacy protections, with a focus on emerging Artificial Intelligence (AI) and Machine Learning (ML) applications. The ethical implications of private or anonymous communications are also carefully weighed and examined to understand the multifaceted nature of this topic. Our work is concluded by proposing important further research to reduce the prevalence and reliance on personal identifiers such as the SUPI (Subscription Permanent Identifier) within 5G Core operations to help better protect user identity. We also propose replacing the widespread use of the SUPI between VNFs with ephemeral identifiers, building upon efforts by 3GPP aiming for 5G to protect the SUPI from eavesdroppers.https://www.mdpi.com/1999-5903/17/4/142privacy5Gcore networksupivirtual network functionsservice-based architecture |
| spellingShingle | Paul Scalise Michael Hempel Hamid Sharif A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies Future Internet privacy 5G core network supi virtual network functions service-based architecture |
| title | A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies |
| title_full | A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies |
| title_fullStr | A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies |
| title_full_unstemmed | A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies |
| title_short | A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies |
| title_sort | survey of 5g core network user identity protections concerns and proposed enhancements for future 6g technologies |
| topic | privacy 5G core network supi virtual network functions service-based architecture |
| url | https://www.mdpi.com/1999-5903/17/4/142 |
| work_keys_str_mv | AT paulscalise asurveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies AT michaelhempel asurveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies AT hamidsharif asurveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies AT paulscalise surveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies AT michaelhempel surveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies AT hamidsharif surveyof5gcorenetworkuseridentityprotectionsconcernsandproposedenhancementsforfuture6gtechnologies |