One of the key challenges for mobile network operators in the future will be to bring together a wide range of new players in the mobile network market under a common umbrella and to orchestrate their innovative technologies to provide economically viable and seamless mobile connectivity to the mobile subscribers. With each new player, be it a cloud, edge or hardware provider, the need for interfaces with secure authentication and authorization mechanisms increases, as does the complexity and operational costs of the public key infrastructures required for the associated identity and key management. While today's centralized public key infrastructures have proven themselves to be technically feasible in confined and trusted spaces, they do not provide the required security once centralized identity providers must be avoided, e.g., because of limited cross-domain interoperability or national data protection legislation, and state-dependent certification authorities can't be commonly trusted, e.g., because of geopolitical reasons. Recent decentralized identity management concepts, such as the W3C proposed recommendation of Decentralized Identifiers, provide a secure, tamper-proof, and cross-domain identity management alternative for future multitenancy 6G networks without relying on identity provider or certification authorities. This article introduces the concept of Decentralized Identifiers together with the principles of Self-sovereign Identity and discusses opportunities and potential benefits of their application and usage for cross-actor and privacy-preserving identity and key management in the next mobile network generation 6G.
翻译:移动网络运营商今后面临的关键挑战之一将是将移动网络市场中众多新的角色聚集到一个共同的保护伞之下,并协调其创新技术,为移动用户提供经济上可行和无缝的移动连接。每个新角色,无论是云、边缘或硬件供应商,都需要与安全认证和授权机制接口,而与此相关的身份和关键管理所需的公共关键基础设施的复杂性和运营成本也随之增加。虽然今天的中央公用关键基础设施在技术上证明在限制和可信任的空间是可行的,但在必须避免中央身份提供商或国家数据保护立法等中央身份提供者时,它们并不提供所需的安全,例如,由于有限的跨域互操作性或国家数据保护立法,以及由于地缘政治原因,依赖国家的认证当局无法普遍信任。最近分散化的身份管理概念,如W3C提出的分权化识别器建议,为未来的多级6G网络提供了安全、可修改和交叉身份管理备选方案,而无需依赖身份提供者或验证当局。本条款引入了分散化的和移动保密网络概念,并结合了自我定位和保密原则的标准化和保密性网络,共同讨论了其关键使用机会。