Description
Remote Identification (RID) is a service capability defined in 3GPP that allows a network entity, such as an application server or service provider, to remotely identify and authenticate a user equipment (UE) or user without requiring direct physical access or user intervention. This is achieved through cryptographic protocols and network-assisted procedures that leverage the UE's subscription credentials or temporary identifiers. RID operates within the 5G service-based architecture, involving core network functions like the Authentication Server Function (AUSF), Unified Data Management (UDM), and Network Exposure Function (NEF). The service enables secure, privacy-preserving identification for various use cases, such as accessing location-based services, verifying device integrity for IoT deployments, or enabling anonymous authentication for public safety communications.
Architecturally, RID is specified in 3GPP TS 23.256 and related documents, outlining how external applications can request identification through the NEF, which acts as an intermediary to protect network internals. The process typically involves the application sending a request with parameters like a temporary identifier or service-specific credentials, which the network maps to a permanent subscription identifier (e.g., SUPI) after proper authorization and privacy checks. Key components include the RID service provider, which initiates the request, and the 5G core network, which performs the identification using authentication and key agreement (AKA) procedures or similar mechanisms. RID can work in conjunction with privacy-enhancing technologies like subscription concealed identifiers (SUCI) to prevent tracking, ensuring that identification is performed only when authorized and necessary.
How RID works involves several steps: first, an external application (e.g., a smart city service) requests identification of a UE via the NEF, providing a token or identifier that the UE previously shared during service registration. The NEF validates the application's credentials and forwards the request to relevant core functions, such as the UDM or AUSF, which retrieve the UE's profile and perform authentication if needed. The network then returns a verified identity or attributes (e.g., confirmed age or device type) to the application, without exposing sensitive subscriber data. This process supports both online and offline modes, with optional user consent mechanisms to comply with regulations like GDPR. RID is particularly valuable in IoT scenarios, where devices need to be identified for service access without human interaction, and in emergency situations where first responders must quickly authenticate devices in a disaster area.
Purpose & Motivation
RID was introduced to address the growing need for secure, remote authentication in 5G ecosystems, especially with the proliferation of IoT devices and services that require automated identification without physical presence. Prior approaches often relied on manual processes or less secure methods like IP-based identification, which were inadequate for scalable, privacy-sensitive applications. RID provides a standardized way for service providers to verify identities through the mobile network, leveraging the robust security infrastructure of 3GPP systems, which solves problems like identity spoofing, unauthorized access, and privacy violations.
Historically, the motivation for RID emerged from use cases in Release 17, such as UAV (drone) identification for regulatory compliance, where remote verification of flying devices is required by aviation authorities. It also supports public safety applications, where emergency services need to identify devices in a crisis without compromising user privacy. By creating a network-based identification service, 3GPP enables new business models, such as age verification for digital services or device attestation for industrial IoT, while maintaining the high security and privacy standards expected in mobile networks. This addresses limitations of previous ad-hoc solutions by integrating identification directly into the 5G core, ensuring interoperability and trust across different operators and service providers.
Key Features
- Enables remote identification of UEs or users via network-assisted procedures
- Supports privacy preservation through mechanisms like SUCI and user consent
- Integrates with 5G service-based architecture via the Network Exposure Function (NEF)
- Facilitates secure authentication for IoT, public safety, and regulatory compliance use cases
- Allows external applications to request identification without accessing core network internals
- Supports both online real-time and offline identification modes
Evolution Across Releases
Introduced RID as a new service in TS 23.256, defining the basic architecture and procedures for remote identification. Focused on use cases like UAV identification and public safety, with initial integration into the 5G core via NEF and support for privacy-enhancing identifiers.
Enhanced RID with expanded use cases, including industrial IoT and secure access to edge computing services. Added improvements for scalability, performance, and support for group identification scenarios, along with better integration with network slicing.
Further evolved RID to support advanced features like AI/ML-based anomaly detection during identification and enhanced security against replay attacks. Extended applicability to non-terrestrial networks (NTN) and vehicular communications, with refinements for global interoperability.
Defining Specifications
| Specification | Title |
|---|---|
| TS 23.256 | 3GPP TS 23.256 |
| TS 23.700 | 3GPP TS 23.700 |
| TS 23.754 | 3GPP TS 23.754 |
| TS 29.256 | 3GPP TS 29.256 |
| TS 33.535 | 3GPP TR 33.535 |