Ciphering is needed when you want that only authorized people can ACCESS TO SEE the data. Integrity is when authorized people can ACCESS TO MODIFY the data . As you can see, both ciphering and integrity need an authentication and authorization phase before.
Read moreWhich protocol is used for confidentiality and integrity?
Transport Layer Security (TLS) is a protocol designed to add confidentiality as well as integrity and authenticity to network communications.
Read moreWhat is 5G AKA authentication?
5G-AKA is one of the techniques available in 5G for mutual authentication between the subscriber and the network , in addition to key agreement for protection of NAS, RRC and User Plane traffic. 5G AKA is similar to EAP AKA, although enhancements have been made to improve roaming security.
Read moreWhat is integrity protection in 5G?
In 5G, integrity protection of the user plane (UP) between the device and the gNB , was introduced as a new feature. Like the encryption feature, the support of the integrity protection feature is mandatory on both the devices and the gNB while the use is optional and under the control of the operator.
Read more