Example is https://{apiRoot}/nudm-sdm/v1
Network Data Analytics Function
Stand-alone Non-Public Network
Trusted WLAN Interworking Function
Wireline Access Gateway Function
Elliptic Curve Integrated Encryption Scheme
Home Network Public key
MCC+MNC+MSIN consists of country code, service provider and SIM ID
Mobile Country Code (MCC)
Mobile Network Code (MNC)
Mobile Subscriber Identification Number (MSIN)
Evolved Core Packets
Physical Resource Block
power amplifier
gated recurrent unit
bit error rate. The Bit Error Ratio is defined as the ratio of the bits wrongly received to all bits
multicarrier multiuser single-input multiple-output
channel quality indicator
remote radio heads. Refer https://images.app.goo.gl/iyf4Y4L3ZgVs4GLf6
and baseband units. It is renamed as eNB in 4G and gNB in 5G.
multi-carrier power amplifier
Power channel allocation
downlink coordinated multi-point
self-organizing networks
key performance indicators
quality of experience
Hungarian Algorithm Assisted Clustering
Sparse code multiple access
mean opinion score
If a user requests content by a specific URL, while there is a cached content with the same URL address in the middle-box, the content is directly returned without fetching from a remote server. Refer http://mosaic-lab.org/uploads/papers/4e5732b2-eaed-48b0-9eda-08b810bd8022.pdf
Random access channel
When RACH is not working properly we effectively have a sleepy cell with no transmission activity taking place.
Mobile edge computing. In 5G, data unit is the edge.
Wireless sensor network (WSN) refers to spatially dispersed and dedicated sensors that monitor and record the physical conditions of the environment and forward the collected data to a central location.
Channel state information. This information describes how a signal propagates from the transmitter to the receiver and represents the combined effect of, for example, scattering, fading, and power decay with distance.
Average difference ratio
The authentication procedure in 3GPP 5G security has been designed as a framework to support the extensible authentication protocol (EAP)
Since it doesn’t need IP, so it is useful to authenticate the device before IP allocation
Public Land Mobile Network
An operator (for example, Airtel) can have multiple PLMN. Refer https://en.wikipedia.org/wiki/Mobile_Network_Codes_in_ITU_region_4xx_(Asia)#India_-_IN_-_405 for many Airtel PLMN
PLMN is identified by a globally unique PLMN code, which consists of a MCC (Mobile Country Code) and MNC (Mobile Network Code).
When source NF and target NF are located in different PLMNs, the source NF is said to be in the "Serving PLMN", and the target NF (and the NRF where such NF is registered) is said to be in the "Home PLMN"
Intermediate Internetwork Packet Exchange
Control plane signalling
Rogue Base Station
Network Access Identifier. Refer https://en.wikipedia.org/wiki/Network_Access_Identifier
The NAI is used when roaming, to identify the user.
To assist in the routing of the authentication request to the user's authentication server.
Visitor subscriber server
Network with which UE(mobile) is connected. It can be home network or roaming network
SECURITY ANCHOR FUNCTION
3GPP Security Working Group https://www.3gpp.org/news-events/1975-sec_5g
Random Access Network resource examples are bandwidth, eNB memory resource
Central Unit-Control Plane.. In 5G, gNB should eb closer due to high frequency. So, E-UTRAN is increased with more nodes
Path Computation Element
Actions taken to mitigate an attack are considered the control aspect.
5G network slicing is a network architecture that enables the multiplexing of virtualized and independent logical networks on the same physical network infrastructure. It also supports multi-vendor and multi-tenant network models over a shared infrastructure.
Policy and charging rule function. It configures P-GW (GW connecting to internet)
Between UE and eNB
Behind eNB to LTE core network
Its another name for 5G similar to LTE for 4G
Mobile network operators
IP Multimedia Subsystem
Evolved Terrestrial Radio Access Network (Ref: http://ecee.colorado.edu/~ecen4242/LTE/e_utran.html)
Security gateway. It is not widely used due to slowness caused by IPsec tunnelling
Network Function Virtualization Infrastructure
IP Multimedia
Commercial Off The Shelf
Security Orchestration, Analytics And Response
This is a standard body which has made 2G, 3G, 4G specifications. 5G is under progress
Distributed unit (https://youtu.be/DeTASrRYalE?t=1513)
Central unit (https://youtu.be/DeTASrRYalE?t=1513)
Network Elements (eNB, S-GW, P-GW, MME, HSS etc.. verify)
Non 3gpp Inter working function (https://youtu.be/DeTASrRYalE?t=1513)
evolved NodeB. 4G radio node (Tower). Reliance Jio bought Samsung eNB
5g radio node(Tower)
Same as eNB
Service based architecture
Massive Machine Type Communication
Enhanced Mobile Broadband
Ultra Reliable Low Latency Communication
SS7 attacks are mobile cyber attacks that exploit security vulnerabilities in the SS7 protocol to compromise and intercept voice and SMS
User data management. 3gpp brought HSS functionality of 4G here.
Unified data management (https://youtu.be/DeTASrRYalE?t=1513)
Unified data repository (https://youtu.be/DeTASrRYalE?t=1513)
Mobility Management Entity. Refer https://www.rcrwireless.com/20140509/diameter-signaling-controller-dsc/lte-mme-epc
Home subscriber server. Refer https://alepotech.medium.com/home-subscriber-server-hss-82470d3f332
User plane
User plane function. The User Plane Function (UPF) is one of the network functions (NFs) of the 5G core network (5GC). TheThe UPF is responsible for packet routing and forwarding, packet inspection, QoS handling, and external PDU session for interconnecting Data Network (DN), in the 5G architecture.
User equipment. For example mobile handset
Radio resource control
5G Core Network
Charging Function
Network Function.
The Network Function (NF) Repository Function (NRF) is the network entity in the 5G Core Network (5GC) supporting the following functionality:
- Maintains the NF profile of available NF instances and their supported services;
- Allows other NF instances to subscribe to, and get notified about, the registration in NRF of new NF instances of a given type;
- Supports service discovery function. It receives NF Discovery Requests from NF instances, and provides the information of the available NF instances fulfilling certain criteria (e.g., supporting a given service).
NRF can communicate to another NRF via SCP as well (below example)
S-NRF -> S-SEPP H-SEPP -> NRF
NF subscribe to other PLMN
When UE connects to roaming network, then it sends IMSI to gNodeB. gNodeB forwards it to AMF for authentication. AMF connects to AUSF in different PLMN using NRF in its own PLMN. When first UE roaming comes, then at that time, NRF on the PLMN of AMF subscribes to corresponding AUSF in home PLMN
Use of proxy
Proxy will subscribe on behalf of NF consumer in same/different PLMN since not all NF will have callback URI
The Nnrf_NFDiscovery service allows a NF or SCP Instance to discover other NF Instances with the potential services they offer, by querying the local NRF.
The Nnrf_NFDiscovery service also allows to a SCP discover other SCP instances.
The SCP is treated by the Nnrf_NFDiscovery service in the same way as NFs.
NF consumer flow for subscription
NF consumer will do the POST request on NFListRetrieval and mention the filter based on criteria
NRF gives the list of resource URIs(NF instances URI) matching this criteria
NF consumer looks at specific NF instance by calling NFProfileRetrieval API
NF consumer subscribe for change notification about selected resource URI using NFStatusSubscribe
NRF also acts as auth server. So, a client perform oauth using NRF before accessing NF. For. authentication, openID connect is used.
Non-standalone (NSA) and standalone (SA) are two 5G tracks that communication service providers can opt for when transitioning from 4G to the next-generation mobile technology.
Under NSA operation – meaning, 5G networks will be aided by existing 4G infrastructure. So service providers who want to be first to offer 5G speeds will start with NSA and, once 5G coverage is established, implement standalone 5G.
Access and Mobility function.
Its security function. Is like MME of 4G
?? Refer https://youtu.be/DeTASrRYalE?t=1227
Evolved packet system(Refer below diagram which complete is told as EPS)
SEcurity Anchor function (https://youtu.be/DeTASrRYalE?t=1513)
Authentication Server Function (https://youtu.be/DeTASrRYalE?t=1513)
In 5G AUSF+UDM is like HSS of 4G
Subscription Identifier De-Concealing Function (https://youtu.be/DeTASrRYalE?t=1513)
Authentication credential Repository and Processing Function (https://youtu.be/DeTASrRYalE?t=1513)
SUbscription Permanent Identifier (https://youtu.be/DeTASrRYalE?t=1642)
Examples for SUPI formats include the IMSI and Network Access Identifier (NAI).
Subscription Concealed Identifier. Concealed(encrypted) SUPI is known as SUCI
SUbscription Concealed Identifier (https://youtu.be/DeTASrRYalE?t=1642)
5G Globally Unique Temporary UE Identity (https://youtu.be/DeTASrRYalE?t=1642)
Key derivation function (https://youtu.be/DeTASrRYalE?t=1829)
Session Management Function (https://youtu.be/DeTASrRYalE?t=1876)
Interface between SEPP
Security Edge Protection Proxy
Refer: https://youtu.be/DeTASrRYalE?t=1506
NRF accepts request from NF or SCP.
NRF tells about NF or SCP
N27 is communication between vNRF and hNRF
The Nnrf_NFManagement service allows an NF or an SCP Instance in the serving PLMN to register, update or deregister its profile in the NRF
The Nnrf_NFManagement service also allows an NRF Instance to register, update or deregister its profile in another NRF in the same PLMN.
The NF profile consists of general parameters of the NF Instance, and also the parameters of the different NF Service Instances exposed by the NF Instance, if applicable.
It also allows an NF or an SCP to subscribe to be notified of registration, deregistration and profile changes of NF Instances, along with their potential NF services.
An NRF configured with multiple PLMN IDs shall support registering, updating and deregistering the profile of Network Function Instances from any of these PLMN IDs.
One NF can registers for multiple services
Registration is bound to same PLMN for both NF and SCP and so, it can’t be done from remote PLMN
Service subscription is allowed across PLMN for NF, but not for SCP
NFListRetrieval and NFProfileRetrieval are also not allowed from different PLMN
NRF will also registers himself to another NRF for forwarding or redirecting service discovery request.
NRF allows custom type NF. Custom type means those NFs which are not listed in the 3gpp spec
Design principal
The design is such that only a limited set of information is sent as cleartext even in initial protocol messages, while the rest is always concealed.
Security approaches
The detection, which is based on the radio condition information reported by devices on the field, makes it considerably more difficult for false base stations to remain stealthy.
5G has brought about a paradigm shift in the architecture of mobile networks, from the classical model with point-to-point interfaces between network function to service-based interfaces (SBI). In a service-based architecture (SBA), the different functionalities of a network entity are refactored into services exposed and offered on-demand to other network entities.
https://www.ericsson.com/en/blog/2019/7/3gpp-5g-security-overview
NFManagement - register, update or deregister NF profile in the NRF
NFDiscovery
OAuth2 Authorization
Madhu
https://www.ericsson.com/en/blog/2019/7/standalone-and-non-standalone-5g-nr-two-5g-tracks
https://www.rcrwireless.com/20140509/diameter-signaling-controller-dsc/lte-mme-epc
https://alepotech.medium.com/home-subscriber-server-hss-82470d3f332
https://www.youtube.com/watch?v=DeTASrRYalE
https://www.firstpoint-mg.com/blog/ss7-attack-guide/
https://www.awardsolutions.com/portal/shareables/what-is-5G/5G-Training-Online/getting-your-gs-and-ns-right-hooman-razani
https://images.app.goo.gl/sxMRjt1tAjRmSNU16
https://images.app.goo.gl/ptVvqwXQ82xUZYKx8