Overview of network evolution from 1G to 6G
Overview of network evolution from 1G to 6G
Wireless_Mobile_VoIP_security_Pr Tonye 5
Global roadmap for the development of 6G
Source -
https://5g-ppp.eu/wp-content/uploads/2021/06/WhitePaper-6G-Europe.pdf#:~:text=The%206G%20architecture%2
0should%20be%20sufficiently%20flexible%20and,as%20well%20as%20local%20and%20distributed%20compute%
20capabilities
Wireless_Mobile_VoIP_security_Pr Tonye 6
Simplified architectures of 1G to
6G networks
6G
Wireless_Mobile_VoIP_security_Pr Tonye 7
Architectures of mobile telecommunications systems from 1G to 6G
1G 2G et 2.5G 3G
4G 5G 6G
Wireless_Mobile_VoIP_security_Pr Tonye 8
Comparison of mobile telecommunications systems from 0G to 6G:
equipment, common names
0G 1G 2G 3G 4G 5G 6G
Mobile MS MS MS, SIM, UE, USIM, UE, USIM,
UE, eUSIM, M-UE, sCell-
terminal IUCC IUCC IUCC
IUCC, UE, sCell-AP
eIUCC
Base Station AP BS BTS Node B / NB eNodeB /eNB gNodeB/ sCell-RAN,
gNB UM-MIMO
BS
Radio BSS BSS BSS UTRAN eUTRAN, C- NR, C- CR, SDR, IR
Subsystem RAN RAN
2G 3G/3G+ 4G /5G/6G/IoT
1G •Digital
•Turbo code • Smart Antennas
NORMS ANALOGICAL modulation 2.5G/2.75G •WALHS code • Fractal antennas
•Convolution •Detailed cell • MIMO
• Higher order
codes structures • Adaptive systems
•Power modulation
•Turbo coding •Power control • OFDM modulation
control
Wireless_Mobile_VoIP_security_Pr Tonye 12
2G, 2.5G,
2.75G
Distribution of frequency
spectrum in Cameroon
Camtel, MTN, Nextel, 3
Orange, Easylink, Space200,
4G Africa are concession G
operators with frequency 4
bands under license
G
Blue license bands
Bands without license (no license) in green
Orange satellite strip
Military band/wireless camera in orange
Wireless_Mobile_VoIP_security_Pr Tonye 13
Complete the table of Distribution of the frequency
spectrum in Cameroon
2G 3G 4G 5G
CAMTEL
MTN
Orange
NEXTEL
EasyLink
Space200
4G Africa
Military/
Wireless
cameras
Satellite
Wifi
Wireless_Mobile_VoIP_security_Pr Tonye 14
Table showing the frequency bands of 2G to 4G networks of telecommunications
operators in Cameroon
Wireless_Mobile_VoIP_security_Pr Tonye 15
Description des
architectures 2G, 3G,
4G, 5G et 6G
Wireless_Mobile_VoIP_security_Pr Tonye 16
Complete the table by giving the meaning of the acronym and the role of the
component of the 2G architecture (GSM - Global System for Mobile
Communications )
MSC
VLR
HLR
EIR
AUC
OMC
NSS
BSS
NMC
GMSC
RTCP
SGSN
Wireless_Mobile_VoIP_security_Pr Tonye 17
Table giving the meaning of the acronym and the role of the component of
the 2G architecture (GSM - Global System for Mobile Communications )
BTS Base Transceiver Station établit le lien radio entre l'abonné et le réseau
BSC Base Station Controller attribue les canaux de communication et gère la mobilité des données
MS Mobile Station permet aux abonnés d'accéder aux services offerts par l'opérateur
Trans-Coder-Units. Ces unités permettent aux utilisateurs de réduire le nombre, et donc le coût, des
TCU
liaisons PCM (Pulse CodeModulation) nécessaires entre BSS et NSS
MSC Mobile Switching Center relie le réseau courant aux autres réseaux qui lui sont raccordés
VLR Visitor Location Register est le serveur d'informations des abonnés en mobilité
HLR Home Location Register est la base de données regorgeant les informations des abonnés
Equipment Identify Register contient l’Identifiant destiné à permettre de désactiver un téléphone
EIR
mobile (GSM) qui aurait été volé.
AUC Authentificate Center est la base de données des algorithmes d'authentification et de chiffrement
Operation and Maintenance Center est le sous-système d’exploitation et de maintenance, qui
OMC
intègre les outils d’administration et de supervision du système.
Network Station Subsystem est le sous-système réseau ou NSS, qui est garant de la gestion des
NSS appels (commutation) et de la mobilité. OMC-R pour le sous-système BSS et OMC-S pour le sous-
système NSS.
Base Station Subsystem est le sous-système radio, qui assure l’accès au réseau à travers l’interface
BSS
air
Network Management Center utilise des logiciels et du matériel pour collecter et analyser en
NMC permanence des données et imposer des modifications de configuration afin d’améliorer les
performances, la fiabilité et la sécurité
GMSC Gateway Mobile Switching Center est utilisé pour acheminer les appels en dehors du réseau mobile.
RTCP Réseau téléphonique commutéTonye
Wireless_Mobile_VoIP_security_Pr publique ou réseau de téléphonie fixe 18
Serving GPRS Support Node est une entité réseau qui fournit la capacité de commutation de
Complete the table by giving for each of the GSM connection types: Position, role, Protocol and
transmission medium
Type of Position Role Protocole Support
interface
Um or
Radio
Abis
Ater
PSTN
Wireless_Mobile_VoIP_security_Pr Tonye 19
Table giving for each of the GSM connection types: Position, role, Protocol and transmission medium
SCH
BCCH
PCH
RACH
AGCH
CBCH
SDCCH
SACCH
FACCH
TCH/FS
TCH/HS
Wireless_Mobile_VoIP_security_Pr Tonye 21
Table by giving for each type of GSM channel: Meaning of the acronym, Function, multiplexing
method, Beacon or Traffic
Wireless_Mobile_VoIP_security_Pr Tonye 22
Complete the table by indicating the meaning of the acronym and the
function of the GPRS (General Packet Radio Service) network
equipment.
Meaning of
Function
acronym
PCU
SGS
N
GGS
N
Wireless_Mobile_VoIP_security_Pr Tonye 23
Table indicating the meaning of the acronym and the function of the
GPRS (General Packet Radio Service) network equipment
Meaning of the
Function
acronym
Responsable de la formation et de la transmission
Packet Control des trames contenant les paquets GPRS. C'est la
PCU
Unit carte qu'on ajoute à la BSC 2G pour passer à la
2.5G.
Wireless_Mobile_VoIP_security_Pr Tonye 24
Complete the table by giving the characteristics of the GSM and DCS-
1800 networks.
GSM DCS-1800
Bande de fréquence (liaison
montante)
Bande de fréquence (liaison
descendante)
Nombre d’intervalles de
temps par trame TDMA
Débit total par canal
Débit de la parole
Débit maximum des données
Techniques de multiplexage
Rayon de cellules
Puissance des terminaux
Sensibilité des terminaux
Sensibilité de la station de
base
Signal
Largeur de bande
Algorithme de chiffrement et
d’authentification
Wireless_Mobile_VoIP_security_Pr Tonye 25
Table giving the characteristics of the GSM and DCS-1800 networks.
Wireless_Mobile_VoIP_security_Pr Tonye 27
Complete the table by indicating the roles of each component of the 3G
network architecture (UMTS - Universal Mobile Telecommunications System)
Component Role
NodeB
RNC
MSC
VLR
GMSC
SGSN
GGSN
HLR
AuC
EIR
Wireless_Mobile_VoIP_security_Pr Tonye 28
Table indicating the roles of each component of the 3G network
architecture (UMTS - Universal Mobile Telecommunications System)
NodeB Gère une ou plusieurs cellules. Il assure les fonctions de réception et
de transmission radio pour une ou plusieurs cellules du réseau
d’accès de l’UMTS avec un équipement usager.
RNC Possède et contrôle les ressources radio des NodeB auxquels il est
connecté. Le RNC est le point d’accès au service pour tous les
services que l’UTRAN fournit au réseau cœur. Il peut avoir deux
modes de fonctionnement :
(1) Le Serving RNC (SRNC) permet de gérer la signalisation
associée, les connexions radios avec le mobile et sert de point de
rattachement au réseau cœur. Il contrôle, exécute le handover et
gère le contrôle de puissance.
(2) Le Drift RNC (DRNC) gère les ressources radios des NodeB qui
dépendent de lui. Il effectue la recombinaison des liens lorsque
du fait de la macro diversité, plusieurs liens radios sont établis
avec des Node B qui lui sont rattachés. Il route les données
utilisateur vers le Serving RNC dans le sens ascendant et vers les
Node B dans le sens descendant de manière transparente.
MSC Assure la commutation des données
VLR Base de données d’enregistrement des utilisateurs dans une zone
géographique
GMSC Passerelle entre le réseau UMTS et les réseaux extérieurs
SGSN Enregistre les utilisateurs d’une zone géographique dans une zone de
routage
GGSN Passerelle vers les réseaux à commutation de paquets extérieurs
HLR Wireless_Mobile_VoIP_security_Pr Tonye
Base de données des informations sur les utilisateurs
29
the table by indicating the meaning of the acronym, the use, the direction (DL or UP), the function (control or traffic or
Type of channel meaning of the The use Direction (DL or Function (control or traffic or
acronym UP) transport)
BCCH
PCCH
DCCH
CCCH
DTCH
CTCH
BCH
PCH
RACH
Wireless_Mobile_VoIP_security_Pr Tonye 30
ndicating the meaning of the acronym, the use, the direction (DL or UP), the function (control or traffic or transport)
Wireless_Mobile_VoIP_security_Pr Tonye 31
Table indicating the meaning of the acronym, the use, the direction (DL or UP), the
function (control or traffic or transport)
Type of channel meaning of the acronym The use Direction (DL or UP) Function (control or traffic or transport)
Wireless_Mobile_VoIP_security_Pr Tonye 33
Complete the table by giving the meaning of the acronym and the role of each element of the
LTE (Long Term Evolution) network architecture.
S1-U
MME
S-GW
P-GW
EPC
E-
UTRAN
Wireless_Mobile_VoIP_security_Pr Tonye 34
UE User Equipment - Terminal mobile
SCeNodeB eNodeB évolutive
RRH Radio Remote Head - tête de radio distante
BBU BaseBand Unit - unité de bande de base
Uu Interface Air
Ir Interface entre les RRH et les BBU: Fronthaul ou réseau de transport
X2 Liaisons IP reliant les eNodeB entre eux
S1-MME C'est le point de référence pour le protocole de plan de contrôle (S1AP) entre l'E-UTRAN et le MME.
S1-U Ce point de référence est utilisé pour le per-bearer user-plane tunneling, c'est-à-dire le transport des paquets de
données utilisateur entre l'E-UTRAN et le SGW
MME Mobility Management Entity gèrent la signalisation (plan de contrôle) et donnent l’accès aux bases de données
(HSS / HLR) contenant les identifiants et les droits des abonnés. Un (ou plusieurs)
S-GW Serving Gateways qui transportent le trafic de données (plan utilisateur) et concentrent le trafic de plusieurs
eNodeB.
P-GW Packet Data Network Gateway ou Packet Gateway, constitue une porte d'entrée unique entre le réseau IP de
l'opérateur et Internet. Il achemine donc les données internet vers le terminal et réciproquement les données du
terminal vers Internet. Il assure également quelques fonctions de sécurité. Il est connecté aux terminaux mobiles
à travers un ENodeB et via un SGW qui constitue en quelque sorte une passerelle régionale.
EPC Evolved Packet Core est le cœur de réseau qui utilise des technologies « full IP », c'est-à-dire basées sur les
protocoles Internet pour la signalisation, le transport de la voix et des données. Ce cœur de réseau permet
l’interconnexion via des routeurs avec les eNodeB distants, les réseaux des autres opérateurs mobiles, les réseaux
de téléphonie fixe et le réseau Internet.
E-UTRAN La partie radio du réseau est simplifiée par l’intégration dans les stations de base eNodeB des fonctions de
contrôle qui étaient auparavant localisées dans les RNC (Radio Network Controller) des réseaux 3G UMTS.
La partie radio d’un réseau LTE se compose donc des eNodeB, d’antennes locales ou distantes, de liaisons en
fibres optiques vers les antennes distantes (liens CPRI - Common Public Radio Interface) et des liaisons IP reliant
les eNodeB entre eux (liens X2) et avec le cœur de réseau (liens S1) via un réseau de backhaul.
Wireless_Mobile_VoIP_security_Pr Tonye 35
Complete the table by giving the location and role of each interface of the LTE network
architecture
Interface
Location Role
s
S1-MME
S1-U
S2a
S3
S4
S5 / S8
S6d
S6a
S10
S11
S12
SGi
Wireless_Mobile_VoIP_security_Pr Tonye 36
Table giving the location and role of each interface of the LTE network architecture
Interfaces Rôles
S1-MME (entre l'E-UTRAN et le C'est le point de référence pour le protocole de plan de contrôle (S1AP) entre
MME). l'E-UTRAN et le MME.
Ce point de référence est utilisé pour le per-bearer user-plane tunnelling,
S1-U (entre l'eNB et le SGW). c'est-à-dire le transport des paquets de données utilisateur entre l'E-UTRAN et
le SGW
S2a (entre PDN-GW et un réseau fournit au plan de l'utilisateur un contrôle relatif et un support de mobilité
de confiance non 3GPP). entre l'accès IP non 3GPP de confiance et la passerelle.
permet l'échange d'informations utilisateur et porteuse pour la mobilité du
S3 (entre le MME et le SGSN).
réseau d'accès inter-3GPP dans un état inactif et / ou actif.
fournit un contrôle et un support de mobilité entre le réseau central GPRS et
S4 (entre le SGW et le SGSN).
la fonction d'ancrage 3GPP du SGW.
S5 / S8 (entre le SGW et PDN- prennent en charge les fonctions de service de données par paquets pour les
GW). utilisateurs itinérants et non itinérants.
S6d (entre le MME et le SGSN). Identique à celle de l'interface S6a.
utilisé pour échanger des données liées à la localisation de l'UE et à la gestion
S6a (entre le MME et le HSS).
des abonnés.
Le point de référence S10 est utilisé pour prendre en charge le transfert
S10 (entre MME et MME).
d'informations utilisateur et le support de réinstallation entre les MME.
Le point de référence S11 prend en charge la mobilité et la gestion du porteur
S11 (entre MME et SGW).
entre MME et SGW.
destiné au tunnelling du plan utilisateur lorsque le tunnel direct a été établi. Il
S12 (entre le SGW et l'UTRAN). est basé sur le point de référence Iu-u / Gn-u en utilisant GTP-U (GPRS
Tunneling Protocol - User plane).
Le point de référence SGi se situe entre le PDN-GW et un réseau de données
SGi (entre le PDN-GW et un PDN
par paquets, comme le réseau externe de données par paquets d'un opérateur
externe).
ou un réseau de données par paquets intra-opérateur.
Wireless_Mobile_VoIP_security_Pr Tonye 37
Interfaces Localisation Rôle
C'est le point de référence pour le protocole de plan de contrôle (S1AP) entre l'E-UTRAN
entre l'E-UTRAN et le
S1-MME et le MME.
MME
Ce point de référence est utilisé pour le per-bearer user-plane tunnelling, c'est-à-dire le
S1-U entre l'eNB et le SGW transport des paquets de données utilisateur entre l'E-UTRAN et le SGW
entre PDN-GW et un fournit au plan de l'utilisateur un contrôle relatif et un support de mobilité entre l'accès
S2a réseau de confiance IP non 3GPP de confiance et la passerelle.
non 3GPP
permet l'échange d'informations utilisateur et porteuse pour la mobilité du réseau
entre le MME et le
S3 d'accès inter-3GPP dans un état inactif et / ou actif.
SGSN
fournit un contrôle et un support de mobilité entre le réseau central GPRS et la fonction
entre le SGW et le
S4 d'ancrage 3GPP du SGW.
SGSN
prennent en charge les fonctions de service de données par paquets pour les utilisateurs
entre le SGW et PDN-
S5 / S8 itinérants et non itinérants.
GW
entre le MME et le Identique à celle de l'interface S6a.
S6d
SGSN
utilisé pour échanger des données liées à la localisation de l'UE et à la gestion des
S6a entre le MME et le HSS abonnés.
Le point de référence S10 est utilisé pour prendre en charge le transfert d'informations
S10 entre MME et MME utilisateur et le support de réinstallation entre les MME.
Wireless_Mobile_VoIP_security_Pr Tonye 39
Table giving the type of script and the role of each element of the virtualized LTE network
architecture
GTP-U/UDP (S1-U) GTP-U/UDP Utilisateur Transport des données utilisateur entre l'UE (User Equipment) et le
réseau de cœur.
GPT-U/UDP (S5-C) GTP-C/UDP Utilisateur Transport des données utilisateur entre le SGW et le P-GW (Packet
Data Network Gateway).
UDP (SGi) UDP Utilisateur Interface entre le réseau LTE et d'autres réseaux (ex : Internet).
Wireless_Mobile_VoIP_security_Pr Tonye 40
Complete the table by giving the specifications of the LTE, LTE-Advanced and
LTE-M networks.
Standard
Largeur spectrale
Débit de données
Débit réel
Nombre maximum de
couches
Nombre maximum de
communications par
terminal
Wireless_Mobile_VoIP_security_Pr Tonye 41
Table by giving the specifications of the LTE, LTE-Advanced and LTE-M networks.
Wireless_Mobile_VoIP_security_Pr Tonye 43
Complete the table by giving for the transport channels: the characteristics, the
uses and the examples of information transmitted
Wireless_Mobile_VoIP_security_Pr Tonye 44
Complete the table by giving for the transport channels: the characteristics, the
uses and the examples of information transmitted
Paging Channel PCH DL Doit être transmis sur toute la Pour diffuser les Canal PCCH
informations de paging sur
zone de couverture de la
l'ensemble de la cellule
cellule
station de base si la
synchronisation en voie
montante a été perdue
Uplink Shared UL.SCH UL Permet l’HARQ et l'adaptation
Wireless_Mobile_VoIP_security_Pr Pour la transmission de Canaux 46
Tonye DCCH,
Channel de lien, l'allocation dynamique données dédiées de contrôle DTCH,
Complete the table by giving for the physical channels: the meaning of the acronym,
the characteristics and the uses
PDSCH
PBCH
PCFICH
PDCCH
PHICH
Wireless_Mobile_VoIP_security_Pr Tonye 47
Complete the table by giving for the physical channels: the meaning of the acronym,
the characteristics and the uses
PDSC Physical Downlink Ses paramètres de transmission Pour la transmission du DL-SCH et du PCH
H Shared chan²nel sont déterminés dynamiquement
par l'adaptation de lien.
PDCC Physical Downlink Le PDCCH est placé dans les Pour ta transmission d'informations de contrôle:
H Control channel premiers symboles OFDM de
schéma de modulation et codage et
Chaque sous-trame.
allocation de ressources du DL-SCH
G (LTE)
ogical channels. A logical channel is associated with one or more data (or signaling)
ows that have common characteristics: type of data transported
ser plane or control plane), flow priority,
ominal throughput (guaranteed or not).
logical channel is therefore characterized by
hat it transports, and not by the way in which the data is conveyed.
Wireless_Mobile_VoIP_security_Pr Tonye 51
Source -
https://www.researchgate.net/publication/378952961_Security_Analysis_of_Critical_5
Wireless_Mobile_VoIP_security_Pr Tonye 52
G_Interfaces
• UE: The UE comprises not only different mobile devices that offer users standard data or voice
services but also the Subscriber Identification Module (SIM) (Universal Integrated Circuit Card
(UICC)) that holds the subscribers’ details and long-term keys used in the initial registration. UEs
enable mobile subscribers to use the services provided by the Mobile Network Operators (MNOs).
Different types of UEs could have various characteristics and features in terms of data rates,
latency, throughput, power supply, and Quality of Service (QoS) required for different
communications such as Internet of Things (IoT) networks and Machine to Machine (M2M)
communications.
• gNodeB (gNB): Provides wireless connectivity for UE to access the DN via 5GC. The Next
Generation (NG)-Radio Access Network (RAN) specification enables the division of the gNB into
two distinct components: the gNB-Distributed Unit (DU) and the gNB-Central Unit (CU) . Both of
them function as logical nodes and are interconnected through the F1 interface.
• The following are the entities in the gNB connected by the critical interfaces studied:
• Radio Unit (RU): Also known as a remote radio, it serves the purpose of converting radio signals
transmitted to and received from the antenna into a digital baseband signal. This digital baseband
signal can then be connected to DU through the fronthaul interface.
• DU: The DU are the result of the functional splitting of the gNB. The DU serves layers 1 and 2 (i.e.,
the lower layers) of the 5G-New Radio (NR) protocol stack such as media access control,
Radio Link Control (RLC), and the Physical Layer (PHY) to support the real-time scheduling
function.
Wireless_Mobile_VoIP_security_Pr Tonye 53
• CU: The CUs are also the result of the gNB function splitting and are
responsible for layers three and four (i.e. the upper layers) of the 5G-
NR protocols stack, such as
Packet Data Convergence Protocol (PDCP) and
Radio Resource Control (RRC) to support non-real-time scheduling
functions.
• Access and Mobility Function (AMF): It is the first entity accessed
by the UE in the 5GC during registration and authentication
procedures before granting access to the home network through
SEcurity Anchor Function (SEAF) located in the AMF. Although there
are many interfaces connecting the AMF with 5G entities, this study
focuses only on the N1 and N2 interfaces connecting the AMF to the
UE and the 5G-AN (i.e gNBs), respectively.
Wireless_Mobile_VoIP_security_Pr Tonye 54
• Session Management Function (SMF): It is responsible for session management, proper coordination, and
selection of the UPF serving the UE. The SMF assigns Internet Protocol (IP) addresses during the
establishment of the Protocol Data Unit (PDU) session to UEs. It also provides the UPF with the parameters of
the required QoS and manages and supervises the interface connecting the CP and the UP. The SMF connects
to multiple interfaces, but we will focus on the N4 interface that connects the SMF with the UPF.
• UPF: It is the only NF in the UP level of the 5GC. It is responsible for connecting UE to the DN (e.g. Internet,
voice, and other services). The UPF has four distinct connection interfaces, N3, N4, N9, and N6, to connect to
RAN, SMF, another UPF, and DN, respectively.
• Security Edge Protection Proxy (SEPP): It is involved in roaming scenarios to establish a secure End-to-End
(E2E) connection between the Home Public Land Mobile Network (PLMN) (H-PLMN) and Visited PLMN
(V-PLMN) for confidentiality and integrity protection. The SEPPs are connected via the N32 interface.
• Other SBANFs: All CP NFs are connected by Application Programming Interface (API)-based interface [10].
They communicate directly or indirectly through direct communication or the Service Communication
Proxy (SCP), respectively. Examples of these NFs are defined in the next few lines. The Unified
Data Management (UDM) provides user details during authentication, roaming, and network access. The
Policy Control Function (PCF) provides the framework that guides user behavior in network access. The
Network Exposure Function (NEF) facilitates the connection of 5G networks with the third party or external NF
and decides on the level of capabilities that can be exposed to trusted services outside the 5GC. The Application
Function (AF) provides application services to the user. Finally, the Network Slicing Selection Function (NSSF)
assigns an appropriate network slice supported by the 5GS to the user request. Figure 2 depicts the most
common NFs in the Service Based Architecture (SBA). These NFs communicate through
Service Based Interface (SBI).
Wireless_Mobile_VoIP_security_Pr Tonye 55
• Uu: It is the radio interface that carries the RRC signaling to control the communication
between the UE and the 5G-AN or gNBs. It is worth noting that in this paper, the security
recommendations and threats related to the Uu interface have been explained within the
section dedicated to N1.
• Xn: It is the interface between two NG-RAN nodes (i.e. gNBs) at the 5G-AN side. It is
represented in the CP as Xn-C and in the UP as Xn-U [11]. It is involved in handover
procedures, data forwarding and flow control in 5G-AN [11]. Therefore, the Xn interface is
a critical interface in 5GS that needs appropriate security measures against attacks. The
XnAP protocol conveys the signaling transmitted through the Xn-C interface.
• F1: It is an open interface that transmits signaling information and user traffic between
gNB-DU and gNB-CU elements. The F1 interface is assigned to both CP and UP as F1-C
and F1-U, respectively. This separation provides interoperability between gNB-CU and
gNB-DU from different vendors.
• The connectivity between DU and CU of the 5G-RAN using the F1 interface. The F1AP
protocol provides the signaling service over the F1-C and the
General Packet Radio Services Tunneling Protocol (GTP)-U protocol carries UP data over
the F1-U interface.
Wireless_Mobile_VoIP_security_Pr Tonye 56
• We will briefly explain the critical interfaces that
connect them and are considered in this study. These
interfaces are denoted by lines with red legends in
previous Figure.
• N1: It is represented as a direct logical interface
between the UE and the AMF. It is a concatenation of
the radio interface Uu (i.e., the air interface between
the UE and gNB) and the N2 interface. It is used to
transmit UE information during registration, session
management, mobility management, and short
message service (SMS). The protocol used on this
interface is the Non-Access Stratum
Wireless_Mobile_VoIP_security_Pr Tonye (NAS). 57
• N2: It connects the 5G-ANand the AMF in the 5GS. It is involved in
signaling during the registration procedure of the UE with the Core
Network (CN). The N2 interface is critical due to the registration
procedure and other CP signaling that pass through it. The NGAP
protocol is used to provide CP signaling through the N2 interface.
• N3: It connects the 5G-AN to the UPF at the UP level of the 5GS. It
is a crucial interface due to its participation in all PDU session
establishments. On the N3 interface, the GTP-U protocol is used to
carry UP traffic and bundle all QoS of the UE.
• N4: It connects the SMF and the UPF. It is an internal interface in
the 5GC that transmits both signaling and sensitive information,
including subscriber information, making the N4 a critical interface.
The Packet Forwarding
Wireless_Mobile_VoIP_security_Pr Tonye 58
• Control Protocol (PFCP) is used on the N4 interface for data communication.
• SBI: It is based on an API connection between NFs within 5GC. An NF producer
uses an SBI interface to offer service to authorized NF consumers [19]. At the
application layer, all CP communications over SBI are via RESTful APIs using
Hypertext Transfer Protocol version 2 (HTTP/2) with
JavaScript Object Notation (JSON) methods [20].
• N9: It connects UPFs and it is crucial during roaming between H-PLMN and
V-PLMN at the UP level. In addition, the N9 interface is involved in mobility
management in 5GS .
• N6: It connects the UPF and the DN. The N6 interface transmits UE traffic to or
from the outside network via UPF to access the requested services or
applications [3].
• N32: It connects NF consumers and producers in different PLMNs. The security
policies on the N32 interface are enforced by the SEPP in the H-PLMN and the
V-PLMN to establish roaming.
Wireless_Mobile_VoIP_security_Pr Tonye 59
Complete the table by giving the meaning of the acronym and the role of each component of
the 5G network architecture.
gNB
NR-RAN
CU
DU
PCF
NSSF
AF
NEF
NRF
UDR
SCP
AUSF
AMF
SMF
SEPP
UPF
CP
UP
Wireless_Mobile_VoIP_security_Pr Tonye 60
Table giving the meaning of the acronym and the role of each component in the 5G network
architecture
Component Meaning of Rule
acronym
UE User Equipment The UE comprises not only the various mobile devices that offer users standard data or voice services,
but also the Subscriber Identity Module (SIM) (Universal Integrated Circuit Card (UICC)), which
contains subscriber details and the long-term keys used during initial registration. UEs enable mobile
subscribers to use the services provided by mobile network operators (MNOs). Different types of UE can
have different characteristics and functionalities in terms of data rates, latency, throughput, power
supply and quality of service (QoS) required for different communications such as Internet of Things
(IoT) networks and Machine to Machine (M2M) communications..
gNB gNODEB Provides wireless connectivity for the UE to access the DN via 5GC. The Next Generation (NG) Radio
Access Network (RAN) specification allows the gNB to be divided into two distinct components: the gNB
Distributed Unit (DU) and the gNB Core Unit (CU). Both function as logical nodes and are
interconnected via the F1 interface..
NR-RAN New radio – Radio Access Technology (RAT) designed to be the global standard for the air interface of 5G networks.
Radio access It is based on Orthogonal Frequency Division Multiplexing (OFDM), just like the 4G Long Term Evolution
network (LTE) standard.
Global standard for a unified, higher-performance wireless radio interface, enabling faster data rates,
lower latency and enhanced connectivity for a wide range of devices and use cases. 5G core technology,
designed to accommodate a diverse set of applications - from mobile broadband to the Internet of Things
(IoT) - in a single framework.
NG-RAN New generation – The NG-RAN access network provides both an LTE radio interface and a 5G-NR radio interface.
Radio access An NG-RAN node is :
network a 5G base station (gNB) providing control plane services and user plane data transmission over the 5G-
NR radio interface;
an advanced 4G base station (ng-eNB) providing control plane services and transmission of user plane
data to mobiles via the LTE radio interface.
A single architecture to accommodate centralized, distributed and monolithic deployments - a
cornerstone of 5G, supporting the deployment of certain functions in the Cloud where beneficial; In
conjunction with this point, the ability to completely separate the control plane (CP) from the user plane
(UP) of a centralized unit, for maximum deployment flexibility - another cornerstone of 5G, as CP and UP
evolve differently. This enables the Radio Access Network (RAN) to keep pace with the evolution (and
“Cloudification”)Wireless_Mobile_VoIP_security_Pr Tonye in recent years..
that has occurred in the core network 61
Table giving the meaning of the acronym and the role of each component in the 5G network
architecture
Compone Meaning of acronym Rule
nt
RU Radio unit Radio unit (RU): also known as a remote radio, it converts the radio signals transmitted
and received by the antenna into a digital baseband signal. This digital baseband signal
can then be connected to DU via the fronthaul interface..
CU Central unit CUs are also the result of the separation of gNB functions and are responsible for layers
three and four (i.e. the top layers) of the 5G-NR protocol stack, such as Packet Data
Convergence Protocol (PDCP) and Radio Resource Control (RRC) to support non-real-
time scheduling functions..
DU Distributed unit DUs are the result of the functional division of the gNB. The DU serves layers 1 and 2
(i.e. the lower layers) of the 5G-New Radio (NR) protocol stack, such as medium access
control, radio link control (RLC) and the physical layer (PHY), to support the real-time
scheduling function..
UDM User identification Unified Data Management (UDM) provides user details for authentication, roaming and
and subscription network access.
management
PCF Policy and Charging The Policy Control Function (PCF) provides the framework that guides user behavior
Function when accessing the network.
NSSF Network Slice The network slicing selection function (NSSF) assigns an appropriate network slice
Selection Function. supported by the 5GS at the user's request..
Slice management.
AF Application function The application function (AF) provides application services to the user.
NEF Network explosure The Network Exposure Function (NEF) facilitates the connection of 5G networks with
function third-party or external NF, and decides the level of capacity that can be exposed to
trusted services outside 5GC. Manages network openness with complete security for
third parties.
Wireless_Mobile_VoIP_security_Pr Tonye 62
SBI Service based These NFs communicate via the service-based interface (SBI). All CP NFs are connected
Table giving the meaning of the acronym and the role of each component in the 5G network
architecture
Component Meaning of Rule
acronym
Security Edge Protection Proxy (SEPP): used in roaming scenarios to establish a secure end-to-end (E2E)
Security Edge
SEPP connection between the home Public Land Mobile Network (PLMN) (H-PLMN) and the visited PLMN (V-PLMN)
Protection Proxy
for confidentiality and integrity protection. SEPPs are connected via the N32 interface.
UPF: this is the only NF at the UP level of the 5GC. It is responsible for connecting the UE to the DN (e.g.
UPF User plane function Internet, voice and other services). The UPF has four distinct connection interfaces, N3, N4, N9 and N6, to
connect to the RAN, the SMF, another UPF and the DN respectively..
CP Core packet Wireless_Mobile_VoIP_security_Pr Tonye 63
Complete the table by giving the location of the interface and its transmission role (signaling
and/or data traffic) in the 5G network architecture.
Uu
Nx
F1
F1-C
F1-U
N1
N2
N3
N4
N6
N9
SBI
N32
Wireless_Mobile_VoIP_security_Pr Tonye 64
Table by giving the location of the interface and its transmission role (signaling and/or data
traffic) in the 5G network architecture
Uu EU and Radio interface that carries RRC signaling to control communication between the UE and
5G-AN or the 5G-AN or gNBs. It should be noted that in this article, security recommendations and
gNBs threats related to the Uu interface have been explained in the section dedicated to N1.
Nx two NG- Interface between two NG-RAN nodes (i.e. gNBs) on the 5G-AN side. It is represented in
RAN the CP by Xn-C and in the UP by Xn-U. It is involved in handover procedures, data
nodes (i.e. transmission and flow control in 5G-AN. Consequently, the Xn interface is a critical
gNBs) interface in 5GS, requiring appropriate security measures against attacks. The XnAP
protocol transmits the signaling sent via the Xn-C interface..
F1 gNB-DU An open interface that transmits signaling information and user traffic between the gNB-
F1-C and gNB- DU and gNB-CU elements. The F1 interface is assigned to both the CP and the UP under
CU the names F1-C and F1-U, respectively. This separation ensures interoperability between
F1-U
elements. gNB-CU and gNB-DU from different suppliers.
Connectivity between DU and CU in the 5G-RAN uses the F1 interface. The F1AP protocol
provides the signaling service on F1-C, and the General Packet Radio Services Tunneling
Protocol (GTP)-U transports UP data on the F1-U interface..
N1 UE and Direct logical interface between UE and AMF. This is a concatenation of the Uu radio
AMF interface (i.e. the air interface between the UE and the gNB) and the N2 interface. It is
used to transmit information about the UE during registration, session management,
mobility management and short message service (SMS). The protocol used on this
interface is Non-Access Stratum (NAS).
Wireless_Mobile_VoIP_security_Pr Tonye 65
Table by giving the location of the interface and its transmission role (signaling and/or data
traffic) in the 5G network architecture
N2 Between 5G-AN
and Connects the 5G-AN and AMF in the 5GS. It is involved in signaling during the UE
AMF registration procedure with the Core Network (CN). The N2 interface is critical because of
the registration procedure and other CP signaling that passes through it. The NGAP
protocol is used to provide CP signaling over the N2 interface.
N3 Between 5G-AN and Connects the 5G-AN to the UPF at the UP level of the 5GS. This is a crucial interface
UPF because of its participation in all PDU session establishments. On the N3 interface, the
GTP-U protocol is used to transport UP traffic and aggregate all UE QoS
N4 Between SMF and UPF Connects the SMF and UPF. This is an internal interface to the 5GC that carries both
signaling and sensitive information, including subscriber information, making the N4 a
critical interface. Packet forwarding. Control Protocol (PFCP) is used on the N4 interface
for data communication.
N6 Between UPF and DN Connects the UPF and DN. The N6 interface forwards UE traffic to or from the outside
network via UPF to access the requested services or applications
N9 Between UPF Connects UPFs and is crucial when roaming between H-PLMN and V-PLMN at UP level.
Additionally, N9 interface is involved in mobility management in 5GS.
SBI API connection It is based on an API connection between NFs within 5GC. An NF producer uses an SBI
between NFs within interface to offer a service to authorized NF consumers. At the application layer, all CP
5GC communications over SBI are done via RESTful APIs using Hypertext Transfer Protocol
version 2 (HTTP/2) with JavaScript Object Notation (JSON) methods..
N32 Connects NF Security policies on the N32 interface are enforced by the SEPP in the H-PLMN and V-
consumers and PLMN to establish roaming
producers in different
PLMNs Wireless_Mobile_VoIP_security_Pr Tonye 66
UWB (Ultra Wide Band)
• Use of a very wide spectral band, with low power consumption
Smart Antennas
• Antennas capable of operating with multiple coding techniques and in virtually any frequency
Smart cells
• Cells that help exponentially increase data throughput through the reuse of available
frequencies.
Software Approach
• Software Defined Radio
• Software Defined networking
• seamless combination of broadband networks
Full virtualization
• HLR, VLR, eNodeB, RAN
• Cloud-RAN
Polar Codes
• They ensure the allocation of information to highly reliable data locations
CP-OFDM is a variant of OFDM that solves the ISI problem. It adds a cyclic prefix to each OFDM symbol. The cyclic prefix
is a copy of the final part of the symbol, which is added at the beginning.
Wireless_Mobile_VoIP_security_Pr Tonye 69
Homework 1a. Complete the comparison table of mobile telecommunications systems from 0G
to 6G: equipment, common names
0G 1G 2G 3G 4G 5G 6G
Mobile
terminal
Base Station
Radio
Subsystem
Radio access
network
Equipment (s)
Core network
Equipments
Core
network
subsystem
Interface
Wireless_Mobile_VoIP_security_Pr Tonye 70
Comparison of mobile telecommunications systems from 0G to 6G: equipment, standards
0G 1G
and security
2G
mechanism
3G 4G 5G 6G
Mobile terminal MS MS MS, SIM, IUCC UE, USIM, IUCC UE, USIM, IUCC UE, eUSIM, M-UE, sCell-UE,
IUCC, eIUCC sCell-AP
Base Station AP BS BTS Node B / NB eNodeB /eNB gNodeB/gNB sCell-RAN, UM-
MIMO BS
Radio Subsystem BSS BSS BSS UTRAN eUTRAN, C-RAN NR, C-RAN CR, SDR, IR
Radio access BS BS BTS, BSC, TCU, PCU Node B et RNC eNB gNB M-UE, sCell-UE,
network Equipment sCell-AP, sCell-RAN,
(s) UM-MIMO BS
Core network MSC, VLR MSC, VLR MSC, VLR, GMSC, MSC, VLR, GMSC, SGW, PGW, MME, UPF; AMF, SMF, Cloudly
Equipments SGSN, GGSN, HLR, SGSN, GGSN, HLR, HSS AUSF, UDM
AuC, EIR, OMC AuC, EIR
Core network NSS NSS NSS, OSS CS, GPRS PS EPC 5GC Cloudly
subsystem
Interface Air Air Um, Abis Uu, Iub, IuCS, IuPS Uu, S1-C, S1-U, X2Uu, S1-U, N1, Cloudly
NG, Xn
Type of cell Micro Macro Macro Macro, Micro Macro, Micro, pico Macro, micro, Macro, micro, pico,
pico, femto, femto, RRH, LAA,
RRH, LAA, Relay, Relay, NR-U, BAN
NR-U
Norms AMPS AMPS, D-AMPS, CDMA2000/EV-DO, LTE, LTE Advanced NR, SDN, NFV, AI/ML, DLT, VLC,
NMT, TACS GSM/GPRS/EDGE/cd WCDMA/HSPA+, NS THz, Quantum
maOne TD-SCDMA, UMTS computing
Security mechanism No No Mobile terminal Mutual Mutual Decentralized Decentralized and
authentication, authentication of authentication of security (any globally managed
Encryption (AN CP, mobile terminal and mobile terminal unsecured area security.
UP) network, Encryption and network, could
(RRC/AN CP, UP), Encryption compromise
Signaling integrity (RRC/AN CP, UP), other parts of
(RRC) Signaling integrity the network),
(RRC), Encryption securing all
(NAS), Signaling connected
integrity (NAS) devices through
Wireless_Mobile_VoIP_security_Pr Tonye software updates 71
Comparison table of characteristics of mobile communication systems
0G 1G from 0G 2Gto 6G 3H 4G 5G 6G
Year 1970 1980 1990 2000 2010 2020 2030
Architecture of Single antenna Single antenna Single antenna Single MIMO Massive MIMO Ultra Massive MIMO
antenna antenna
Maximum frequency 400 Hz 1 MHz 2 MHz 3 MHz 6 GHz 90 GHz 10 THz
Multiplexing FDMA FDMA FDMA/TDMA/CDMA CDMA CDMA OFDMA NOMA
SC-FDMA
NOMA
Level of service voice voice Voice, SMS Voice, Data Video Virtual reality, Touch
Augmented reality
Communication in THz No No No No No Very weak widely
Mobility support Until 10 km/h Until 50 km/h Until 100 km/h Until 250 Until 350 km/h Until 500 km/h Until 1000 km/h
km/h
Maximum spectral 0 bps/Hz 8 bps/Hz 8 bps/Hz 8 bps/Hz 15 bps/Hz 30 bps/Hz 100 bps/Hz
efficiency
End-to-end latency Impossible Impossible Impossible 1000 ms 100 ms 10 ms 1 ms
Peak transmission rate 2 kbps 64 kbps 144 kbps 2 Mpbs 1 Gbps 10 Gbps 1 Tbps
Source -
https://www.researchgate.net/publication/368868997_On_the_Road_to_6G_Visions_Requirements_Key_Technolog
ies_and_Testbeds Wireless_Mobile_VoIP_security_Pr Tonye 73
Evolution of key benchmarks of 0G to 6G communication systems
6G requirements:
Peak data rate > 1 Tbps, end-to-end delay < 0.1
ms, processing delay < 10 ns, reliability > 99.99999%, availability >
99.99999%, connection > 0.1%, connection density > 107 devices/km²,
energy efficiency > 100x. compared to 5G, Spectrum efficiency > 5x
compared to 5G, Mobility > 1000 km/h
6G vision:
FeMBB, umMTC, eRLLC/eURLLC, ELPC, LDHMC, High Spectral Efficiency,
High Area Traffic Capacity, MBBBL, mLLMT, AEC
Source https://www.researchgate.net/publication/350625142_Survey_on_6G_Frontiers_Trends_Applications_Requirements_Technologies_and_Future_Research
Wireless_Mobile_VoIP_security_Pr Tonye 74
Evolution of wireless networks towards the future 6G-IoT
Internet of Vehicles
and Autonomous
Driving
Unmanned aerial
vehicles
All features mentioned, Full
coverage, Massive IoT, AI-
All features Internet of Things via
powered mobile applications,
mentioned, Satellite
Ultra HD, Video,
Satellite communications,
Text, SMS, Video Smart IoT Autonomous systems
Internet Access, devices Internet of Things
Text, basic Text, SMS, Mobile Broadband Industryl
Lignes fixes
SMS Internet access
Temps
Source -
https://www.researchgate.net/publication/353792480_6G_Internet_of_Things_A_Comprehensive_Survey
Wireless_Mobile_VoIP_security_Pr Tonye 75
Service provision (Terminal, Access network, Core network,
Service level)Session regarding user request Service composition based on user needs = SE4+SE6+SE8
Session after deterioration SE4 Dynamic provisioning by equivalent QoS = SE2+SE6+SE8
Post-mobility session Dynamic supply after mobility = SE3+SE6+SE8
]
SE12 SE10
SE7 SE8
SE8 SE1 SE9 PROVISION OF
SE2 SE3
SE12
SE4
SE11 SERVICES
SE6
]
SE5
Serviceware
Core network
IMS
PROVISION OF
Infoware
MEDIA
Access network
Access network
Wireless_Mobile_VoIP_security_Pr Tonye 77
User-centric and AI The user forces the entire digital
ecosystem to provide him with services
enrichment
answer
base de connaissances
utilisateur
co e nt
user-centric nt IA
ch
m
ex ri
tu e n
ali
lea
ing
za arn
rn
tio le
in
g
Wireless_Mobile_VoIP_security_Pr Tonye 78
User-centric model
In the user-centric model, the user forces the entire digital ecosystem to provide
him with the services he chooses, which he personalizes, according to the
paradigm "anywhere, anytime, anyhow, anydevice, every service, everyone".
Each user is associated with a knowledge base containing all his information:
- his user profiles (private, work)
- his settings and customizations
- his location
- his calendar
Internet
- Wi-fi - Wimax VoD
School PC2 , Printer2 - LTE Videoconference
Telephony
Mail
Internet
- Wi-fi - Wimax VoD
Home
PC1 , Printer3 - Ethernet - PSTN
- LTE
Videoconference
Telephony
Mail
Wireless_Mobile_VoIP_security_Pr Tonye 80
User Context
Instant T
10:00 hrs 19:00 hrs
Time
Localization
Office Home …………
(Spatiale)
Terminals …………
Videoconference Videoconference
- Wi-fi - Wi-fi
- Wimax - ADSL
- Ethernet
Networks - PSTN …………
NOAM
User NOAM
Wireless_Mobile_VoIP_security_Pr Tonye 81
User-centric and website
• It is a method that consists of analyzing the feelings of Internet
users regarding a website. To do this, it is necessary to analyze
their different behaviors such as the navigation method, the
downloads made, etc.
• Since it is impossible to study all users, we take a representative
sample and perform the analysis on it in order to draw general
conclusions.
• Indeed, the needs and expectations of end users must be taken
into account in the product development process. This is
therefore a behavioral study with respect to an existing product.
• User-centered design is based on usability and
ergonomics criteria that are used in computer design.
Wireless_Mobile_VoIP_security_Pr Tonye 82
5G network service-based architecture
components Roles
PCF (5G Policy and Charging Function including
StandAlone) QoS management.
NSSF (5G Network Slice Selection Function. Slice
StandAlone) management.
AF Special management of data flows.
NEF Manages the opening of the network in
complete security to third parties.
NRF (5G Repository Function. Directory
StandAlone) management
UDR (5G Unified Data Repository
StandAlone)
UDM User identification and subscription
management
AUSF Authenticates users and authorizes their
access to the network
AMF Access authentication and access
authorization, Signaling exchange with the
EU, mobility and connection management
SMF Session management, allocation of IP
addresses to UEs, ensures QoS
UPF Routes data packets between users and
the Internet, Enforces QoS in the user
plane -
Source
https://thesis.unipd.it/retrieve/e195fe68-9c5d-4dbe-be6a-6ae93dbaf1a3/GiambartolomeiFilippo_Pentesting5
GCoreNetwork.pdf Wireless_Mobile_VoIP_security_Pr Tonye 83
e the table by giving the role of each component of the 5G network service-based architecture
component Roles
PCF (5G
StandAlone)
NSSF (5G
StandAlone)
AF
NEF
NRF (5G
StandAlone)
UDR (5G
StandAlone)
UDM
AUSF
AMF
SMF
UPF
Wireless_Mobile_VoIP_security_Pr Tonye 84
giving the role of each component of the 5G network service-based architecture
component Roles
PCF (5G Politique et fonction de facturation, y compris
StandAlone) la gestion de la qualité de service
NSSF (5G Fonction de sélection de tranche de réseau.
StandAlone) Gestion des tranches.
AF Gestion spéciale des flux de données
NEF Gère l’ouverture du réseau en toute sécurité
vis-à-vis des tiers
NRF (5G Fonction de référentiel. Gestion des annuaires
StandAlone)
UDR (5G Référentiel de données unifié
StandAlone)
UDM Identification des utilisateurs et gestion des
abonnements
AUSF Authentifie les utilisateurs et autorise leur
accès au réseau
AMF Authentification d’accès et autorisation d’accès,
échange de signalisation avec l’UE, mobilité et
gestion des connexions
SMFWireless_Mobile_VoIP_security_Pr
Gestion des sessions, attribution des adresses
Tonye 85
IP aux UE, garantie de la QoS
Complete the table by giving the location of the interface and its transmission role (signaling
and/or data traffic) in the 5G network service architecture
Wireless_Mobile_VoIP_security_Pr Tonye 86
Complete the table by giving the location of the interface and its transmission role (signaling
and/or data traffic) in the 5G network service architecture
Wireless_Mobile_VoIP_security_Pr Tonye 87
Roles of components or mechanisms of 4G and 5G network technologies (1/4)
4G 5G ROLES
eNB gNB
SGW, UPF
PGW
MME AMF+SMF
HSS AUSF+UDM
NRF (5G
StandAlone)
UDR (5G
StandAlone)
PCF (5G
StandAlone)
NSSF (5G
StandAlone)
Wireless_Mobile_VoIP_security_Pr Tonye 88
Roles of components or mechanisms of 4G and 5G network technologies (2/4)
4G 5G ROLES
PCRF
(4G/5G
NSA)
SGWC
(4G/5G
NSA)
SGWU
(4G/5G
NSA)
Wireless_Mobile_VoIP_security_Pr Tonye 89
Roles of components or mechanisms of 4G and 5G network technologies (3/4)
4G 5G ROLES
Data slicing
Beamformin
g
Antenne Massive
MIMO MIMO
Wireless_Mobile_VoIP_security_Pr Tonye 90
Roles of components or mechanisms of 4G and 5G network technologies (4/4)
components Roles
SPR
OFCS
OCS
AF
NEF
Wireless_Mobile_VoIP_security_Pr Tonye 91
Roles of components or mechanisms of 4G and 5G network technologies (1/4)
4G 5G ROLES
eNB gNB gNB: radio resource management, Handover, Beamforming
eNB: radio resource management, Handover
SGW, UPF UPF: routes data packets between users and the Internet, Enforces QoS
PGW in the user plane
PGW: routes packets between UE and internet, manages data security,
sets QoS policies
SGW: routes packets between UE and LAN, traffic routing, enforces QoS
MME AMF+SMF AMF: Access authentication and access authorization, Signaling
exchange with the EU, mobility and connection management
SMF: session management, allocation of IP addresses to UEs, ensures
QoS
MME: user authentication, download subscriber profiles and manage
mobility
HSS AUSF+UDM AUSF: authenticates users and authorizes their access to the network.
UDM: User identification and subscription management
HSS: stores subscriber information
NRF (5G NRF: Repository Function. Directory management
StandAlone)
UDR (5G UDR: Unified Data Repository
StandAlone)
PCF (5G PCF: Policy and Charging Function including QoS management
StandAlone) Wireless_Mobile_VoIP_security_Pr Tonye 92
NSSF (5G NSSF: Network Slice Selection Function. Slice management
Roles of components or mechanisms of 4G and 5G network technologies (2/4)
4G 5G ROLES
PCRF PCRF: Policy and Charging Rules Function
(4G/5G
NSA)
SGWC SGWC: Serving Gateway Control Plane (Plan de contrôle
(4G/5G de la passerelle de desserte)
NSA)
SGWU SGWU: Serving Gateway User Plane (plan d'utilisateur de
(4G/5G la passerelle de desserte)
NSA)
Wireless_Mobile_VoIP_security_Pr Tonye 93
Roles of components or mechanisms of 4G and 5G network technologies (3/4)
4G 5G ROLES
Data slicing :
The delivered signal is directed in a specific direction.
Data slicing With data slicing, the signal delivered by 5G antennas is targeted and
adapted to the needs of each user.
It allows real-time and à la carte network management.
Beamforming :
Emit a very narrow beam of signals targeting terminals connected to the
5G network.
The 5G signal is only emitted when a device needs to connect to the
Beamformin network or use a service.
g The beam from the 5G antenna is therefore directed and does not
propagate elsewhere.
The energy required to connect a device is reduced.
This makes it possible to improve the stability of the transmitted signal
and its power, particularly in saturated places, such as public places.
Antenne MIMO :
MIMO (Multipe Input Multiple Output) from 4G+, implying higher
speeds and range than 4G.
A dozen connectors (radiating elements or miniature antennas) on
MIMO antennas.
Massive MIMO :
Antenne Massive Massive MIMO (to dynamically and more efficiently direct power to each
MIMO MIMO Wireless_Mobile_VoIP_security_Pr Tonye 94
user).
Roles of components or mechanisms of 4G and 5G network technologies (4/4)
components Roles
SPR Manages session routing and service policy enforcement.
Wireless_Mobile_VoIP_security_Pr Tonye 95
Massive Antennas – Smart Surfaces
Wireless_Mobile_VoIP_security_Pr Tonye 97
6G architecture overview
• In addition to the user and
control planes, the AI plane
(A-Plane) is added. Adopted
from, networking, storage
and computation have all
become more simplified.
The transport network is
condensed. In addition,
cloud-centric lambda
functions progressively
disaggregate the elements
of the 3GPP logical network. Source - https://www.preprints.org/manuscript/202405.0715/v
Wireless_Mobile_VoIP_security_Pr Tonye 98
6G network Architecture
• The architecture has the basis for
data analysis and advanced
networking which can support the
transfer and storage of large data
quickly and reliable.
• The system supports game theory,
control theory and many other
functions for routine decision -making
and the use of the block chain.
• The Quic (Quic Udp Internet
Connections) protocol reduces the
problems encountered in previous
networks.
• Architecture provides air, spatial and
maritime connectivity.
• This requires intelligence, calculation
power and wireless connectivity.
Wireless_Mobile_VoIP_security_Pr Tonye 99
6G network architecture
• MUEs use a variety of technologies to communicate with macro base stations. The most commonly
used technology today is LTE (Long-Term Evolution), a wireless communication standard used by
most cellular networks worldwide. LTE uses OFDM (orthogonal frequency division multiplexing) to
transmit data on several subcarriers simultaneously, enabling high-speed data transmission.
• In addition to LTE, MUEs can also use other wireless technologies such as 5G, 4G, 3G and 2G. Each
of these technologies has its own set of specifications and capabilities, and the choice of technology
depends on the specific needs of the user and the network operator..
Source - Eric Michel Deussom Djomadji, Emmanuel Tonye (2018), Algorithmes heuristiques pour l'optimisation de modèles de
propagation - Méthodes d'optimisation des modèles de propagation par des algorithmes génétiques, essaim de particules et recuit
simulé, Editions universitaires européennes
Wireless_Mobile_VoIP_security_Pr Tonye 106
Propagation model – Pathloss model
(2/2)
• is a function of :
• the distance,
• the frequency,
• the obstacles in the propagation medium,
• the height of the base station antenna,
• the height of the mobile antenna,
• the mobile obstacles in the propagation medium,
• mobile speed,
• rain,
• dry mist (brume sèche)
• Amplitude
• ASK : Amplitude shift keying
• Frequency
• FSK : Frequency shift keying
• Phase
• PSK : Phase shift keying
Synoptic
representation
Spatial representation
A macro cell has certain inadequacies and to resolve them effectively, densifying the network by
deploying small cells is the most optimal solution.
A “small cell” is a radio access point to a telecommunications network covering a fairly small area
and can be deployed in licensed or unlicensed spectrum.
Micro/pico
Wireless_Mobile_VoIP_security_Pr Tonye
Micro/pico 118
Complete the table with comparative characteristics of cell types
Macro BS
Pico ou micro
BS
Femto
RRH (Remote
radio head)
Relay (acts as a
repeater)
LAA (LTE
Licensed
Assisted
Access)
NRU (New
Radio in
Unlicensed)
Wireless_Mobile_VoIP_security_Pr Tonye 119
Comparative characteristics of cell types
Source -
https://www.researchgate.net/publication/364946922_A_Survey_of_6G_Mobile_Systems_Enabling_Technologi
es_and_Challenges
Wireless_Mobile_VoIP_security_Pr Tonye 128
Non orthogonal Multiple Access
(NOMA)
Source -
https://www.researchgate.net/publication/364946922_A_Survey_of_6G_Mobile_Systems_Enabling_Technologi
es_and_Challenges
Source -
https://www.researchgate.net/publication/364946922_A_Survey_of_6G_Mobile_Systems_Enabling_Technologi
es_and_Challenges
Source -
https://www.researchgate.net/publication/364946922_A_Survey_of_6G_Mobile_Systems_Enabling_Technologi
es_and_Challenges
Macrocell-user equipment
M2M
M2H
Source -
https://www.researchgate.net/publication/332726164_The_Roadmap_to_6G_--_AI_Empowered_Wirel
ess_Networks Wireless_Mobile_VoIP_security_Pr Tonye 135
AI-enhanced wireless networks
A. From Network Softwarization to Network
Intelligence
B. A network of sub-networks - Local vs. global
evolution
C. Towards intelligent radio (IR)
D. Planning and operating data-driven networks
• Standard 95 interim, often abbreviated in IS-95, and often called CDMAONE, uses
the CDMA multiplexing technique (Code Division Multiple Access)
• GPS - Global Positioning System (Global Positioning System "or" Satellite geo -
positioning ")
Source:
Wireless_Mobile_VoIP_security_Pr Tonye 155
https://www.slideshare.net/mobile/3G4GLtd/intermediate-security-in-mobile-cellular-networks
Authentification
• Authentication is done by AKA
(Authentication and Key Agreement
Procedure)
• In 2G we had only handset authentication
whereas in 3G and 4G we do mutual
authentication to verify the handset as well
as the base station.
https://developer.orange.com/wp-content/uploads/Livre-Blanc-sur-la-sécurité-du-nomadisme.pdf
Wireless_Mobile_VoIP_security_Pr Tonye 159
GSM Safety
- Authentification
- Signalling and traffic data confidentiality
- Integrity !
Source:
http://www-file.huawei.com/-/media/CORPORATE/PDF/white%20paper/5g_security_ar
chitecture_white_paper_en-v2.pdf?la=en
Wireless_Mobile_VoIP_security_Pr Tonye 162
Wireless_Mobile_VoIP_security_Pr Tonye 163
Wireless_Mobile_VoIP_security_Pr Tonye 164
Wireless_Mobile_VoIP_security_Pr Tonye 165
Security algorithms
A variety of security
algorithms are used to
provide authentication,
cryptographic key
generation, integrity
and confidentiality of
radio links to users on
mobile networks.
Details of the different
algorithms and how
they can be achieved
are given opposite.
Source: https://www.gsma.com/security/security-algorithms/
Wireless_Mobile_VoIP_security_Pr Tonye 166
Slice Isolation Technique to Mitigate the Impact of DDoS Attacks on 5G Core
Network (1/2)
• Left Figure. Network
configuration C1 with shared
SMF and UPF. Yellow
rectangles represent
dedicated VMs. Network
entities belonging to slice 1
are represented in green,
while purple is used for slice
2. Shared SMF and UPF are
represented by a gradient of
both colors. The rest of the
core VNFs are represented by
white blocks, while gNBs are
blue. The other figures follow
a similar color code.
• Right Figure. Network
configuration C2 with isolated
SMF and UPF. Wireless_Mobile_VoIP_security_Pr Tonye 167
Slice Isolation Technique to Mitigate the Impact of DDoS Attacks on 5G Core
Network (1/2)
• UERANSIM Installation
• https://github.com/aligungr/UERANSIM/wiki/Installation
• https://free5gc.org/guide/5-install-ueransim/#1-install-ueramsim-vm
• OpenAirInterface Installation
• https://gitlab.eurecom.fr/oai/openairinterface5g/-/blob/develop/doc/BUILD.md
• OpenAirInterface
• https://www.youtube.com/watch?v=EZznsW4cmcM
• Openairinterface 5g core network,
https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-fed/-/blob/master/docs/DEPLOY_SA5G
_BASIC_DEPLOYMENT.md
, 2022
1. Attaque par
dictionnaire
2. Attaque par force
brute
3. Injection SQL
4. DoS et DDoS
6. Injection NoSQL
7. Détournement de clics
(Clickjacking)
8. Annuaire transversal
9. Robustesse du jeton
Web Json
Echelle de vulnérabilitéTonye
Wireless_Mobile_VoIP_security_Pr : OUI, NON, // (Pas effectué
175
Représentation des attaques et coeurs affectés par celles-ci (1)
Legend:
• Yes = Exploitable
• No = Not Exploitable
• / = Not applicable
“Free5gc,” https://github.com/free5gc/free5gc/wiki, 2022
Wireless_Mobile_VoIP_security_Pr Tonye 176
Comparaison de niveau de vulnérabilités STRIDE
Open5GS Free5GC OpenAirInterface
1. Spoofing (Usurpation)
2. Tampering
(Falsification)
3. Repudiation
(Répudiation)
4. Information disclosure
(Divulgation
d’information)
5. Denial of service (Déni
de service)
6. Elevation of privilege
(Augmentation des
privilèges)
Echelle de vulnérabilitéTonye
Wireless_Mobile_VoIP_security_Pr : OUI, NON, // (Pas effectué
177
MAPPING OF STRIDE CATEGORIES (I.E. A
THREATS) TO THE SECURITY GOAL THAT
PROTECT AGAINST THEM
WhatWeb
Nikto
Dirbuster et Dirb
Burpsuite
Nessus
Hping3
SlowLoris
Hulk
JohnTheRipper
Dirbuster et Dirb Forcer brutalement une page Web spécifique, dans le but de découvrir des répertoires et des fichiers cachés avec l'utilisation d'une interface graphique pour
Dirbuster
Burpsuite l'un des outils le plus utilisé par la communauté. En effet, il fournit une grande variété de techniques implémentables pour plusieurs attaques. Tant le
dictionnaire que l'attaque par force brute ont utilisé une liste de mots : pour le premier cas, elle est composée de mots, tandis que pour le second,
l'ensemble est composé de caractères appropriés.
Nessus Un scanner de vulnérabilités très puissant qui permet d'effectuer une analyse hautement spécialisée sur une cible. En effet, l'idée derrière cela est qu'il
fournit de nombreuses fonctionnalités qui peuvent être modifiées, afin de créer l'analyse la plus efficace. Permet d'inspecter l'objectif d'un point de vue
général mais également d'approfondir ses détails en fournissant des modèles d'analyse spécifiques, en se concentrant uniquement sur des ports, des services
ou une page de connexion spécifiques.
Hping3 Utilisé pour la création de paquets ICMP, TCP et UDP. Cet outil réseau a pour but d'élaborer, selon quelques spécificités, le paquet le plus efficace dans une
situation pour une attaque DoS (Deni de service).
SlowLoris Outil DoS à faible bande passante, il permet d'exploiter un déni de service (DoS) contre un serveur Web cible. L’idée derrière cela est que SlowLoris conserve
autant de connexions ouvertes que possible. De cette façon, la victime se retrouve inondée de requêtes qui ne peuvent pas être fermées, submergeant le
pool de connexions du serveur Web spécifique.
Hulk HTTP Unbearable Load King DDoS est un outil unique, totalement distinct de celui déjà présenté. En effet, HULK est capable de générer chaque requête
différente d'une autre, de cette manière chaque paquet envoyé peut éviter la vérification d'un éventuel IDS. En fait, cela modifie le modèle de chaque
requête à partir de l’en-tête.
JohnTheRipper Cet outil a pour objectif principal de déchiffrer le mot de passe. En analysant la manière dont il a été exécuté, JohnTheRipper a travaillé avec une liste de
mots : principalement utilisée pour vérifier une correspondance. En fouillant dans son emploi, l'attaquant doit l'alimenter avec un fichier de hachage, puis
transmettre la liste de mots à utiliser. Dans certains cas, le format est également important et doit être précisé.
Wireless_Mobile_VoIP_security_Pr Tonye 180
Les attaques qui se concentrent sur les interfaces réseau en utilisant
les protocoles. Donner un exemple d’attaque, les outils de test
d’intrusion et les piliers de sécurité concernés
Composants Attaque Outils de test Piliers de sécurité
d’intrusion
UE-AMF Attaque par Nmap, Burp suite Confidentialité /
dictionnaire Authentification
AUSF-UDM Attaque par Burp suite, Dirb Confidentialité /
force brute Authentification
UDM Injection SQL Burp suite, Dirb Confidentialité /
autorisation
PCF-UDM Injection WhatWeb Disponibilité
NOSQL
PCF-UDM Fuite des JohnTheRipper Intégrité /
autorisations Confidentialité /
de base de Disponibilité
données
AMF-RAN-UPF DoS/DDos Nikto, Slow Loris, Intégrité /
Hping3, HULK Confidentialité
Serveur Web(web- Annuaire Hping3 Intégrité /
UPF) transversale Confidentialité
Serveur Web Détournemen Slowloris Confidentialité /
t des clics autorisation
AUSF-AMF Robustesse JohnTheRipper, Authentification / non-
du jeton web Slowloris répudiation /
Les attaques qui se concentrent sur les interfaces réseau en utilisant
les protocoles. Donner un exemple d’attaque, les outils de test
d’intrusion, les piliers de sécurité concernés et les contre- mesures
Composants Attaque Outils de test d’intrusion Piliers de sécurité Contre-mesures aux
attaques
concernés
UE-AMF Attaque par Nmap, Burp suite Confidentialité / Chiffrement des paquets
entrants et sortants du réseau
dictionnaire Authentification
AUSF-UDM Attaque par Burp suite, Dirb Confidentialité / Chiffrement des paquets
entrants et sortants du réseau
force brute Authentification
UDM Injection SQL Burp suite, Dirb Confidentialité / Vérification de privilèges des
utilisateurs qui se connecte à la
autorisation base de données
Source https://www.researchgate.net/publication/350824205_6G_Security_Challenges_and_Potential_Solutions