NYCU-LYX

A-Overview of Mobile Network

Comments on Jargons

Evolution of mobile networks

Mobile Internet

Mobile Networks

Mobile Services are Ubiquitous

Mobile Network Evolution

1G行動通訊技術只能用於語音通信。
2G行動通訊技術增加了簡單的數據功能。
3G行動通訊技術增加了多媒體功能。
4G行動通訊技術增加了雲計算、物聯網等功能。
5G行動通訊技術將進一步擴展功能,包括高清視頻、虛擬現實、增強現實等。

Standards Body for Mobile Network: 3GPP

The 3rd Generation Partnership Project (3GPP) unites telecommunications standard development organizations (ARIB, ATIS, CCSA, ETSI, TTA, TTC), known as “Organizational Partners” and provides their members with a stable environment to produce the highly successful Reports and Specifications that define 3GPP technologies

What is 3GPP?

Why is 3GPP important?

Cellular Network Standards

From 3G to 4G

Source: http://www.4gamericas.org/(Nov 2014)

4G Technology

What is LTE?

Network Architecture Evolution

Inter-Generation Technologies

Overview of legacy mobile network

2G Network Architecture (GSM)

2G is based on Circuit Switching (CS)

CS Signaling

Packet Switching (PS)

Packets containing data are individually addressed and routed through the network independently.

Instead of reserving a dedicated channel for each user, packet switching dynamically shares the available bandwidth among multiple users and applications.

Each router reads the address on the packet header and directs it towards its destination. This allows efficient routing and avoids congestion at any single point.

share the same network infrastructure, enabling data transmission, video streaming, online gaming, and countless other services

PS Signaling

4G Cellular Network Architecture

MME: Mobility Management Entity
BS: Base Station

3G/4G Cellular Network Architecture

Upcoming 5G

3G/4G Network Operations

Illustration of Data and Control Planes

Data-Plane Protocols: IP + Lower layers

Control Plane in 3G/4G

Distributed Operations

Data and Control Planes Together

How to set up data services?

An Example: Setting Up Data Service in 4G

4G Security Mechanisms

Case Studies on 3G/4G vulnerabilities

Case Study on 4G Vulnerabilities

VoLTE: Carrying Voice in Packets

Free Data-Service Attack against VoLTE

Voice DoS Attack against VoLTE

SMS Spoofing Against SMS-powered Services

SMS Spoofing Attack Snapshots (Facebook)

Stealthy Call DoS Attack

Concurrent Ghost Calls Attack

Overview of 5G mobile network

5G aims: eMBB, MCC, MIoT

5G versus 4G

5G Network Architecture

Enhanced Mobile Broadband (eMBB)

How does 5G Deliver eMBB?

Mission-Critical Control

How does 5G Deliver Mission-Critical Control?

Massive Internet of Things (IoT)

5G Revolution

5G Increases Attack Surfaces from All Aspects

5G System Architecture

5G Security

Secure Design Principles are Adopted

Subscriber and Device Protection

Network Protection

New Network Technologies and Threats

Security Comparison between 4G and 5G

Function 4G 5G
Privacy and Integrity Cipher Encryption on radio path between mobile station and eNodeB
Control plane ciphering and integrity between UE and MME
128-bit algorithms supported
In addition to LTE:
Current support of 256-bit algorithms proposed for future release
Integrity implemented preventing unauthorized change of user data
Authentication Key Agreement (AKA)
Shared key provisioned in the UICC and the AUSF (Authentication Server Function) in the network
Mutual authentication between the UE and the network
In addition to LTE:
Access-agnostic authentication (EAP). 5G-AKA and EAP-AKA’ supported for both 3GPP and non-3GPP access technologies
Protects the confidentiality of the initial non-access stratum (NAS) messages between the device and the network
Security Anchor Function (SEAF) or anchor key
None
Allows UE re-authentication without having to run full authentication
• when moving between different
access networks or even serving networks
Subscriber Permanent Identifier (SUPI)
Identifier sent in plaintext prior to network
authentication
Subscription Concealed Identifier (SUCI)
• using home network public key to
encrypt MSIN (Mobile Subscriber Identification Number) part of the subscriber identifier (IMSI) for confidentiality
Home Control
None
HPMN (Home Public Mobile Network) can verify that UE is present and requesting service from the VPMN
HPMN 和 VPMN 的區別在於:
HPMN 是行動用戶所訂閱的行動網路營運商的網路,而 VPMN 是訪問網路營運商的網路。
• against roaming scenarios and fraud
prevention
Security Edge Proxy Protection
None
Security gateway on interconnections between home network and visited networks
• Protecting home network edge
Network Exposure Function (NEF) None
NF securely expose capabilities and events to 3rd party application functions (AF) via NEF
Enabling secure provision of information in the 3GPP network by authenticated and authorized AFs
Certificate based mutual authentication may be used
After authentication, NEF determines whether the AF is authorized to send requests for the 3GPP network entity

Network Exposure Function (NEF) 是位於核心網路和第三方應用程式之間的功能,它負責將網路服務和功能暴露給第三方應用程式。NEF 使用 API 和其他技術來提供對網路服務的安全訪問。

#