Chapter 5 - 5G Flashcards

1
Q

What are the envisioned profiles in 5G?

A
  • enhanced Mobile Broadband (eMBB): end-user
  • massive Machine Type Communication (mMTC): IoT devices
  • Ultra-reliable and Low Latency (URLLC): Autonomous driving and industry
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the use-cases for 5G?

A
  • Smart cities
  • Autonomous driving
  • Smart manufacturing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the fundamental architecture approach in 5G?

A

Service-based architecture:
- Elements are defined as network functions
- Can be used by any other function via defined interface
- Can be discover using Network Repository Functions (NRF)

  • Allows for complete virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the network functions offered by the 5G home network?

A
  • Universal data management (UDM) function: Provide subscription data
  • Authentication server function (AUSF): Provide authentication services
  • Policy control function (PCF): Subscriber specific policies

If home routed:
- Data network (DN)
- Session management (SMF)
- User plane function (UPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the network functions offered by the serving 5G network?

A
  • Network slice selection (NSSF)
  • Access control and mobility management (AMF)

If local breakout:
- Data network (DN)
- Session management (SMF)
- User plane function (UPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the security-related changes of 5G?

A
  • Allow other authentication methods (e.g. EAP)
  • New 5G AKA
  • Enhanced identity privacy with public key of home network
  • Enhanced paging privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the security related network functions in 5G and what do they do?

A

AMF:
- Contains Security Anchor Function (SEAF):
- Holds the root key for the serving network

AUSF:
- Assists in subscriber authentication

Authentication credential repository and processing function (ARPF):
- Comparable to AuC in 4G

Unified Data Repository:
- Comparable to HLR

UDM:
- Generates authentication vector
- Subscriber Identifier De-conceiling Function (SIDF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is the subscriber identity protected in 5G?

A

Subscriber Permanent Identifier (SUPI) - like IMSI:
- consists of home network identifier and subscriber identifier
- when transmitted over air, subscriber identity is encrypted using pre-shared public key from home network

Subscriber Concealed Identifier (SUCI):
- encrypted identifier

Globally Unique Temporary Identifier (GUTI) - like TMSI:
- Assigned in encrypted fashion by serving network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the 5G AKA work and what additional security does it provide?

A
  • User identification (SUCI/ SUPI)
  • Request from SEAF to AUSF
  • Request from AUSF to UDM/ ARF
  • UDM generates 5G authentication vector: RAND, AUTN, XRES and K_ASF
  • AUSF generates HXRES from XRES and stores XRES
  • AUSF sends RAND, AUTN, HXRES to SEAF
  • SEAF sends RAND, AUTN to UE
  • SEAF computes HRES from RES and compares to HXRES
  • SEAF sends RES to AUSF
  • AUSF compares RES to HRES
  • AUSF sends K_ASF to SEAF
  • Protection against replay attack: Home network knows UE is in serving network, because RES is not sent and cannot be computed from HRES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly