When 5G Standalone networks become operational, service providers will be required to adopt new mechanisms for security in 5G, namely 5G Authentication and Key Agreement and SBI (Service Based Interface) security.
Grounded in LTE based techniques, 5G AKA introduces enhancements to protect against fraudulent activity, particularly with respect to key usage and subscriber authentication. For the 5G Service Based Architecture, SBIs are protected using a combination of TLS and OAuth 2.0.
This course seeks to explore each of these areas by initially evaluating the end to end 5G System, in terms of architecture and overall operation, with emphasis on security roles. 5G AKA will then be explored in detail, including signalling flows and API exchange, before concluding with a breakdown of SBI security.

Intermediate |
6 CPD CREDITS
Share:
Link Copied

Technical Package

£1395.00
5G and Essential Technologies Package*
Get 12 months' on-demand access to this course and our entire library of more than 80 courses.
*Most cost effective option
Buy Package

OnlineAnytime

£400.00 (for 6 months access)
Individual Course
Get on-demand access to this course including all supporting courseware and learning tools.

LiveOnline

LiveOnsite

POA
Live Training
Live training consists of a trainer-delivered course. Choose from live, instructor-led online or live, intrstructor-led onsite.
Section 1 - 5G Assets and Threats

Topic areas covered include:

  • What are We Protecting?:
    • 5G System Architecture.
    • Critical Assets.
  • General Threat Landscape for 5G Networks:
    • General Threat Landscape Overview.
    • Spoofing Identity.
    • Tampering with Data.
    • Repudiation.
    • Information Disclosure.
    • Denial of Service.
    • Privilege Elevation.
  • 5G Core Network Threats:
    • 5G Core Network Threats Overview.
    • AMF Assets and Threats.
    • SMF Assets and Threats.
    • UPF Assets and Threats.
    • UDM Assets and Threats.
  • Access Network Threats:
    • Access Network Threats Overview.
    • gNB Assets and Threats.
Section 2 - 5G Architectural Security

Topic areas covered include:

  • Supporting Security in 5G:
    • 5G Security Overview.
    • Standards Bodies.
  • Protecting Service Based Interfaces – HTTPS:
    • TLS Overview.
    • TLS Operation.
    • Certificate Exchange.
    • TLS Cipher Suites.
  • Protecting the 5G SBA - OAuth 2.0:
    • OAuth 2.0 Basic Concept.
    • Access Token Acquisition.
    • Access Token Utilization.
  • Securing AN to CN Communication:
    • IPSec in 5G.
    • IPSec Basic Operation.
    • Establishment of gNB Security Associations.
  • End to End Security Considerations:
    • Network Slicing – NSSAAF and NSACF.
    • Multi access Edge Computing.
    • Protecting the Subscriber Identity.
  • Roaming Security:
    • Security Edge Protection Proxy.
    • PRINS.
    • IPUPS.
    • Steering of Roaming Protection.
Section 3 - 5G Authentication and Key Agreement

Topic areas covered include:

  • 5G Cryptographic Processes:
    • 5G Security Algorithms.
    • Authentication and Key Agreement.
    • AV Generation.
  • 5G AKA:
    • Mutual Authentication.
    • High Level 5G AKA Procedure.
    • Generation of 5G-SE-AV.
    • Device Authentication.
    • Authentication Confirmation.
  • Key Derivation and Usage:
    • Encryption and Integrity Checking.
    • Key Derivation Process.
  • Security Procedures:
    • Key Distribution in 5G.
    • NAS Signalling Security.
    • RRC Signalling Security.
    • Periodic Local Authentication.