5G Security

When 5G Standalone networks become operational, service providers will be required to adopt new mechanisms for security in 5G, namely 5G Authentication and Key Agreement and SBI (Service Based Interface) security.
Grounded in LTE based techniques, 5G AKA introduces enhancements to protect against fraudulent activity, particularly with respect to key usage and subscriber authentication. For the 5G Service Based Architecture, SBIs are protected using a combination of TLS and OAuth 2.0.
This course seeks to explore each of these areas by initially evaluating the end to end 5G System, in terms of architecture and overall operation, with emphasis on security roles. 5G AKA will then be explored in detail, including signalling flows and API exchange, before concluding with a breakdown of SBI security.

Purchase

LiveOnsite

1 dayEnquire Now

LiveOnline

1 dayEnquire Now

This course is available in the following delivery option(s)

LiveOnline

TRAINING ONLINE
Find Out More

LiveOnsite

TRAINING ON LOCATION
Find Out More
Section 1 - 5G System Architecture
Section 2 - 5G Initial Procedures Overview
Section 3 - 5G Security
Section 4 - 5G API Security

Topic areas covered include:

  • High Level Architecture:
    • 5G RAN Architecture (detailed functionality of RAN functions and reference points):
      • UE, ng-eNB, gNB.
      • Xn, N2, N3.
    • 5G Tracking Areas.
    • 5G RAN Deployment Options.
  • 5G Core Architecture (detailed functionality of 5GC functions and reference points):
    • AMD, SMF, UPF, UDM, AUSF, PCF, AF, Data Network.
    • N1, N4, N5, N6, N7, N8, N9, N10, N11, N12, N13, N14, N15, N35, N36, N37.
  • 5G Service Based Architecture:
    • Network Functions Virtualization.
    • SBA Model.
    • Core Network API usage.
    • Positioning SBA APIs:
      • Nnssf, Nausf, Nnef, Namf, Nnrf, Nsmf, Npcf, Nudsf, Nudm, Nchf, Naf.
    • Complimentary Network Functions for SBA:
      • UDSF, CHF, NRF, NEF, SEPP.
  • Network Slicing:
    • Network Slicing Architectural Considerations:
      • Functionality, Performance, User Groups.
      • S-NSSAI Composition.
      • NSSF, NWDAF.
    • Network Slicing Overview of Operation.
  • Multi-Access Edge Computing.
  • Non-3GPP Architecture.

Topic areas covered include:

  • Identities Used in 5G:
    • Subscriber Related Identities:
      • SUPI, SUCI, 5G-GUTI Composition, PEI, IP Addressing.
    • Network Related Identities:
      • NCGI, gNB ID, TAI, GUAMI, FQDN, DNN.
  • 5G Registration.
  • Network Function Selection.

Topic areas covered include:

  • 5G Security Overview.
  • 5G Security Algorithms:
    • NEA0, NEA1, NEA2, NEA3, NIA0, NIA1, NIA2, NIA3.
    • Null, SNOW, AES, ZUC.
  • Authentication and Key Agreement:
    • AV Generation:
      • KAUSF, XRES*, AUTN, RAND.
  • 5G AKA:
    • Key Derivation at the AMF.
    • Device Authentication.
    • 5G HE AV, 5G SE AV, HXRES*, HRES*, KSEAF.
  • Security Procedures:
    • Key Distribution in 5G:
      • Key Hierarchy.
    • NAS Signalling Security.
    • RRC Signalling Security.
  • Securing AN to CN Communication:
    • IPSec Basic Operation:
      • IPSec ESP.
    • Establishment of gNB Security Associations:
      • X.501 Certificate Exchange.
  • Non-3GPP Access Registration and Security.

Topic areas covered include:

  • SBI Security.
  • HTTPS:
    • TLS Operation.
    • TLS Connection Establishment.
    • TLS Cipher Suites.
  • OAuth 2.0:
    • Access Token Acquisition.
    • Access Token Utilization.
  • Roaming in 5G:
    • Security Edge Protection Proxy.

Follow On Training

The Institute of Telecommunications Professionals (ITP)

The ITP is the UK’s leading independent institution for people who work in telecommunications. It is dedicated to promoting the professional development of members through Professional Registration, training, mentoring and qualifications. The ITP collaborates with regulators, government associations and other leading bodies on projects that are important to the future of the industry. It has worked with businesses including; BT, Cable & Wireless Worldwide, Alcatel-Lucent, Huawei and Vodafone. Find out more about The ITP and how you can become a member.

The Continuing Professional Development Standards Office (CPD)

By providing independent accreditation, the CPD improve the quality of continuing professional development. Their marks of excellence for training providers demonstrate to individual professionals that the learning activity conforms to best practice and is appropriate for inclusion in a formal record.
Find out more about The CPD.