When 5G Standalone networks become operational, service providers will be required to adopt new mechanisms for security in 5G, namely 5G Authentication and Key Agreement and SBI (Service Based Interface) security. Grounded in LTE based techniques, 5G AKA introduces enhancements to protect against fraudulent activity, particularly with respect to key usage and subscriber authentication. For the 5G Service Based Architecture, SBIs are protected using a combination of TLS and OAuth 2.0.This course seeks to explore each of these areas by initially evaluating the end to end 5G System, in terms of architecture and overall operation, with emphasis on security roles. 5G AKA will then be explored in detail, including signalling flows and API exchange, before concluding with a breakdown of SBI security.
Completion Time:
The estimated completion time for this course is six hours. The maximum allotted time is six months from enrollment.
Looking for more 5G training?
Our 5G and Essential Technologies package gives you exclusive access to this course plus 64 more full courses, 60 Telecoms Bytes micro-courses, and the NetX network visualization tool, so you can choose what you want to study and learn at a pace that suits you. Best of all, the 5G and Essential Technologies package gives you a year to explore the catalog and take as many courses and micro-lessons as you need, for one incredibly low price. LEARN MORE
Outline:
- What are We Protecting?:
- 5G System Architecture
- Critical Assets
- General Threat Landscape for 5G Networks:
- General Threat Landscape Overview
- Spoofing Identity
- Tampering with Data
- Repudiation
- Information Disclosure
- Denial of Service
- Privilege Elevation
- 5G Core Network Threats:
- 5G Core Network Threats Overview
- AMF Assets and Threats
- SMF Assets and Threats
- UPF Assets and Threats
- UDM Assets and Threats.
- Access Network Threats:
- Access Network Threats Overview
- gNB Assets and Threats.
- Supporting Security in 5G:
- 5G Security Overview
- Standards Bodies
- Protecting Service Based Interfaces – HTTPS:
- TLS Overview
- TLS Operation
- Certificate Exchange
- TLS Cipher Suites
- Protecting the 5G SBA – OAuth 2.0:
- OAuth 2.0 Basic Concept
- Access Token Acquisition
- Access Token Utilization
- Securing AN to CN Communication:
- IPSec in 5G
- IPSec Basic Operation
- Establishment of gNB Security Associations.
- End to End Security Considerations:
- Network Slicing
- NSSAAF and NSACF
- Multi access Edge Computing
- Protecting the Subscriber Identity
- Roaming Security:
- Security Edge Protection Proxy
- PRINS
- IPUPS
- Steering of Roaming Protection.