• Title/Summary/Keyword: 5G core network

Search Result 53, Processing Time 0.022 seconds

Trusted Non-3GPP Access Interworking in 3GPP 5G System (3GPP 5G 시스템에서 Trusted Non-3GPP 액세스 연동 기술)

  • Kang, Yoohwa;Kim, Changki
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.639-647
    • /
    • 2018
  • A common core network is the one of main architectural principles in 3GPP 5G System which has common interfaces with different multiple accesses. 3GPP 5G System Phase 1 (Release 15) supports Untrusted Non-3GPP access as well as 3GPP access with common interfaces. Non-3GPP Interworking Function (N3IWF) has been defined to interface with a UE and a core network for supporting Untrusted Non-3GPP access in 3GPP Release 15. However, interworking with Trusted Non-3GPP access is under study to be completed in 3GPP 5G System Phase 2 (Release 16). Therefore, this paper proposes a Trusted Non-3GPP access network architecture and related signaling procedures, and then the implementation based on the proposal shows how to interwork between Trusted Non-3GPP access and the 5G core network. In our proposal, N3IWF can interwork with either Untrusted or Trusted Non-3GPP access without any architectural modification or addition of 3GPP 5G system Phase 1.

An Enhanced Control Protocol Design for LADN in 5G Wireless Networks

  • Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.109-117
    • /
    • 2020
  • In this paper, we analyze LADN(Local Area Data Network) that provides high throughput, low latency and service localization for 5G wireless networks and propose an enhanced control protocol design for LADN in 5G wireless networks. The concept of LADN is newly introduced in 3GPP 5G communication system and the LADN is a data network to which the UE(User Equipment) can connect with a specific LADN session only when the UE is located in a certain service area. If the LADN information between the UE and core network is not identical, the LADN session cannot be properly established. The proposed approach promplty synchronizes the LADN information between the UE and core network by using the specific registration procedure and appropriately establishes the LADN session, when the establishment of the LADN session is failed. Consequently, the proposed enhanced control protocol design(ECP) can prevent unnecessary signalling overhead and communication delay for LADN in 5G wireless networks.

Analysis of Current 5G Open-Source Projects (공개 소프트웨어 기반 5G 프로젝트 개발 동향 분석)

  • Kim, M.J.;Park, K.M.;Park, J.G.;Kim, Y.S.;Lee, J.H.;Moon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.2
    • /
    • pp.83-92
    • /
    • 2021
  • 5G networks are rapidly expanding. Simultaneously, the need for a testbed-not a commercial network-is increasing to verify aspects such as 5G network security vulnerabilities. Open-source projects in 4G networks already exist and are implemented similarly in commercial networks. Due to the compatibilty between 5G and 4G networks, 5G networks are being developed and implemented as open-source projects on the basis of 4G networks. In this study, we review the development trends of 5G open-source projects and simulators that can be used for 5G research.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

5G Network Standard Trend (5G 네트워크 표준화 동향)

  • Won, J.W.;Kwon, Y.S.;Shin, J.H.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.6
    • /
    • pp.97-106
    • /
    • 2016
  • 본고는 2016년 3GPP 표준에서 다루어지고 있는 5G 네트워크의 표준에 관한 동향을 살펴보고자 한다. 주요분야인 네트워크 슬라이싱 기술, QoS, Mobility, Core Network 분야로 나누어 설명한다. SA2에서 TR23.799의 기술문서에 기록될 내용을 개요, Key Issue별로 다루어지는 워크태스크(Work Task)내용, 그리고 솔루션과 표준동향으로 나누어 3단계로 설명하였다.

  • PDF

Trend Analysis of 5G Core-Net Technology (5G 코어 네트워크 기술 동향 분석)

  • Kim, J.S.;Song, J.T.;Kim, J.H.;Jung, H.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.6
    • /
    • pp.37-48
    • /
    • 2013
  • 향후 2020년경에는 현재보다 훨씬 빠른 5세대(5G) 이동통신이 도래할 것으로 예상하고 있다. 현재 5G에 관해서는 EU를 중심으로 여러가지 선행 연구 프로젝트가 진행되고 있는 수준이며, 아직까지 본격적으로 활동하고 있는 국제 표준화 그룹은 없다. 무선 접속(RAN: Radio Access Network) 부분에서는 몇몇 5G 후보 기술을 도출하는 등 나름대로 표준화 방향이 제시되고 있지만, 코어 네트워크(CN: Core Net) 부분에서는 그 활동이 미미한 실정이다. 본 논문은 5G 이동통신의 일반적인 요구사항 및 비전을 살펴보고, 5G 코어 네트워크부분에 대한국내외 연구개발 동향과 주요 요소 기술의 동향을 분석한다.

A Study on 5G Service Methods by using BOCR Model and ANP

  • Song, Inkuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3299-3312
    • /
    • 2022
  • Recently, South Korea preferentially allocated frequencies to build 5G networks as a core competitiveness of the 4th Industrial Revolution. Although the government recognize the importance of 5G construction and preoccupation, network operators have limited to some services, testing the possibility of practical use of 5G. They hesitated to actively build and to carry out the service of a complete 5G network. While 5G is being developed and standardized like this, no one is sure of this step exactly what 5G will be. Thus, following research questions are asked by various stakeholders of 5G market: What is an ideal service providing method for the practical use of 5th generation mobile network? And what are the critical elements to be considered when selecting the service providing method? Therefore, the study aims to investigate 5G service providing issues and elements to be considered and to provide most appropriate service providing method for the practical use of 5G. The results identify that 'Specialized Service' is most appropriate method at the aspects of benefit and opportunity as well as the aspect of risk. In addition, the outcomes imply that the experts replying to the survey not only expect the expansion of emerging market, but also concern the social risk and cost. Since the study dealt with economic, social and business issues in providing 5G service, it might contribute not only to practical research, but also to academic research regarding 5G service method.

Technology Convergence Analysis by IPC Code-Based Social Network Analysis of Healthcare Patents (헬스케어 특허의 IPC 코드 기반 사회 연결망 분석(SNA)을 이용한 기술 융복합 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.5
    • /
    • pp.308-314
    • /
    • 2022
  • This study deals with the technology Convergence Analysis by IPC Code-Based Social Network Analysis of Healthcare Patents filed in Korea. The relationship between core technologies is visualized using Social Network Analysis. At the subclass level of healthcare patents, 1,155 cases (49.4%) of patents with complex IPC codes were investigated, and as a result of Social Network Analysis on them, the IPC codes with the highest Degree Centrality were A61B, G16H, and G06Q, in that order. The IPC codes with the highest Betweenness Centrality are in the order of A61B, G16H, and G06Q. In addition, it was confirmed that healthcare patents consist of two large technology clusters. Cluster-1 corresponds to related business models centered on A61B, G16H and G06Q, and Cluster-2 is consisting of H04L, H04W and H04B. The technology convergence core pairs of the healthcare patent is [G16H-A61B] and [G16H-G06Q] in Cluster-1, and [H04L-H04W] in Cluster-2. The results of this study can contribute to the development of core technologies for healthcare patents.

Standardization Trends in Network Slicing and Management Technologies of 5G Core Network (5G 네트워크 슬라이싱 및 네트워크 관리 기술 표준화 동향)

  • Lee, S.I.;Lee, J.H.;Shin, M.K.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.2
    • /
    • pp.62-70
    • /
    • 2017
  • 5G 네트워크 기술은 4G LTE 이동 통신 기술의 후속 기술로서, ITU-R, ITU-T, NGMN, 3GPP 등의 표준화 그룹을 중심으로 고성능, 저지연, 고가용성 등의 특성을 가지는 새로운 Clean-slate 형태의 이동 통신 시스템 및 네트워크 구조를 설계 중이다. 특히 다양한 5G 융합 서비스를 효율적으로 제공하기 위해 서비스 및 네트워크 자원의 독립성 및 유연성을 지향하는 네트워크 슬라이싱을 적용하고, ETSI NFV 네트워크 기능 가상화 기술을 포함하는 네트워크 관리 구조를 도입하고자 한다. 본고에서는 5G 네트워크 슬라이싱 기술 및 5G 네트워크 관리 기술의 개념 및 요구사항을 분석하고, 이에 대해 3GPP SA WG2 및 SA WG5에서 진행 중인 표준화 현황을 소개한다.

  • PDF

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.