• Title/Summary/Keyword: 5G Core

Search Result 388, Processing Time 0.278 seconds

Agile Management and Interoperability Testing of SDN/NFV-Enriched 5G Core Networks

  • Choi, Taesang;Kim, TaeYeon;Tavernier, Wouter;Korvala, Aki;Pajunpaa, Jussi
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.72-88
    • /
    • 2018
  • In the fifth generation (5G) era, the radio internet protocol capacity is expected to reach 20 Gb/s per sector, and ultralarge content traffic will travel across a faster wireless/wireline access network and packet core network. Moreover, the massive and mission-critical Internet of Things is the main differentiator of 5G services. These types of real-time and large-bandwidth-consuming services require a radio latency of less than 1 ms and an end-to-end latency of less than a few milliseconds. By distributing 5G core nodes closer to cell sites, the backhaul traffic volume and latency can be significantly reduced by having mobile devices download content immediately from a closer content server. In this paper, we propose a novel solution based on software-defined network and network function virtualization technologies in order to achieve agile management of 5G core network functionalities with a proof-of-concept implementation targeted for the PyeongChang Winter Olympics and describe the results of interoperability testing experiences between two core networks.

A Study on Improving Data Poisoning Attack Detection against Network Data Analytics Function in 5G Mobile Edge Computing (5G 모바일 에지 컴퓨팅에서 빅데이터 분석 기능에 대한 데이터 오염 공격 탐지 성능 향상을 위한 연구)

  • Ji-won Ock;Hyeon No;Yeon-sup Lim;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.549-559
    • /
    • 2023
  • As mobile edge computing (MEC) is gaining attention as a core technology of 5G networks, edge AI technology of 5G network environment based on mobile user data is recently being used in various fields. However, as in traditional AI security, there is a possibility of adversarial interference of standard 5G network functions within the core network responsible for edge AI core functions. In addition, research on data poisoning attacks that can occur in the MEC environment of standalone mode defined in 5G standards by 3GPP is currently insufficient compared to existing LTE networks. In this study, we explore the threat model for the MEC environment using NWDAF, a network function that is responsible for the core function of edge AI in 5G, and propose a feature selection method to improve the performance of detecting data poisoning attacks for Leaf NWDAF as some proof of concept. Through the proposed methodology, we achieved a maximum detection rate of 94.9% for Slowloris attack-based data poisoning attacks in NWDAF.

Service Function Chaining Architecture for Distributed 5G Mobile Core Networks (분산 모바일 코어기반 5G 네트워크에서의 Service Function Chaining 적용구조)

  • Sun, Kyoungjae;Kim, Younghan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1914-1924
    • /
    • 2016
  • In this paper, considering virtualized Evolved Packet Core(vEPC) network for 5G mobile network, we propose architecture for supporting Service Function Chaining(SFC) in 5G mobile network. Using SFC in 5G network, dynamic path configuration and providing network services based on subscriber and traffic information. SFC technology provides logical ordered set of network functions and delivers packet through providing logical path over the physical network. Based on the perspective of 5G core network in distributed manner, we design hierarchical SFC architecture to manage SFC for global path including vEPC and SGi-LAN network, and internal path between virtualized network functions in each cloud. In this paper, we define architecture and call flow for establishing data path using SFC. Finally, we design testbed architecture for real implementation based on open source software.

Trend Analysis of 5G Core-Net Technology (5G 코어 네트워크 기술 동향 분석)

  • Kim, J.S.;Song, J.T.;Kim, J.H.;Jung, H.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.6
    • /
    • pp.37-48
    • /
    • 2013
  • 향후 2020년경에는 현재보다 훨씬 빠른 5세대(5G) 이동통신이 도래할 것으로 예상하고 있다. 현재 5G에 관해서는 EU를 중심으로 여러가지 선행 연구 프로젝트가 진행되고 있는 수준이며, 아직까지 본격적으로 활동하고 있는 국제 표준화 그룹은 없다. 무선 접속(RAN: Radio Access Network) 부분에서는 몇몇 5G 후보 기술을 도출하는 등 나름대로 표준화 방향이 제시되고 있지만, 코어 네트워크(CN: Core Net) 부분에서는 그 활동이 미미한 실정이다. 본 논문은 5G 이동통신의 일반적인 요구사항 및 비전을 살펴보고, 5G 코어 네트워크부분에 대한국내외 연구개발 동향과 주요 요소 기술의 동향을 분석한다.

Towards Scalable and Cost-efficient Software-Defined 5G Core Network

  • Park, Jong Han;Choi, Changsoon;Jeong, Sangsoo;Na, Minsoo;Jo, Sungho
    • Information and Communications Magazine
    • /
    • v.33 no.6
    • /
    • pp.18-26
    • /
    • 2016
  • Network and network functions virtualization (NFV) promise a number of attractive benefits and thus have driven mobile network operators to transform their previously static networks to more dynamic and software-defined networks. In this article, we share a mobile network operator's view based on implementation and deployment experiences in the wild during the past few years towards a software-defined 5G core network. More specifically, we present a practical point of view from mobile network operators and elaborate on why some of the virtualization benefits such as total cost of ownership (TCO) reduction are not easily realized as initially intended. Then, we describe 5G visions, services, and their requirements commonly agreed across mobile operators globally. Given the requirements, we then introduce desirable characteristics of 5G mobile core network and its key enabling technologies.

Trusted Non-3GPP Access Interworking in 3GPP 5G System (3GPP 5G 시스템에서 Trusted Non-3GPP 액세스 연동 기술)

  • Kang, Yoohwa;Kim, Changki
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.639-647
    • /
    • 2018
  • A common core network is the one of main architectural principles in 3GPP 5G System which has common interfaces with different multiple accesses. 3GPP 5G System Phase 1 (Release 15) supports Untrusted Non-3GPP access as well as 3GPP access with common interfaces. Non-3GPP Interworking Function (N3IWF) has been defined to interface with a UE and a core network for supporting Untrusted Non-3GPP access in 3GPP Release 15. However, interworking with Trusted Non-3GPP access is under study to be completed in 3GPP 5G System Phase 2 (Release 16). Therefore, this paper proposes a Trusted Non-3GPP access network architecture and related signaling procedures, and then the implementation based on the proposal shows how to interwork between Trusted Non-3GPP access and the 5G core network. In our proposal, N3IWF can interwork with either Untrusted or Trusted Non-3GPP access without any architectural modification or addition of 3GPP 5G system Phase 1.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.

Technology Trends and Research Direction of 6G Mobile Core Network (6G 모바일 코어 네트워크 기술 동향 및 연구 방향)

  • Ko, N.S.;Park, N.I.;Kim, S.M.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.4
    • /
    • pp.1-12
    • /
    • 2021
  • The competition to lead the next generation of mobile technologies, 6G, is underway while the deployment of 5G has not been implemented worldwide. ITU-R plans to develop technical requirements and standards after completing the 6G Vision by 2023. It can be considered too early to have a concrete view of the 6G core network architecture from this timeline. However, major stakeholders have started making their presence felt by publishing their views. From updated analysis on the technology and service trends proposed, we present a list of research directions on 6G core network from several perspectives: distribution of network functions to nearer edge locations; future fixed-mobile convergence, including low earth orbit satellites; highly-precise QoS guarantee; supporting an extremely wide variety of service requirements; AI-native automation and intelligence; and aligning with the evolution of radio access network.

Performance and Heat Tolerance of Broilers as Affected by Genotype and High Ambient Temperature

  • Al-Batshan, H.A.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.15 no.10
    • /
    • pp.1502-1506
    • /
    • 2002
  • This experiment was conducted to evaluate the effects of the broiler's genotype ($G_t$) and ambient temperature ($T_a$) on performance and core body temperature ($T_core$) of broiler chicks. A factorial arrangement of two $G_t$ (Hubbard and ISA J57 chicks) and two $T_a$ (moderate, $23{\pm}0.5^{\circ}C$ and hot, $33{\pm}0.5^{\circ}C$) were used in this study. Performance data (body weight gain, feed intake and feed:gain ratio) were determined weekly for six weeks. Chicks' $T_core$ was measured using a biotelemetric system between Weeks five and six. Results showed that body weight gain and feed intake were significantly high, and feed:gain ratio was significantly low for Hubbard chicks compared to those of ISA J57 chicks. High $T_a$ significantly reduced weight gain and feed intake. Furthermore, the reduction in body weight gain and feed intake under the hot $T_a$ was more pronounced for Hubbard chicks than those of the ISA J57 chicks resulting in significant $G_t$ by $T_a$ interaction. Chicks grown under moderate $T_a$ had significantly lower $T_core$ than those grown under hot $T_a$. The $T_core$ of the Hubbard chicks was significantly lower than that of the ISA J57 at the moderate $T_a$ while under the hot $T_a$, the magnitude of the change in $T_core$ was more pronounced in Hubbard chicks than that of ISA J57; this resulted in a significant $G_t$ by $T_a$ interaction. The results of this study indicate that chicks with higher potential for growth under thermo-neutral temperature are more susceptible to heat stress than chicks with lower potential for growth. This maybe due, at least in part, to their lower body $T_core$ under moderate temperature and to the lesser ability of these fast growing chicks to regulate their $T_core$ when exposed to heat stress, as was clearly shown on these birds' performance.

Analysis of C5G7-TD benchmark with a multi-group pin homogenized SP3 code SPHINCS

  • Cho, Hyun Ho;Kang, Junsu;Yoon, Joo Il;Joo, Han Gyu
    • Nuclear Engineering and Technology
    • /
    • v.53 no.5
    • /
    • pp.1403-1415
    • /
    • 2021
  • The transient capability of a SP3 based pin-wise core analysis code SPHINCS is developed and verified through the analyses of the C5G7-TD benchmark. Spatial discretization is done by the fine mesh finite difference method (FDM) within the framework of the coarse mesh finite difference (CMFD) formulation. Pin size fine meshes are used in the radial fine mesh kernels. The time derivatives of the odd moments in the time-dependent SP3 equations are neglected. The pin homogenized group constants and Super Homogenization (SPH) factors generated from the 2D single assembly calculations at the unrodded and rodded conditions are used in the transient calculations via proper interpolation involving the approximate flux weighting method for the cases that involve control rod movement. The simplifications and approximations introduced in SPHINCS are assessed and verified by solving all the problems of C5G7-TD and then by comparing with the results of the direct whole core calculation code nTRACER. It is demonstrated that SPHINCS yields accurate solutions in the transient behaviors of core power and reactivity.