• Title/Summary/Keyword: 3GPP Standard

Search Result 77, Processing Time 0.024 seconds

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

Performance Analysis of Cyclostationary Signal Detection Scheme for LTE System (LTE 시스템을 위한 Cyclostationary 신호 검출 기법의 성능 분석)

  • Kim, Seung Jong;Kim, Kyung Ho;Hwang, Yu Min;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.28-32
    • /
    • 2014
  • In this paper, we analyzed the performance of cyclostationary signal detection scheme for LTE system. We applied the cyclostationary signal detection scheme to the cognitive radio(CR) technology, which improves the usage efficiency of spectrums and shares frequencies, and we detected the signal in the long term evolution(LTE) band. LTE system has been designated as the standard to improve the maximum data rate and provide the low latency in the 3rd generation partnership project(3GPP). In this paper, we generated the LTE signals based on the orthogonal frequency division multiple access(OFDMA) and analyzed the performance of signal detection in accordance with the segment and threshold of the generated signals. Gaussian channel was used in the simulation and we discussed the future studies to apply the CR to the LTE system.

An Analysis of Security Vulnerabilities Using 5G NAS COUNT (5G NAS COUNT 취약점을 이용한 보안 위협 분석)

  • Kim, Min-Jae;Park, Jong-Geun;Shin, Ji-Soo;Moon, Dae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.565-573
    • /
    • 2022
  • Current mobile communication system is in the mid-process of conversion from 4G LTE to 5G network. According to the generalization of mobile communication services, personal information such as user's identifiers and location information is transmitted through a mobile communication network. The importance of security technology is growing according to the characteristics of wireless mobile communication networks, the use of wireless shared channels is inevitable, and security technology cannot be applied to all network system elements in order to satisfy the bandwidth and speed requirements. In particular, for security threat analysis, researches are being conducted on various attack types and vulnerability analysis through rogue base stations or attacker UE to make user services impossible in the case of 5G networks. In this paper, we established a 5G network testbed using open sources. And we analyzed three security vulnerabilities related to NAS COUNT and confirmed the validity of two vulnerabilities based on the testbed or analyzing the 3GPP standard.

A Study on Improving Data Poisoning Attack Detection against Network Data Analytics Function in 5G Mobile Edge Computing (5G 모바일 에지 컴퓨팅에서 빅데이터 분석 기능에 대한 데이터 오염 공격 탐지 성능 향상을 위한 연구)

  • Ji-won Ock;Hyeon No;Yeon-sup Lim;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.549-559
    • /
    • 2023
  • As mobile edge computing (MEC) is gaining attention as a core technology of 5G networks, edge AI technology of 5G network environment based on mobile user data is recently being used in various fields. However, as in traditional AI security, there is a possibility of adversarial interference of standard 5G network functions within the core network responsible for edge AI core functions. In addition, research on data poisoning attacks that can occur in the MEC environment of standalone mode defined in 5G standards by 3GPP is currently insufficient compared to existing LTE networks. In this study, we explore the threat model for the MEC environment using NWDAF, a network function that is responsible for the core function of edge AI in 5G, and propose a feature selection method to improve the performance of detecting data poisoning attacks for Leaf NWDAF as some proof of concept. Through the proposed methodology, we achieved a maximum detection rate of 94.9% for Slowloris attack-based data poisoning attacks in NWDAF.

Wireless Internet-IMT-2000/Wireless LAN Interworking

  • Roman pichna;Tero Ojanpera;Harro Posti;Jouni Karppinen
    • Journal of Communications and Networks
    • /
    • v.2 no.1
    • /
    • pp.46-57
    • /
    • 2000
  • Ongoing standardization effort on 3G cellular system in 3GPP (UNTS) is based on GPRS core network and promises a global standard for systems capable of offering ubiquitous access to internet for mobile users. Considered radio access systems(FDD CDMA, TDD CDMA, and EDGE) are optimized for robust mobile use. However, there are alternative relatively high-rate radio interfaces being standardized for WLAN (IEEE802.11 and HIPER-LAN/2) which are capable of delivering significantly higher data rates to static or semi-static terminals with much less overhead. Also WPANs(BLUETOOTH, IEEE802.15), which will be present in virtually every mobile handset in the near future, are offering low cast and considerable access data rate and thus are very attractive for interworking scenarios. The prospect of using these interfaces as alternative RANs inthe modular UMTS architecture is very promising. Additionally, the recent inclusion of M-IP in the UMTS R99 standard opens the way for IP-level interfacing to the core network. This article offers an overview into WLAN-Cellular interworking. A brief overview of GPRS, UMTS cellular architectures and relevant WLAN standards is given. Possible interworking architectures are presented.

  • PDF

Space Economy, Ecosystem Strategies for LEO 5G-NTN Space Communications (우주경제, LEO 5G-NTN 우주통신 생태계 전략)

  • Byungwoon Kim
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.58-66
    • /
    • 2023
  • The latest global issues are the Space economy and low-orbit Space communication. 3GPP announced Release 17 standardization in June 2022, and in this regard, the United States prepared a strategy to enhance the competitiveness of the low-orbit 5G-NTN Space industry, and create an ecosystem at the national level in March 2023. Global smartphone semiconductor manufacturers have announced the development and verification results of standard-based chip technology, and satellite communication operators are launching low-orbit 5G-NTN Space communication services and rate products through convergence between terrestrial communication networks. This study diagnoses the current status of Korea's low-orbit 5G-NTN space communication ecosystem. We present our ecosystem creation strategy in terms of fair competition in the market, the service legal system, and the national R&D governance system.

Cluster Coordinator Node Based Inter-Cell Interference Management Methods in Heterogeneous Networks (이기종 네트워크에서 클러스터 코디네이터 노드 기반의 셀간 간섭 관리 방법)

  • Yang, Mochan;Wu, Shanai;Shin, Oh-Soon;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.3
    • /
    • pp.277-288
    • /
    • 2013
  • 3GPP LTE-Advanced (Third Generation Partnership Project Long Term Evolution-Advanced) as a next generation mobile communication standard introduced small base stations such as femto cells or pico cells, and D2D (Device-to-Device) communications between mobiles in the proximity in order to satisfy the needs of rapidly growing wireless data traffic. A diverse range of topics has been studied to solve various interference situations which may occur within a single cell. In particular, an introduction of a small base station along with D2D communication raises important issues of how to increase the channel capacity and frequency efficiency in HetNets (Heterogeneous Networks). To this end, we propose in this paper methods to manage the interference between the macro cell and other small cells in the HetNet to improve the frequency efficiency. The proposed CCN (Cluster Coordinator Node)-assisted ICI (Inter-Cell Interference) avoidance methods exploit the CCN to control the interference in HetNet comprising of an MeNB (Macro enhanced Node-B) and a large number of small cells. A CCN which is located at the center of a number of small cells serves to avoid the interference between macro cell and small cells. We propose methods of resource allocation to avoid ICI for user equipments within the CCN coverage, and evaluate their performance through system-level computer simulations.

Design and Performance Gain Evaluation of a Multi-Rank Codebook Utilizing Statistical Properties of the Spatial Channel Model (공간 채널 모델의 통계적 특성을 반영한 다중 랭크 코드북의 설계 및 성능 이득 평가)

  • Kim, Changhyeon;Sung, Wonjin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.723-731
    • /
    • 2016
  • A core technological base to provide enhanced data rates required by 5G mobile wireless communications is the improved bandwidth efficiency using massive multiple-input multiple-output (MIMO) transmission. MIMO transmission requires the channel estimation using the channel state information reference signaling (CSI-RS) and appropriate beamforming, thus the design of the codebook defining proper beamforming vectors is an important issue. In this paper, we propose a multi-rank codebook based on the discrete Fourier transform (DFT) matrix, by utilizing statistical properties of the channel generated by the spatial channel model (SCM). The proposed method includes a structural change of the precoding matrix indicator (PMI) by considering the phase difference distributions between adjacent antenna elements, as well as the selected codevector characteristics of each transmission layer. Performance gain of the proposed method is evaluated and verified by making the performance comparison to the 3GPP standard codebooks adopted by Long-Term Evolution (LTE) systems.

Error Handling and Data Synchronization in Policy and Charging Control Architecture in WiMAX (WiMAX 정책 제어 시스템의 정보 동기화)

  • Seol, Soonuk;Cho, Sungsoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.355-367
    • /
    • 2013
  • In the Policy and Charging Control(PCC) architecture of the 3GPP and WiMAX forum, the Policy and Charging Rule Function(PCRF) controls and configures the policies of quality of services(QoS) and accounting to a Policy and Charging Rule Enforcement Function(PCEF). In this paper, we categorize the errors into three types that include a disconnection with peer entity, a delayed or no response and a response with failure result, and propose a scheme to automatically synchronize the data between the PCRF and the PCEF for each type of error. Also, we conduct a quantitative analysis to see how much it can help to maintain the cell capacity of the mobile VoIP service in a WiBro network, which is implemented in Korea according to the standards of WiMAX. We can see that our proposed scheme improves the performances of PCC by preventing the waste of radio resources, the overload of systems, the memory leakage of servers, the system shutdown, and so on. We have validated the scheme by implementation, and reflected it in WiMAX standard documents.

Group Based Two-Layer Mobility Management of MTC Devices in 5G Network (5G 네트워크에서 MTC 단말들의 그룹기반 2계층 이동성 관리 기술)

  • Kim, Nam-Sun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.631-637
    • /
    • 2018
  • In 5G mobile communication, it is necessary to provide different mobility to user equipments(UE) that do not require mobility management or need limited mobility management. In this paper, we propose a two-layer mobility management system that classifies multiple MTC devices with similar mobility levels into c-MTC and m-MTC groups. In order to improve the energy efficiency and service life by reducing the number of control signals generated when TAU is performed, the group header typically performs a Tracking Area Update(TAU) request and adjusts the periodic TAU update period according to the mobility level. The TAU update period of the m-MTC is set to 54 minutes proposed by the 3GPP standard and the c-MTC is set to 12 minutes. Compared to when the UEs perform TAU individually, it is found that the number of control signals decreases by 33% when the MME is not changed and by 49% when the MME is not changed in the m-MTC or c-MTC group.