List 3 advance of 4G as compared with 3G.
List 3 Key 5G Use Cases.
Briefly describe the full name and list 3 functions of the following functions of 5G network functions. AMF, SMF, UPF, AUSF, PCF, NSSF.
Draw the architecture of 5G Non-Standalone Type 3 and 3a.
Draw the 5G SBA architecture with UE, gNB, UPF, and AMF, SMF, UPF, AUSF, PCF, NSSF
What is the 5G e2e latency and air latency, respectively?
What is SBA in 5G?
Elements are defined as network functions that offer their services via interfaces of a common framework.
List two types of SBI in 5G and draw their architecture, respectively.
List 2 popular open source 5G core network and 1 popular RAN emulator
5G security scope is partitioned into four different domains, what are them?
List the first 3 security domains in 5G.
What is bidding down attacks in 5G security.
What is the key length of 5GC and NG-RAN encryption and integrity protection algorithms?
- The key length for encryption in 5GC and NG-RAN is typically **128 bits** for Advanced Encryption Standard (AES-128), and for integrity protection, algorithms like UIA2 and CIA2 use a key length of **128 bits**. Keep in mind that specifications may evolve, so it's advisable to refer to the latest 3GPP documentation for the most up-to-date information.
List three significant improvements to combat false base stations in 5G system.
<Study on 5G Security Enhancement against False Base Stations (FBS) (3GPP TR 33.809)>
Two categories of attacks against 5G UEs over radio interfaces
List 3 different active attacks in 5G.
Passive attacks can be classified into 2 sniffing, What are them?
List the first 3 Key Issues of 5G Security?
Please draw the architecture of FBS authentication relay attack in the same PLMN
List 3 messages between the UE and the network with a MitM FBS.
How to support high handover robustness during Conditional Handover in order to avoid UE Connecting to False Base Station
List 2 new 5G features related to service delivery for CIoT capable Ues.
List 3 Challenges of Cellular Network.
For security in 5G, list 3 Device Threats.
For security in 5G, list 3 Air Interface Threats.
For security in 5G, list 3 Core Network Threats.
List the first 3 security domains in 5G.
Draw the architecture and describe the mechanism using encryption algorithm with SUPI and SUCI for Trust Model: Roaming Scenario in 5G security.
What is bidding down attacks in 5G security.
What is the key length Requirement on 5GC and NG-RAN related to AS and NAS protection.
What is the key length Requirement on 5GC and NG-RAN related to Network interfaces.
What is the General solution for Remote Authentication in 5G?
What are 2 goals of 5G Authentication?
What are 2 Main functions of AKA?
Describe the architecture for Initial Attach and Re-attach of 4G EPS-AKA, including two IDs in identifying UEs in LTE networks.
What are Weaknesses in 4G EPS-AKA?
What is 5G Permanent Identifier? What is 5G Permanent Identifier with Privacy? What are the difference between them?
List 3 Differences between 5G-AKA and 4G EPS-AKA?