# 網路管理final # 大厝歹拚掃 ## 5G 核心網路設計與實作 + free5GC:第五代行動網路之核心網路開發及架構 1. List 3 advance of 4G as compared with 3G. :::spoiler 投影片 ![image](https://hackmd.io/_uploads/rJZ_GS-_a.png) ::: - <font color="red">**Packet-switched only core network**</font> - <font color="red">**Simplified architecture/Flat architecture**</font> - <font color="red">**Separation of control plane and user plane**</font> 2. List 3 Key 5G Use Cases. :::spoiler 投影片 ![image](https://hackmd.io/_uploads/ByDFGB-Op.png) ::: - <font color="red">**eMBB(enhanced Mobile Broadband)**</font> - <font color="red">**URLLC(Ultra Reliable Low Latency Communications)**</font> - <font color="red">**mMTC(massive Machine Type Communications)**</font> 3. Briefly describe the full name and list 3 functions of the following functions of 5G network functions. AMF, SMF, UPF, AUSF, PCF, NSSF. :::spoiler 投影片 ![image](https://hackmd.io/_uploads/r1CQfrbua.png) ::: - AMF: **Access and Mobility management Function** - SMF: **Session Management Function** - UPF: **User Plane Function** - AUSF:**Authentication Server Function** - PCF: **Policy Control Function** - NSSF: **Network Slice Selection Function** 4. Draw the architecture of 5G Non-Standalone Type 3 and 3a. ![image](https://hackmd.io/_uploads/HJEIMHb_6.png) 5. Draw the 5G SBA architecture with UE, gNB, UPF, and AMF, SMF, UPF, AUSF, PCF, NSSF ![image](https://hackmd.io/_uploads/B1GszSWOp.png) 6. What is the 5G e2e latency and air latency, respectively? :::spoiler 投影片 ![image](https://hackmd.io/_uploads/rJv3MrZup.png) ::: - **E2E latency: end-to-end (端點到端點) 的延遲時間** < 5ms (2反過來5) - **air latency: 資料在空氣中傳播造成的延遲** < 1 ms (a1r) 7. What is SBA in 5G? :::spoiler 投影片 ![image](https://hackmd.io/_uploads/rk56GBbuT.png) ::: **Elements are defined as** <font color="blue">**network functions**</font> **that offer their** <font color="blue">**services**</font> **via interfaces of a common framework.** 8. List two types of SBI in 5G and draw their architecture, respectively. :::spoiler 投影片 ![image](https://hackmd.io/_uploads/H1ykQBZOp.png) ![image](https://hackmd.io/_uploads/B1dyQB-u6.png) ::: - **Request - Response** - **Subscribe - Notify** - architecture - 投影片(3/3) ![image](https://hackmd.io/_uploads/r1-lQr-dT.png) 9. List 2 popular open source 5G core network and 1 popular RAN emulator - **open5gs、free5gc** - **ueransim** ## 4-4-1 5G 安全挑戰與要求 1. 5G security scope is partitioned into four different domains, what are them? :::spoiler 投影片 ![image](https://hackmd.io/_uploads/SJTZVBZ_T.png) ::: - **User** - **Network** - **OAM&P** - **Security Management** 2. List the first 3 security domains in 5G. :::spoiler 投影片 ![image](https://hackmd.io/_uploads/BkhEVSb_a.png) ::: - **Network access security** - **Network domain security** - **User domain security** 3. What is bidding down attacks in 5G security. :::spoiler 投影片 ![image](https://hackmd.io/_uploads/Sy-94r-_T.png) ::: - **(讓你沒辦法存取5g)** - An attacker could attempt a bidding down attack **by making the UE and the network entities respecively believe that the other side does not support a secutiey feature**, even when both sides in fact support that security feature 4. What is the key length of 5GC and NG-RAN encryption and integrity protection algorithms? :::spoiler <font size="4">**chatGPT**</font> - The key length for encryption in 5GC and NG-RAN is typically **128 bits** for Advanced Encryption Standard (AES-128), and for integrity protection, algorithms like UIA2 and CIA2 use a key length of **128 bits**. Keep in mind that specifications may evolve, so it's advisable to refer to the latest 3GPP documentation for the most up-to-date information. ::: - <font color="red">**128 bits**</font> 5. List three significant improvements to combat false base stations in 5G system. <Study on 5G Security Enhancement against False Base Stations (FBS) (3GPP TR 33.809)> ::: spoiler 投影片 ![image](https://hackmd.io/_uploads/BJTrSSW_T.png) ::: - **SUPI concealment** - **Guaranteed GUTI refreshment** - **Protected redirections** - **A general informative detection framework** - 5G security inherited from earlier generations like mutual authentication between UE and network, integrity protected signalling, and secure algorithm negotiations. 6. Two categories of attacks against 5G UEs over radio interfaces :::spoiler 圖片 ![image](https://hackmd.io/_uploads/HykgUBZua.png) ::: - **Active attacks** an attacker actively injects signal or messages to influence what UE would receive - **Passive attacks** an attacker silently sniffs sigals exchanged between a UE and a gNB 7. List 3 different active attacks in 5G. :::spoiler 圖片 ![image](https://hackmd.io/_uploads/H1sEIS-d6.png) ::: - **Radio Jamming** - **Signal Shadowing** - **Message attacks** 8. Passive attacks can be classified into 2 sniffing, What are them? :::spoiler 圖片 ![image](https://hackmd.io/_uploads/rJDS8SW_a.png) ::: - **Uplink sniffing** - **Downlink sniffing** 9. List the first 3 Key Issues of 5G Security? :::spoiler 圖片 ![image](https://hackmd.io/_uploads/SkrYLrbO6.png) ::: - **Security of unprotected unicast messages** - **Security protection of system information** - **Network detection of false base stations** 10. Please draw the architecture of FBS authentication relay attack in the same PLMN ![image](https://hackmd.io/_uploads/BJLUDBWdp.png) 11. List 3 messages between the UE and the network with a MitM FBS. :::spoiler 投影片 ![image](https://hackmd.io/_uploads/ryTMdH-_T.png) ::: - **The pre-authentication traffic** - **MAC/RLC layer message headers** - **Lower layer control messages such as buffer status reports** 12. How to support high handover robustness during Conditional Handover in order to avoid UE Connecting to False Base Station :::spoiler 圖片 ![image](https://hackmd.io/_uploads/B1LTOHZ_T.png) ::: - **support conditional handover in addition** - the source gNB A sends threshold to the UE to make the handover decision - additional signalling to report measured signalling is not needed so that HO rebustness can be guaranteed 13. List 2 new 5G features related to service delivery for CIoT capable Ues. :::spoiler 圖片 ![image](https://hackmd.io/_uploads/rJ0gFSWda.png) ::: - **for the ++infrequent++ transmission of small data** - **for the ++frequent++ transmission of small data and is targeted at more active Ues** ## 5G Security Overview 1. List 3 Challenges of Cellular Network. ::: spoiler 圖片 ![image](https://hackmd.io/_uploads/r1WzEB-d6.png) ::: - **Wireless medium**: boardcast nature - **Mobility**: changes in network attachment points - **Wireless device constraints** 2. For security in 5G, list 3 Device Threats. ::: spoiler 圖片 ![image](https://hackmd.io/_uploads/r1FvVSZd6.png) ::: - **Bots** - **DDoS** - **MitM Attacks** - **Firmware Hacks** - **Device Tempering** - **Malware** - **Sensor Suceptibility** 3. For security in 5G, list 3 Air Interface Threats. ::: spoiler 圖片 ![image](https://hackmd.io/_uploads/r1FvVSZd6.png) ::: - **Jamming** - **MitM Attacks** - **Eavesdropping** 4. For security in 5G, list 3 Core Network Threats. ::: spoiler 圖片 ![image](https://hackmd.io/_uploads/r1FvVSZd6.png) ::: - **Software issues** - **API vulnerabilities** - **Networking Slicing issues** - **DoS and DDoS attacks** - **Improper Access Control** - **Virtualization issues** 5. List the first 3 security domains in 5G. :::spoiler 圖影片 ![image](https://hackmd.io/_uploads/SJ5KESbu6.png) ::: - **Network access security** - **Network domain security** - **User domain security** 6. Draw the architecture and describe the mechanism using encryption algorithm with SUPI and SUCI for Trust Model: Roaming Scenario in 5G security. - (SUPI + public key -> SUCI; SUCI + private key -> SUPI) ![image](https://hackmd.io/_uploads/HyhT4r-d6.png) 7. What is bidding down attacks in 5G security. ::: spoiler 圖片 ![image](https://hackmd.io/_uploads/rk6kHH-up.png) ::: - **making UE and network entities believe that the other side does not support a security feature** 8. What is the key length Requirement on 5GC and NG-RAN related to AS and NAS protection. ::: spoiler 圖片 ![image](https://hackmd.io/_uploads/ryUZHB-dT.png) ::: - **128 bits** 9. What is the key length Requirement on 5GC and NG-RAN related to Network interfaces. :::spoiler 圖影片 ![image](https://hackmd.io/_uploads/ryUZHB-dT.png) ::: - **256 bits** ## 5G Authentication 1. What is the General solution for Remote Authentication in 5G? :::spoiler 圖影片 ![image](https://hackmd.io/_uploads/SJl4SSB-OT.png) ::: - General solution: <font color="blue">**challenge-response protocols**</font> 2. What are 2 goals of 5G Authentication? :::spoiler 圖影片 ![image](https://hackmd.io/_uploads/Hyt8HHZdT.png) ::: - **Mutual authentication** between UE and network - **Providing keying material for subsequent security procedures** 3. What are 2 Main functions of AKA? :::spoiler 圖片 ![image](https://hackmd.io/_uploads/H1FPSBWO6.png) ::: - **Mutual authentication** - **Derive cryptographic keying materials** 4. Describe the architecture for Initial Attach and Re-attach of 4G EPS-AKA, including two IDs in identifying UEs in LTE networks. ![image](https://hackmd.io/_uploads/rJTOBSZ_p.png) ![image](https://hackmd.io/_uploads/r1hKrr-Op.png) ![image](https://hackmd.io/_uploads/r1QqHrWdT.png) ![image](https://hackmd.io/_uploads/HJksBBZda.png) 5. What are Weaknesses in 4G EPS-AKA? ::: spoiler 圖片 ![image](https://hackmd.io/_uploads/rJxRSHZda.png) ::: - UE IDs are sent over the air without encryption - Authentication is made solely by the serving network 6. What is 5G Permanent Identifier? What is 5G Permanent Identifier with Privacy? What are the difference between them? - 1. SUPI - 2. SUCI - 3. - A privacy preserving ID containing the concealed SUPI - Only the MSIN part of the SUPI gets concealed :::spoiler 圖影片 ![image](https://hackmd.io/_uploads/SJgx8H-_a.png) ![image](https://hackmd.io/_uploads/BkXWIHZup.png) ::: 7. List 3 Differences between 5G-AKA and 4G EPS-AKA? :::spoiler 圖片 ![image](https://hackmd.io/_uploads/HyMcIBZ_6.png) ::: - Entities involved in the authentication are different - UE always uses the public key of the 5G home network to encrypt the UE permanent identity - the 5G home network makes the final decision on UE authentication