黃婷婉
  • NEW!
    NEW!  Connect Ideas Across Notes
    Save time and share insights. With Paragraph Citation, you can quote others’ work with source info built in. If someone cites your note, you’ll see a card showing where it’s used—bringing notes closer together.
    Got it
      • Create new note
      • Create a note from template
        • Sharing URL Link copied
        • /edit
        • View mode
          • Edit mode
          • View mode
          • Book mode
          • Slide mode
          Edit mode View mode Book mode Slide mode
        • Customize slides
        • Note Permission
        • Read
          • Only me
          • Signed-in users
          • Everyone
          Only me Signed-in users Everyone
        • Write
          • Only me
          • Signed-in users
          • Everyone
          Only me Signed-in users Everyone
        • Engagement control Commenting, Suggest edit, Emoji Reply
      • Invite by email
        Invitee

        This note has no invitees

      • Publish Note

        Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note No publishing access yet

        Your note will be visible on your profile and discoverable by anyone.
        Your note is now live.
        This note is visible on your profile and discoverable online.
        Everyone on the web can find and read all notes of this public team.

        Your account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

        Your team account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

        Explore these features while you wait
        Complete general settings
        Bookmark and like published notes
        Write a few more notes
        Complete general settings
        Write a few more notes
        See published notes
        Unpublish note
        Please check the box to agree to the Community Guidelines.
        View profile
      • Commenting
        Permission
        Disabled Forbidden Owners Signed-in users Everyone
      • Enable
      • Permission
        • Forbidden
        • Owners
        • Signed-in users
        • Everyone
      • Suggest edit
        Permission
        Disabled Forbidden Owners Signed-in users Everyone
      • Enable
      • Permission
        • Forbidden
        • Owners
        • Signed-in users
      • Emoji Reply
      • Enable
      • Versions and GitHub Sync
      • Note settings
      • Note Insights New
      • Engagement control
      • Make a copy
      • Transfer ownership
      • Delete this note
      • Save as template
      • Insert from template
      • Import from
        • Dropbox
        • Google Drive
        • Gist
        • Clipboard
      • Export to
        • Dropbox
        • Google Drive
        • Gist
      • Download
        • Markdown
        • HTML
        • Raw HTML
    Menu Note settings Note Insights Versions and GitHub Sync Sharing URL Create Help
    Create Create new note Create a note from template
    Menu
    Options
    Engagement control Make a copy Transfer ownership Delete this note
    Import from
    Dropbox Google Drive Gist Clipboard
    Export to
    Dropbox Google Drive Gist
    Download
    Markdown HTML Raw HTML
    Back
    Sharing URL Link copied
    /edit
    View mode
    • Edit mode
    • View mode
    • Book mode
    • Slide mode
    Edit mode View mode Book mode Slide mode
    Customize slides
    Note Permission
    Read
    Only me
    • Only me
    • Signed-in users
    • Everyone
    Only me Signed-in users Everyone
    Write
    Only me
    • Only me
    • Signed-in users
    • Everyone
    Only me Signed-in users Everyone
    Engagement control Commenting, Suggest edit, Emoji Reply
  • Invite by email
    Invitee

    This note has no invitees

  • Publish Note

    Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note No publishing access yet

    Your note will be visible on your profile and discoverable by anyone.
    Your note is now live.
    This note is visible on your profile and discoverable online.
    Everyone on the web can find and read all notes of this public team.

    Your account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

    Your team account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

    Explore these features while you wait
    Complete general settings
    Bookmark and like published notes
    Write a few more notes
    Complete general settings
    Write a few more notes
    See published notes
    Unpublish note
    Please check the box to agree to the Community Guidelines.
    View profile
    Engagement control
    Commenting
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Suggest edit
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    Emoji Reply
    Enable
    Import from Dropbox Google Drive Gist Clipboard
       Owned this note    Owned this note      
    Published Linked with GitHub
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    # Assignment 2 Study Note ###### tags: `Wireless Communications` ## A table comparing the security threat mentioned in all reference | Threat | Security Considerations of Open RAN | O-RAN Security Task Group | A guide to 5G network security | 5G Security: Forward Thinking | Securing the 5G Era | Security Considerations for the 5G Era | | -------- | -------- | -------- | -------- | -------- | -------- | -------- | | O-RAN LLS 7-2x | v | | | | | | | SS7 and Diameter Protocol | | | | | | v | | E2E | | | | | | v | | IMSI | | | | | | v | | DDoS | | | | v | v | | | 2G/3G Downgrade Attack | | | | | | v | | Man-in-the-Middle Attacks | | v | v | v | v | v | | LTE Roaming | | | | | | v| ## Security Considerations of Open RAN ### RAN virtualization An **Open RAN** has open interoperable interfaces, RAN virtualization, and support for big data and AI-enabled RAN. Providers deploying an Open RAN can choose between a between a 3GPP or O-RAN architecture. Figure 1 below shows the comparison of the 3GPP andO-RAN architectures.![](https://i.imgur.com/quk533S.png) **vRAN** refers to the virtualization of RAN functions, particularly the higher layer and lower layer function of the baseband unit. With vRAN, 5G becomes softwaredefined and programmable, generating additional RAN architecture flexibility, platform harmonization and operational simplification. **O-RAN** refers to the Open RAN standardized by the O-RAN Alliance. The O-RAN Alliance has four main objectives: Open Interfaces, Virtualization, Intelligence, and Interoperability. ### O-RAN security risks The O-RAN architectural diagram is shown in Figure 2 below. Security measures should be taken to address security risks specific to O-RAN deployments. These security measures include the following recommendations: * Protect expanded threat surface. * Close security vulnerabilities associated with Near-RT RIC . * Address threat to trust chain introduced by decoupling of functions. * Ensure management interfaces are secured according to industry best practices. * Practice a higher level of due diligence for exposure to public exploits from use of Open Source code. * Implement defenses from physical attacks. ![](https://i.imgur.com/tRj2oqU.png) :::spoiler #### O-RAN背景 #### 什麼是RAN 無線電接取網路(Radio Access Network) * 無線電信系統的一部分,通過無線電磁波將設備連上網路 * 例如:手機、智慧手錶 * RAN是無線電信的主要組成 #### 存在問題 目前RAN存在幾個主要問題: 1. 綁定供應商,電信營運商連接和部屬多個RAN設備的選擇有限,在此情況下,源管理且充分利用有限頻譜具有挑戰性。 2. 網路節點間的協調有限,影響RAN元件的整合優化與控制。 3. RAN的重構彈性有限,無法微調以利支援不同部屬及不同流量配置。 #### 什麼是O-RAN 開放式無線接取網路技術(Open Radio Access Network) * 開放介面及軟硬體,阻止網路供應上的壟斷,不同供應上的設備得以互通,進而降低建置成本,並提供電信業者更多選擇。 * 將RAN的網路架構開放,依照功能來進行元件的區分。(似單體式架構依照工作範疇拆分成一個個的微服務) * 而這一個個的元件再藉由O-RAN Alliance做規範的標準開放介面進行連接。 * 就是他讓下世代的5G網路智慧化(AI),依需求自動調節網路資源。 ::: ### LTE RAN vs O-RAN ![](https://i.imgur.com/gZ4wCYu.jpg) 在4G的LTE RAN架構中,首先是基帶單元(BBU),他負責訊號處理及網路存取的工作;再來是無先寬頻頭端設備(RRU),具備像是ADC/DAC的轉換器以及RF射頻設備。 而RRU底下連接BBU介面的叫做CPRI(無線基站通用介面),但雖說是「通用」,但其實每間廠商的CPRI都是「專有的」。 RAN的全部組件源於同一家供應商。 ex: NOKIA的BBU不能跟愛立信的RRU接再一起。 因此5G RAN的開放源就出現了! #### Open-Fronthual ![](https://i.imgur.com/c7luzT9.png) ![](https://i.imgur.com/oQyJQt4.jpg) 為了防止出現廠商壟斷的情況,就要做硬體上面的切片,讓不同的供應商製造元件。 但要如何分配? 所以要考慮RAN如何解耦(RAN Disaggregation)。那O-RAN要如何分開BBU及RRU? 於是要依照功能來進行切分,也就是所謂(Function Split)。分成8個option並以新的介面Open-Fronthual(O-FH)來切開DU(分佈單元)和RU(無線電單元)。 假設現在今天Fronthual愈往左切(ex:在option),RU無線電單元功能就愈多,那麼多功能要塞在RU上面,在製作上就會有困難,而不同廠商的互通信也會變得困難。 如果愈往右切CU(ex:在option 8)分布單元的功能就愈多,雖然RU功能少,但5G傳輸量大,要做基頻處理(快速傅立葉轉換 or 要確保資料沒錯誤,要做錯誤檢查),資料量大要做快速資料傳輸,需要足夠的寬頻,才會傳得快。所以需要衡量,ITU有挑選三個方案,但最後由Split Option 7.2脫穎而出,就是將原本CPRI介面fronthual,Physical Layer資料傳輸的部分,使用eCPRI取代CPRI。 ##### Open Fronthual 採用Split Option 7.2規格 主要考慮的兩個點: 1. 能耗 * 如果RU功能愈多,相對能耗就愈多。 * 使O-RU盡可能簡單、更小、更省電 2. 資料需求(option 1~8) * 考量位元速率、資料傳輸,open-fronthaul 切在數字愈大(ex:option 8),RU功能少研發更簡單。 * 但介面傳輸量會提高,對於延遲要求也會增加 * 最後就是把Open-Fronthual 切在H-PHY, L-PHY的中間,解耦DU, RU。 以下就是O-RAN架構 ![](https://i.imgur.com/mx0M7t3.jpg) #### Open RAN vs 3GPP ![](https://i.imgur.com/eGSFupM.png) 圖1是O-RAN架構的主要變化,如果我們比較O-RAN聯盟與3GPP,可以在圖片中看到基於3GPP的架構和O-RAN架構下層拆分之間的主要比較(LLS)7-2X。引入新節點: RAN智能控制器(RAN Intelligent Controller, RIC)和服務管理和編排(Service Management & Orchestrator, SMO)、引入前傳(FrontHaul)拆分、引入新介面。 將傳統 CPRI 與 eCPRI 接口進行比較的一個不同之處在於,eCPRI 能夠有效使用基於數據包的傳輸技術,並允許通過以太網技術承載 RAN 有效載荷。 O-RU 接口的更高層是在 eCPRI 之上實現的,具有幾個不同的 LLS 選項來拆分 O-RU 和 O-DU 之間的功能。 #### O-RAN LLS 7-2x When having two different vendors, the O-RU and the O-DU needs to be managed as different entities. * the possibilities to reach the northbound systems beyond the O-DU through the Open Fronthaul interface become a possible attack vector in this split architecture. * access to the O-DU configuration could possibly be achieved via the Open Fronthaul interface, depending upon the design of the hardware-software system and how different functions are segregated in the node. * An adversary could, in such case, either harm the node, create a performance issue by manipulation of parameters, or reconfigure the node and disable the over-the-air ciphers with the purpose of eavesdropping or other type of breaches. #### Near-RT RIC The Near-RT-RIC also has potential security vulnerabilities, such as the following: * Near-RT RIC signaling conflicts with gNodeB * Near-RT RIC xApps signaling can conflict * xApp Root of Trust * UE identification in the RIC ## O-RAN Security Task Group Several STG efforts illustrate how this approach is creating an open, interoperable, and secure system by design. The STG recognizes that an unprotected management interface provides an easily exploitable vulnerability in the RAN. Thus, the O-RAN management interfaces, the O1 interface and the Open Fronthaul M-plane, must be protected using industry security best practices such as TLS and/or SSH with strong ciphers, mutual authentication using X.509 certificates, access controls that can be integrated with an operator’s identity lifecycle management platforms, robust logging that can be integrated with an operator’s centralized logging platform, and input validation. Similar analysis is being performed on the other O-RAN defined interfaces: A1, E2, O2 and Open Fronthaul CUS-plane. ## A guide to 5G network security While 3GPP security mechanisms provide reliable links for non-malicious bad radio conditions (see below) they do not protect against all possible threats, for instance DDoS and radio jamming. Protecting against DDoS attacks and radio jamming is something that is left for implementation and deployment. 5G function element deployments (vertical security) * NFVi (virtualized or cloud native) * Appliance based functions * Distributed clouds and edge computing ## 5G Security: Forward Thinking For instance, mobile Internet of Things (IoT) devices require lightweight security while high-speed mobile services demand high efficient mobile security. The network based hop-by-hop security approach may not be efficient enough to build differentiated end-to-end (E2E) security for different services. As IoT is gaining momentum, more people will be able to remotely operate or "talk" to networked devices, for instance, instructing facilities at a smart home to get up. Therefore, there is a need of a more stringent authentication method to prevent unauthorized access to IoT devices. For example, biometric identification could be part of the authentication in smart homes. ### 5G Security Goal #### E2E Security for Vertical Industries * Differentiated security protection * Flexibility * Privacy protection * Security as service #### 5G Security Perspectives ![](https://i.imgur.com/nbGDoPR.png) * Hybrid Authentication Management * Authentication by networks only * Authentication by service providers only * Authentication by both networks and service providers. * Diversified Identity Management * Combination of device identity and service identity * From device-based management to user-based management ## Securing the 5G Era 5G improves confidentiality and integrity of user and device data. Unlike previous generations of mobile systems 5G: * Protects the confidentiality of the initial non-access stratum (NAS) messages between the device and the network. * Introduces a protection mechanism called home control. * Supports unified authentication across other access network types e.g. WLAN, allowing 5G networks to manage previously unmanaged and unsecured connections. * Introduces user plane integrity checking, ensuring the user traffic is not modified during transit. * Enhances privacy protection with the use of public / private key pairs (anchor keys) to conceal the subscriber identity, and derive keys used throughout the service architecture. ### Network Protection #### Signalling Data Integrity 5G introduces a new network architecture element: the Security Edge Protection Proxy (SEPP). ![](https://i.imgur.com/KHtbzcr.png) The SEPP is designed to: * Provide application layer security and protect against eavesdropping and replay attacks. * Provide end-to-end authentication, integrity and confidentiality protection via signatures and encryption of all HTTP/2 roaming messages. * Offer key management mechanisms for setting the required cryptographic keys and performing the security capability negotiation procedures. * Perform message filtering and policing, topology hiding and validation of JSON objects; including cross-layer information checking with address information on the IP layer. #### New IT Protocol The following protocols, schemas and processes will be adopted in 5GC: * HTTP/2 over N32, replacing Diameter over the S6a reference point * TLS as an additional layer of protection providing encrypted communication between all network functions (NF) inside a public land mobile network (PLMN) * TCP as the transport layer protocol as replacement of the SCTP transport protocol. * RESTful framework with OpenAPI 3.0.0 as the Interface Definition Language (IDL) ![](https://i.imgur.com/Bppm7GN.png) As these protocols are used in the wider IT industry, their use will likely: * Lead to a short vulnerability to exploitation timeline, and higher impact of vulnerabilities located within these protocols. * Expand the potential pool of attackers. 4G and especially 3G core networks benefit from attackers having little experience with the propriety standards used within them. ## Security Considerations for the 5G Era ### LTE and 5G Non-Standalone Networks #### 2G/3G Downgrade Attack Downgrade attacks allow for adversaries to force an LTE connected UE to 2G or 3G, which has significantly less security controls. Ultimately, adversaries could perform man-in-the-middle (MiTM) active attacks and/or a passive (e.g. eavesdropping) attacks to collect sensitive information. A customer experiencing abnormal behavior in their LTE connection could indicate of this type of attack. #### IMSI Tracking (Privacy) The IMSI (International Mobile Subscriber Identity) is a unique number that can be captured in the clear over-the-air. High cost Stingrays are no longer required for this attack, because low cost software defined radios (SDRs) can be purchased over the Internet. This could allow bad actors to pursue lower value targets resulting in privacy concerns for the general public. These same, low-cost SDRs would more likely be used by an adversary to track and exploit higher-value targets for various reasons. Adversaries could determine the value of the target based upon the movement of that target. #### Man-in-the-Middle Attacks The Access Stratum (AS) over-the-air User Plane traffic is not adequately protected by Integrity Protection security algorithms. This potentially translates to a scenario where a customer’s message and/or communication flow could be intercepted in the middle between the UE and the server. An adversary could manipulate the customer’s message and/or communication flow between the UE and the server. #### LTE Roaming LTE roaming is heavily dependent upon the SS7 and Diameter protocols. Diameter is an authentication and authorization protocol defined in 1988 to supersede the RADIUS protocol. Both the SS7 and Diameter protocols have been used in large scale, and have had known security vulnerabilities that have been the focus of attacks for years. Diameter and SS7 are vulnerable to eavesdropping including voice calls, reading text messages, and tracking phones. Some LTE roaming mobile network operators and mobile virtual network operators do not support VoLTE, so even if an operator has deployed VoLTE and its customer roams into an MNO/MVNO network that does not support VoLTE, then home networks must use SS7 for voice services for that roaming customer. Many operators have SS7 and/or Diameter firewalls but these firewalls are subject to a number of crossprotocol attacks.

    Import from clipboard

    Paste your markdown or webpage here...

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lose their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template has been removed or transferred.
    Upgrade
    All
    • All
    • Team
    No template.

    Create a template

    Upgrade

    Delete template

    Do you really want to delete this template?
    Turn this template into a regular note and keep its content, versions, and comments.

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password
    or
    Sign in via Google Sign in via Facebook Sign in via X(Twitter) Sign in via GitHub Sign in via Dropbox Sign in with Wallet
    Wallet ( )
    Connect another wallet

    New to HackMD? Sign up

    By signing in, you agree to our terms of service.

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Help & Tutorial

    How to use Book mode

    Slide Example

    API Docs

    Edit in VSCode

    Install browser extension

    Contacts

    Feedback

    Discord

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions and GitHub Sync
    Get Full History Access

    • Edit version name
    • Delete

    revision author avatar     named on  

    More Less

    Note content is identical to the latest version.
    Compare
      Choose a version
      No search result
      Version not found
    Sign in to link this note to GitHub
    Learn more
    This note is not linked with GitHub
     

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub
        • Please sign in to GitHub and install the HackMD app on your GitHub repo.
        • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
        Learn more  Sign in to GitHub

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Include title and tags
        Available push count

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully