Skip to main content
abstract blue background

Education & Training

Online Course

2 - 3 December 2021 - 9:00 am to 1:00 pm EST

Registration closes on 30 November 2021 at 5:00pm EST

Online via WebEx

Price

$279 IEEE ComSoc member
$349 IEEE member
$459 non-member

Not a member?  Join ComSoc Today
IEEE Members can add ComSoc to their membership.

 

Course Length: 7 hours total over two days (3.5 hours each day) // 0.7 IEEE CEUs

Course Description

5G incorporates some significant changes and enhancements to security, compared to LTE systems, especially in terms of the threat model and security architecture.  However, the scope of what is 5G is rather large, as 5G includes traditional mobile broadband services, as provided by 4G systems, as well as whole new application areas like IoT, URLLC, etc., and a revolutionary network architecture. Consequently, the scope of what could be said to be “5G Security” is also huge. In this course, however, we focus on the essence of 5G security in terms of security of the 5G network subscription (concepts of authentication, SIM, etc., some of which have evolved from 3G and 4G, but enhanced with the benefit of lessons learnt from operation of the earlier networks), including but not limited to mobile broadband services. We cover protocols that extend the protections to 5G scenarios of IoT, V2X, etc.

In day one of this course, the instructor will begin with an introduction of overall 5G concepts as a primer to explore the motivations for and objectives of 5G security. Basic concepts of wireless security will also be quickly reviewed. The instructor will then discuss 5G Security fundamentals: Phase 1 highlights including privacy, primary vs. secondary authentication, multiple registrations, mobility scenarios, and inter-operator: SEPP and IPUPS.

In day two of this course, we provide a brief recap of what was discussed regarding Phase 1 and then delve into Phase 2 highlights including: AKMA (Authentication and Key Management for Applications), Non-3GPP Access Security, V2X, and Security Assurance Specifications.  Evolution of the SIM concept and implementation, from 2G/GSM to 5G will also be explored. 

Time is allocated to address participant questions submitted during the live sessions.  Any questions not addressed during the live sessions will be addressed in email after the live sessions.

Who Should Attend

This course is ideal for wireless and telecomm engineers, researchers, and students (advanced undergraduates or graduate students), or computer science practitioners, researchers and students, interested in understanding of:

  1. the directions that cellular network security has taken from GSM to 3G, LTE and now 5G
  2. how the 5G system, network and service architectures introduce new requirements for security, and how these requirements/challenges are addressed in 5G with its threat models, security concepts, architectures and protocols
  3. how selected 5G security protocols work in more detail.

Instruction level: Intermediate to Advanced.  A basic understanding of at least either wireless communications or security is recommended for participation in this course. Furthermore, knowledge of basic concepts of 5G wireless systems is desirable, e.g., as might be obtained from the IEEE.tv video, "5G Networks, Security, & Applications - IEEE Future Networks Perspective" (runtime approx. 1 hour in length) by Ashutosh Dutta and/or ComSoc courses like “5G/NR Non-Standalone Implementation and Migration to 5G/NR Stand-Alone” and “Cloud-Native 5G: Architecture, Enablers, and Roadmap.”

Instructor

Daniel Wong

Daniel Wong

Head of Product Security

V-Key Pte Ltd, IEEE WCP

Learning Objectives

Students will be able to:

  • Explain why LTE Security is inadequate for 5G systems, with their new applications, network and service architectures.
  • Analyze various scenarios in 5G networks from the security perspective.
  • Compare and contrast 5G Security with security architectures found in earlier generations of cellular systems like LTE.
  • Illustrate how the enhanced authentication and privacy mechanisms in 5G Security help to strengthen protections against fraud, privacy breaches, etc.
  • Understand how 5G Security is being developed in phases in 3GPP, from phase 1 to phase 2 and beyond.

Course Content

Part 1

  • Introduction
    • 5G Overall Concepts
    • 5G and Security
    • Motivations for, and highlights of, 5G security
      • New applications, new network and service architectures
      • Addressing weaknesses in LTE security
  • Authentication in Cellular Networks – from 2G to 5G
  • 5G Security: Threat Model, overall architecture
  • 5G Security: Phase 1 highlights
    • Privacy
    • Primary vs. Secondary Authentication
    • Multiple Registrations
    • Mobility Scenarios
    • Inter-operator: SEPP and IPUPS

Part 2

  • Introduction
    • Recap on 5G Security up to phase 1
  • 5G Security Phase 1 Review
  • 5G Security: Phase 2 highlights
    • AKMA
    • Non-3GPP Access  Security
    • V2X
    • Security Assurance Specifications
  • Evolution of the SIM – from 2G to 5G
    • Original concepts
    • Changing requirements
    • iSIM, eSIM, nuSIM ..

Course Agenda

Below is an approximate schedule for each day of the two days of this course:

Day 1

9:00am EST (New York) - Facilitator Introduction
9:10am EST - Instructor Lectures

11:00am EST - Mid-point break (approx. 20-30 minutes)
11:30am EST - Instructor Lectures

1:00pm EST - Day 1 concludes

Day 2

9:00am EST (New York) - Instructor Lectures

11:00am EST - Mid-point break (approx. 20-30 minutes)
11:30am EST - Instructor Lectures

1:00pm EST - Day 2 concludes

Course Materials

A copy of the instructor's PowerPoint slides is included. Access to the streaming video recording is provided for 20 business days after the course has been taught. Earn 0.7 IEEE Continuing Education Units for participating and completing the post-course evaluation.

WebEx invitation is sent to each participant upon registration.  Course materials will be emailed to participants at least one business day in advance of the course date.

Course Cancellation and Refund Policy: Requests for online course cancellations must be received 3 business days prior to the course date for a full refund. Once course materials have been shared with a participant, a cancellation request cannot be accommodated.

Contact Us

For general inquiries and technical support, contact Tara McNally, Certification and Professional Education Manager.

Review the system requirements for WebEx.
Test your browser by joining a meeting