calender
Date & Time
Search
Datum
{{range.dates[index].day}}
{{range.dates[index].date}}
Time
Mornings Noon Afternoons Evenings
  • from
  • to
  • o'clock
Topic
Event
Properties
{{item.name}}
{{item.name}}
Exhibition venue

(please choose the desired areas)

Lecture language
Format

Event database

The event database contains all event-related information for the digital electronica conference and supporting event program.

Back to the EventList

5G Security Mechanisms – an Overview

NOV
12
2020
12. NOV 2020

Lecture electronica Conferences > Wireless Congress > Session 9: 5G

11:55-12:20 h | Virtual

Well established GSM technologies like 3G and LTE have a lot of security flaws which allow unauthorized access to the network and its components. Most popular are so-called IMSI Catchers which can decode the subscriber identity during connection setup and therefore eavesdrop and change contents of a mobile phone connection. This will gain even more impact when future GSM standards supply billions of IoT devices. Therefore new security protocols and encryption methods have been introduced for 5G. Starting with the very beginning of the connection setup all credentials exchange between any kind of user equipment and the mobile network is encrypted with different keys. Each user equipment finally has to be authorized by one home network in any roaming environment. There is also the possibility that authorized WiFi devices directly connect to a 5G Core network within non-public networks. Most of these features are implemented in the control plane protocol stack in the core network. This talk will give a short introduction into the standardized protocols and also highlight some of the still weak points in the currently foreseen protocol stack.

Subjects: Wireless

Speaker: Peter Heusinger (Fraunhofer IIS)

Type: Lecture

Speech: English

Notifiable

Chargeable

Login

Well established GSM technologies like 3G and LTE have a lot of security flaws which allow unauthorized access to the network and its components. Most popular are so-called IMSI Catchers which can decode the subscriber identity during connection setup and therefore eavesdrop and change contents of a mobile phone connection. This will gain even more impact when future GSM standards supply billions of IoT devices. Therefore new security protocols and encryption methods have been introduced for 5G. Starting with the very beginning of the connection setup all credentials exchange between any kind of user equipment and the mobile network is encrypted with different keys. Each user equipment finally has to be authorized by one home network in any roaming environment. There is also the possibility that authorized WiFi devices directly connect to a 5G Core network within non-public networks. Most of these features are implemented in the control plane protocol stack in the core network. This talk will give a short introduction into the standardized protocols and also highlight some of the still weak points in the currently foreseen protocol stack.

Speaker,
Fraunhofer IIS

Peter Heusinger

Peter Heusinger

Fraunhofer IIS

Show Profile

Informations

Speaker,
Fraunhofer IIS

Peter Heusinger
Peter Heusinger

Location

Eingang
Nord-West
ICM
Eingang
Nord
Eingang
West
Atrium
Eingang
Nord-Ost
Eingang
Ost
Conference
Center Nord
Freigelände
C1
C2
C3
C4
C5
C6
B0
B1
B2
B3
B4
B5
B6
A1
A2
A3
A4
A5
A6

More Events