NG-RAN and 5G-NR. Frédéric Launay

Чтение книги онлайн.

Читать онлайн книгу NG-RAN and 5G-NR - Frédéric Launay страница 14

NG-RAN and 5G-NR - Frédéric Launay

Скачать книгу

Mission Critical delay sensitive signaling (e.g. MC-PTT signaling) 70 5.5 200 ms 10−6 Mission Critical Data (e.g. example services are the same as QCI 6/8/9) 79 6.5 50 ms 10−2 V2X messages 80 6.8 10 ms 10–6 Low latency eMBB applications (TCP/UDP-based); Augmented Reality 82 Delay Critical GBR 1.9 10 ms 10−4 Discrete Automation (small packets) 83 2.2 10 ms 10−4 Discrete Automation (big packets) 84 2.4 30 ms 10−5 Intelligent Transport Systems 85 2.1 5 ms 10−5 Electricity Distribution-high voltage

      The QFI value is coded on 6 bits. The 5QI value is set between 1 and 85. For any 5QI value less than or equal to 64, the QFI indicator and 5QI can be the same.

      When the mobile is in the RRC_CONNECTED state, the management of QoS rules is delegated to the 5G-NR radio interface.

      A user’s plane traffic in a PDU session with the same QFI flag is handled with the same traffic routing rules (e.g. sequencing rules, admission level).

      The role of the radio node is to configure one or more radio data bearers (RAB: Radio Access Bearer) and to perform a mapping between the QFI and the bearer(s) from a TFT flow filtering template (Traffic Flow Template).

      For uplink, there are two ways to control the mapping between the radio bearers and the QoS of IP flows:

      1 – reflective QoS for which the mobile replicates QoS rules received in downlink (configuration of the TFT flow policy rules);

      2 – explicit configuration for which the uplink QoS configuration is defined by configuring the radio bearer.

Schematic illustration of QFI management in the user’s plane.

      Figure 1.10. QFI management in the user’s plane

      The security architecture implemented on the 5G mobile is based on:

      1 – mutual authentication between the 5GC core network and mobile (UICC);

      2 – ciphering and integrity of NAS signaling messages exchanged between the mobile and the AMF;

      3 – AS security through the 5G-NR radio interface between the mobile and the NG-RAN node. Security concerns the integrity control and encryption of RRC messages and IP packets. Integrity on IP packets is optional.

      Data integrity:

      1 – ensures that the data have not been altered by a third party between transmission and reception;

      2 – verifies the transmitting source;

      3 – ensures that a message already received is not reused.

      Encryption ensures the confidentiality of data exchanged between two entities.

      1 – The AMF:

      2 – KAMF key;

      3 – KNASint key from the KAMF key for the integrity check of the NAS signaling;

      4 – KNASenc key from the KAMF key for the encryption of the NAS signaling.

      5 – The radio node:

      6 – KgNB key from the KAMF key;

      7 – KRRCenc key derived from the KgNB key for the encryption of RRC signaling on the 5G-NR interface;

      8 – KRRCint key derived from the KgNB key for the integrity check of RRC signaling on the 5G-NR interface;

      9 – KUPenc key derived from the KgNB key for encrypting IP traffic on the 5G-NR interface;

      10 – optionally, a KUPint key derived from the KgNB key for the integrity check of IP traffic on the 5G-NR interface.

Schematic illustration of the security architecture.

      The mobile must support the NAS security based on information transmitted by the 5G core network and AS security, according to the indications sent by the NG-RAN access node.

      5G security is based on the use of:

      1 – NEA encryption algorithms (Encryption Algorithm for 5G);

      2 – NIA (Integrity Algorithm for 5G) integrity control algorithms;

      3 – the KUPenc, KRRCenc, KNASenc encryption keys consist of 128 bits.

      The encryption and integrity control algorithms are similar to those used on the LTE interface:

      1 – NEA0/NIA0: no ciphering;

      2 – 128-NEA1/128-NIA1: algorithm SNOW 3G (flow ciphering);

      3 – 128-NEA2/128-NIA2: algorithm AES (bloc ciphering);

      4 – 128-NEA3/128-NIA3: algorithm ZUC (flow ciphering).

      Encryption and integrity are based on the following parameters:

Скачать книгу