Article

3GPP Non-Public Network Security

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The 3GPP Rel-16 5G System focuses on enabling support for Industrial Internet of Things (IIoT) for Industry 4.0. Building blocks of 5G supporting use cases and requirements from the manufacturing sector are extreme mobile broadband, massive machine-type communication, ultra-reliable critical machine communication, non-public networks, time sensitive communication, 5G LAN communication, precise positioning. While for all of them, security plays an important role, the focus of this paper is on the 3GPP Rel-16 architecture and security concept of 5GS Non-Public Networks.We conclude with insights on the challenges for using 5G in the Operational Technology Industry.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Also, the discussed requisites derived from these use cases are centered around Key Performance Indicators (KPIs), while functional and operational requirements receive less attention. Concerning the 5G NPNs enablers, i.e., technologies, paradigms and aspects that enables or facilitates the adoption of 5G NPNs, many of them are separately covered in [3], [4], [7], [10], [15], [16]. Nonetheless, a more complete review encompassing all of them is missing from the literature. ...
... Kang et al. [15] This work addresses the integration of 5G with Time-Sensitive Networking (TSN) and IEEE 802.11 technologies. Jerichow et al. [16] This work puts the emphasis on the security aspects of 5G NPNs. ...
... From Release 16 on, 3GPP defines advanced security and privacy mechanisms for the support of NPNs [16]. These mechanisms provide solutions related to device-to-network communications, including device authentication (with the possibility of the enterprise customers to implement a second authentication in the local Data Network), end-to-end traffic integrity and encryption (at both user and control planes) and device credentials management. ...
Article
Full-text available
Fifth Generation (5G) is here to accelerate the digitization of economies and society, and open up innovation opportunities for verticals. A myriad of 5G-enabled use cases has been identified across disparate sectors like tourism, retail industry, and manufacturing. Many of the networks of these use cases are expected to be private networks, that is, networks intended for the exclusive use of an enterprise customer. This article provides an overview of the technical aspects in private 5G networks. We first identify the key requirements and enabling solutions for private 5G networks. Then, we Overview the latest 3rd Generation Partnership Project (3GPP) Release 16 capabilities to support private 5G networks. Next, we provide architecture proposals for single site private networks, including the scenario in which the radio access network (RAN) is shared. Afterwards, we address mobility and multi-site private network scenarios. Finally, we provide a summary of the key challenges for private 5G networks.
... For example, the study in [148] presents an overview of 3GPP Releases focusing on the extensive enhancements to achieve backward compatibility in the subsequent releases. Similar studies are performed by Jerichow et al. [149], Nwakanma et al. [150], and Atiq et al. [32]. ...
... Jerichow et al. [149] present an overview of public networks that are integrated with non-public networks within the scope of the 3GPP Release 16 architecture. Furthermore, they also discuss security concepts of 5G non-public networks. ...
... 3GPP outlines more information on NPNs in TS 22.261 [49]. The authors in [50,51] review the outlined security measures for NPNs along with potential use cases and considerations. Use cases for NPNs are also discussed in [52], which include emergency critical communications, smart city video surveillance, and services with Time-Sensitive Networking (TSN). ...
Article
Full-text available
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Numerous security capabilities need to work together to ensure and maintain a sufficiently secure 5G environment that places user privacy and security at the forefront. Confidentiality, integrity, and availability are all pillars of a privacy and security framework that define major aspects of 5G operations. They are incorporated and considered in the design of the 5G standard by the 3rd Generation Partnership Project (3GPP) with the goal of providing a highly reliable network operation for all. Through a comprehensive review, we aim to analyze the ever-evolving landscape of 5G, including any potential attack vectors and proposed measures to mitigate or prevent these threats. This paper presents a comprehensive survey of the state-of-the-art research that has been conducted in recent years regarding 5G systems, focusing on the main components in a systematic approach: the Core Network (CN), Radio Access Network (RAN), and User Equipment (UE). Additionally, we investigate the utilization of 5G in time-dependent, ultra-confidential, and private communications built around a Zero Trust approach. In today’s world, where everything is more connected than ever, Zero Trust policies and architectures can be highly valuable in operations containing sensitive data. Realizing a Zero Trust Architecture entails continuous verification of all devices, users, and requests, regardless of their location within the network, and grants permission only to authorized entities. Finally, developments and proposed methods of new 5G and future 6G security approaches, such as Blockchain technology, post-quantum cryptography (PQC), and Artificial Intelligence (AI) schemes, are also discussed to understand better the full landscape of current and future research within this telecommunications domain.
... Enterprises also have added control over private than public networks including service levels, data access, residency, and security. Technologies like ethernet, Wi-Fi and more recently LTE are widely deployed as private network technology solutions and now 5G has been added to that mix now with respect to a private 5G network in the terminology of the 3GPP which is called a Non-Public Network (NPN) [11]. So, the public network would be the network that typical subscribers would be using, and they would have a subscription to a Mobile Service Provider (MSP). ...
Article
Full-text available
Today’s modern enterprises are adjusting to new realities of connectivity. As companies become more distributed and autonomous, emerging applications demand more bandwidth, low latency, more spectrum, and higher reliability. 5G technology can aid many industries or enterprises to make quicker and better business decisions. Private 5G networks, also called 5G Non-Public Networks (5G-NPN), is a 3GPP-based standalone 5G network positioned for a particular enterprise or use case that delivers dedicated network access. It sets to transform industry landscapes with networks capable of rapidly deploying modern use cases and the scalability to meet constantly increasing demands of data capacity and speed. They help generate more revenue for operators who can partner with enterprises to build and manage networks on-premise or in the cloud. The objective of this work is to offer a thorough summary of private 5G networks to assist academicians, researchers, and network developers to quickly grasp their functionalities without needing to go through the standards, specifications, or documentation. This paper discusses various key private 5G network design goals and requirements, examines its deployment scenarios, and explores spectrum considerations and security aspects. The paper presents several enterprise use cases to illuminate how the networks can deliver the demands and services expected by the industries. It also provides an overview of some of the open-source projects considered by various organizations for private network deployment. Finally, several research directions are introduced, emphasizing enterprise challenges to deploying 5G networks.
... Since the initiation of 5G private networks a real question about the exploitation of this network arises. Different network architectures of non-public networks are presented in [2] and [21], but the fundamental question is, how to fully ensure the security of private networks in a macro environment including different network technologies, from the oldest to the newest, and using different types of devices, which would facilitate interference between these networks. Moreover, depending on the applications implemented, such as vehicle communication or smart cities which requires a high mobility of users and nodes, it is of great importance to facilitate the collaboration between private networks and other surrounding networks to ensure the continuity of operation for each private networks users in other networks. ...
Preprint
Full-text available
The fifth-generation (5G) New Radio (NR) promises communication services with high reliability, extremely low latency, high capacity, lower complexity, longer battery-life devices, and high user density in order to support the most well-known use cases of latency-aware Ultra Reliable Low Latency Communications (URLLC), unlimited-things-centric Massive Machine Type Communication (mMTC), and bandwidth-devouring enhanced Mobile Broadband (eMBB). To facilitate the exploitation and implementation of this new radio access technology, the so-called private 5G campus networks are expected to become widely used, utilizing multiple access techniques, frequency bands, and the entire underlying wireless infrastructure of public networks for private businesses, vertical industries, and manufacturing. The primary purpose of this type of communication network is to enable businesses, vertical industries, service sectors, universities, and even individuals to take advantage of 5G tailored to their specific activities or to develop their own local networks. Thus, the different advantages of such a technological revolution can be separately exploited by various stakeholders, and at the same time, the scientific community will be able to easily participate in its research and development aimed at addressing its shortcomings. Taking into account both the business and technical benefits, the grand objective of this study is to provide an overview of the security aspects of the private 5G campus networks. To that end, we first focus on the characterization of private 5G campus networks and discuss some background on a number of industrial applications that these types of networks can support. Then, we identify their different security flaws and potential origins. Finally, we highlight several research challenges that need to be addressed.
... The UE's configuration is based on the subscriber's identifiers and credentials that are associated with a SNPN, which are also identified by the Public Land Mobile Network (PLMN) ID and Network ID. In PNI-NPNs, this is implemented by means of independent Data Network Names (DNNs) or Network Slice Instance assigned to the private network, and access could be controlled by implementing the Closed Access Group CAG (CAG) [24]. Figure 1 illustrates the classification of 5G NPNs according to their architectures. ...
Article
Full-text available
The adoption of private 5G networks or Non-Public Networks (NPN) by industry verticals is igniting a digital transformation across various sectors and also leading to industry 4.0. This impetus comes from the integration of private wireless networks with 5G capabilities. Currently, a range of innovative applications and use cases are emerging and resulting in improved enterprise performance and solutions. The potential to boost revenue, stimulate cost reduction, and accelerate Return Of Investment (ROI) makes 5G NPN adoption attractive to industry verticals, network operators and other third-party stakeholders. However, a significant infrastructure upgrade is required, which demands understanding of the complexities of 5G NPN deployment scenarios and their economic implications. This paper addresses these needs by conducting a detailed techno-economic analysis on 5G NPN deployment. The study formulates a techno-economic model that focuses on; (i) Cost savings in support of ROI achieved by enabling Network Function Virtualization (NFV) technology and Neutral Host (NH) concept; (ii) The trade-off study between enterprise goals (cost vs deployment technologies) with a multi-objective sensitive analysis; And (iii) the trends of 5G NPN adoption worldwide. Analytical results confirm savings of up to 53% in Total Cost of Ownership (TCO) reflecting a significant reduction in Capital and Operation Expenditures (Capex and Opex). Simulation analysis identifies a ranking order of deployment parameters, which prioritise the use of Cost saving strategies and Deployment type. And finally, it offers a prediction of a starting annual average worldwide adoption rate of 82.2% with an expected height by 2026.
Article
Full-text available
The 5G (Fifth Generation) of cellular networks enable seamless connectivity for corporations, individuals, smart devices, smart vehicles and everything that can be interconnected meanwhile the emerging 6G networks are expected to provide enhanced capacity compared to previous generations until 2030. The concept of micro-operator (µO) has emerged as a promising way to optimize service provision in Fifth (5G) and Sixth (6G) generation cellular networks. This paper presents a Systematic Literature Review (SLR) that explores the importance and the legal aspects of the local micro-operators in the new 5G and 6G business models, technologies associated with micro and pico cells. This study is conducted using a well-defined methodology to identify, analyze and organize scientific publications that are relevant to Research Questions (RQ) around the use of micro-operators in new 5G and 6G business models. At the end of the bibliographic filtering stages, a total of 51 studies were selected. This SLR serves as a guide for practitioners, engineers and researchers who study and implement µOs in 5G and 6G networks.
Preprint
Full-text available
The fifth-generation (5G) New Radio (NR) promises communication services with high reliability, extremely low latency, high capacity, lower complexity, longer battery-life devices, and high user density in order to support the most well-known use cases of latency-aware Ultra Reliable Low Latency Communications (URLLC), unlimited-things-centric Massive Machine Type Communication (mMTC), and bandwidth-devouring enhanced Mobile Broadband (eMBB). To facilitate the exploitation and implementation of this new radio access technology, the so-called private 5G campus networks are expected to become widely used, utilizing multiple access techniques, frequency bands, and the entire underlying wireless infrastructure of public networks for private businesses, vertical industries, and manufacturing. The primary purpose of this type of communication network is to enable businesses, vertical industries, service sectors, universities, and even individuals to take advantage of 5G tailored to their specific activities or to develop their own local networks. Thus, the different advantages of such a technological revolution can be separately exploited by various stakeholders, and at the same time, the scientific community will be able to easily participate in its research and development aimed at addressing its shortcomings. Taking into account both the business and technical benefits, the grand objective of this study is to provide an overview of the security aspects of the private 5G campus networks. To that end, we first focus on the characterization of private 5G campus networks and discuss some background on a number of industrial applications that these types of networks can support. Then, we identify their different security flaws and potential origins. Finally, we highlight several research challenges that need to be addressed.
ResearchGate has not been able to resolve any references for this publication.