* If you want to update the article please login/register
The 3rd Generation Partnership Project addresses telecommunications, including RAN, core transport networks, and service capabilities. components from various hardware and software manufacturers could be used by multiple O-RAN and software providers, boosting vendor diversity, interchangeability, and 5G supply chain resiliency. Both 3GPP and O-RAN 5G have to tackle the security and privacy issues that resulted from their deployment. The user identifiable information must be shielded, according to the most challenging issues in compliance with privacy laws and legislation that mandates the user identifiable information must be shielded, as well as limitations that insist that user personal information must be secured. We also discuss how to expand the Zero Trust Model to include advanced cover over 5G air interfaces and network components.
Source link: https://arxiv.org/abs/2211.03776v1
Only increasing accuracy without considering uncertainty can negatively influence Deep Neural Network decision-making and lower reliability. This paper discusses five combined preprocessing and post-processing techniques for time-series binary classification tasks that also enhance the accuracy and reliability of DNN outputs used in a 5G UAV security study. These methods use DNN outputs as input parameters and process them in a variety of ways. We find that the eXtreme Gradient Boosting classifier is not appropriate for binary classification under the conditions this study describes. At least one of the potential techniques can produce better results than the classification in the DNN softmax layer, according to second. Lastly, we show that the proposed techniques can improve accuracy and reliability with improved uncertainty calibration, based on the assumption that the RS determines the difference between MC and MA measurements, and that this gap should be zero to raise reliability.
Source link: https://arxiv.org/abs/2211.02924v1
Handover will be carried out based on Layer 1 measurements using the so-called lower layer mobility algorithm, one of the forthcoming mobility enhancements in 5G-Advanced networks. We present a system model for lower layer mobility in this paper, as well as comparing it to existing higher layer mobility techniques, such as baseline and conditional handover, using system level simulations. Using the key mobility success metrics, the benefits and drawbacks of lower layer mobility are analyzed and compared to higher layer handover mechanisms. Lower layer mobility procedures have been shown to outperform the existing handover schemes in terms of radio connectivity safety, but it comes at a higher cost of handovers and ping-pongs. To combat these drawbacks, more filtering of the L1 measurements used in the handover decision is introduced to reduce the fluctuations caused by fast fading and measurement errors.
Source link: https://arxiv.org/abs/2211.02725v1
The deployment of 5G networks is often questionable due to the effect of ElectroMagnetic Field generated by Radio Base Station on users. This paper aims to investigate the problem from a novel perspective by comparing RBS EMF to exposure generated by 5G smartphones in commercial deployments. Multiple measurement issues, such as dual connectivity between 4G and 5G, spectrum fragmentation, and carrier aggregation, hindered the measurement of exposure from 5G. In addition, 5G exposure often accounts for a small portion of the total number relative to 4G EMF.
Source link: https://arxiv.org/abs/2211.01077v1
Mobile technology like 5G wireless connectivity, ultra low latency, increased availability, increased availability, and a more consistent user experience will be delivered to users via faster data speeds, ultra low latency, ultra high latency, increased availability, and a more consistent user experience. A 5G enabled adaptive computation workflow has been described in this paper, including 5G electronics, edge computing, cluster, Graphics processing unit, and cloud computing, with two examples demonstrating technical apprehension for edge-grid-cloud interaction for power system real-time monitoring, security assessment, and forecasting.
Source link: https://arxiv.org/abs/2211.00150v1
Several safety and privacy issues have been reported with the standardized authentication and Key Agreement protocol for 5G networks. We develop an authentication and key agreement protocol for 5G and beyond that is compatible with the standard 5G AKA. In addition, Key Encapsulation Mechanisms are used for both user identity protection and the perfect forward secrecy, making our protocol adaptable to the quantum-safe environment. We use the post-quantum KEM CRYSTALS-Kyber, which was recently selected to be standardized by NIST, and NIST post-quantum Round 4 candidate KEMs to investigate the results of the new protocol.
Source link: https://arxiv.org/abs/2207.06144v2
In this report, we conduct the first comprehensive review of PWS security in 5G networks. We present five concrete threats that may have an effect on the effectiveness of 5G-based Commercial Alert Systems, as well as Earthquake and Tsunami Warning System alerts. In addition to determining the vulnerabilities, we investigated two PWS spoofing and three PWS suppression attacks, with or without a man-in-the-middle attacker. MitM-based attacks have more severe consequences than those that do not have MitM. Our PWS barring attack is a quick way to block legitimate warning messages.
Source link: https://arxiv.org/abs/2207.02506v2
eXtended Reality, one of the most popular services for fifth-generation Advanced, brings together many immersive experiences and cloud gaming services. In this paper, we propose an enhanced channel quality indicator that results in a better link connection and allows for a greater reach extension of code block group based transmissions for XR cases. Our results show an increased XR system capacity of 17% to 33% when compared to what can be provided by existing 5G systems with baseline CQI schemes. We also have improved CQI complexity-reducing methods based on derived closed-form expressions that are convenient to the user equipment integration.
Source link: https://arxiv.org/abs/2210.14578v1
In certain situations, in which wireless connectivity is a question of life or death, public safety operations need fast and reliable mission critical communications. This essay explores the benefits of using the 5th generation new radio standard for designing flexible and reliable deployable networks. We also identify technological obstacles that should be considered in the growth of 5G NR to unlock the full potential of deployable 5G networks.
Source link: https://arxiv.org/abs/2110.05360v3
* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions