Skip to main content
abstract blue background

Education & Training

Online Course

4 - 5 March 2021 - 9:00 am to 12:30 pm EST

Registration closes on 2 March 2021 at 5:00pm EST

Online via WebEx

Price

$279 IEEE ComSoc member
$349 IEEE member
$459 non-member

Not a member?  Join ComSoc Today
IEEE Members can add ComSoc to their membership.

 

Course Description

For the last several years, much focus has been on 5G New Radio or the 5G network and services architecture as they are the most fundamental and characteristic aspects of 5G systems. Now the time has come to explore other important aspects of 5G like 5G security. 

5G incorporates some significant changes and enhancements to security, compared to LTE systems, especially in terms of the threat model and security architecture.  This course will primarily focus on the evolution of authentication and the evolution of the SIM in 5G Security.

In day one of this course, the instructor will provide an introduction of overall 5G concepts as a primer to explore the motivations for and objectives of 5G security.  The instructor will then discuss 5G Security: Phase 1 highlights including privacy, primary vs. secondary authentication, multiple registrations, mobility scenarios, and inter-operator: SEPP and IPUPS.

In day two of this course, the instructor will provide a brief recap of what was discussed regarding Phase 1 and then examine Phase 2 highlights including: AKMA (Authentication and Key Management for Applications), Non-3GPP Access Security, V2X, and Security Assurance Specifications.  Evolution of the SIM concept and implementation, from 2G/GSM to 5G will also be explored. 

Time is allocated to address participant questions submitted during the live sessions.  Any questions not addressed during the live sessions will be addressed in email after the live sessions.

Who Should Attend

This course is ideal for wireless and telecomm engineers, researchers, and students (advanced undergraduates or graduate students), or computer science practitioners, researchers and students, interested in understanding of:

  1. the directions that cellular network security has taken from GSM to 3G, LTE and now 5G
  2. how the 5G system, network and service architectures introduce new requirements for security, and how these requirements/challenges are addressed in 5G with its threat models, security concepts, architectures and protocols
  3. how selected 5G security protocols work in more detail.

Instruction level:  Intermediate to Advanced.  A basic understanding of at least either wireless communications or security is recommended for participation in this course.

Instructor

Daniel Wong

Daniel Wong

Head of Product Security

V-Key Pte Ltd, IEEE WCP

Learning Objectives

Students will be able to:

  • Explain why LTE Security is inadequate for 5G systems, with their new applications, network and service architectures.
  • Analyze various scenarios in 5G networks from the security perspective.
  • Compare and contrast 5G Security with security architectures found in earlier generations of cellular systems like LTE.
  • Illustrate how the enhanced authentication and privacy mechanisms in 5G Security help to strengthen protections against fraud, privacy breaches, etc.
  • Understand how 5G Security is being developed in phases in 3GPP, from phase 1 to phase 2 and beyond.

Course Content

Part 1

  • Introduction
    • 5G Overall Concepts
    • 5G and Security
    • Motivations for, and highlights of, 5G security
      • New applications, new network and service architectures
      • Addressing weaknesses in LTE security
  • Authentication in Cellular Networks – from 2G to 5G
  • 5G Security: Threat Model, overall architecture
  • 5G Security: Phase 1 highlights
    • Privacy
    • Primary vs. Secondary Authentication
    • Multiple Registrations
    • Mobility Scenarios
    • Inter-operator: SEPP and IPUPS

Part 2

  • Introduction
    • Recap on 5G Security up to phase 1
  • 5G Security Phase 1 Review
  • 5G Security: Phase 2 highlights
    • AKMA
    • Non-3GPP Access  Security
    • V2X
    • Security Assurance Specifications
  • Evolution of the SIM – from 2G to 5G
    • Original concepts
    • Changing requirements
    • iSIM, eSIM, nuSIM ..

Course Agenda

Below is an approximate schedule for each day of the two days of this course:

Day 1

9:00am EST (New York) - Facilitator Introduction
9:10am EST - Instructor Lectures

11:00am EST - Mid-point break (approx. 20-30 minutes)
11:30am EST - Instructor Lectures

12:30pm EST - Day 1 concludes

Day 2

9:00am EST (New York) -  Instructor Lectures

11:00am EST - Mid-point break (approx. 20-30 minutes)
11:30am EST - Instructor Lectures

12:30pm EST - Day 2 concludes

Course Materials

Each registered participant receives a copy of instructor slides and access to the recording of the course for 20 business days after the live lecture. Earn 0.6 IEEE Continuing Education Units for participating.

Upon registration, you will automatically be emailed the WebEx invitation for the course session, but you will also be sent a reminder message to join the WebEx session prior to the start of the course. Course materials will be emailed to you and will be available for download from the WebEx session page for this course, the day prior to the scheduled course date.

Course Cancellation and Refund Policy: Requests for online course cancellations must be received 3 business days prior to the course date for a full refund. Once course materials have been shared with a participant, a cancellation request cannot be accommodated.

Contact Us

For general inquiries and technical support, contact Tara McNally, Certification and Professional Education Manager.

Review the system requirements for WebEx.
Test your browser by joining a meeting