Page 228 - 5G Basics - Core Network Aspects
P. 228

1                                                Core network aspects


            ISUP-S   the reference point between S-NICE and the service user profile FE.

                    With  this  reference  point,  S-NICE  achieves  user's  profile  information  (such  as  mobile  device
                    management  (MDN)/international  mobile  subscriber  identity  (IMSI)/other  identity,  service
                    information) from the service user profile FE.

            IAP-S   the reference point between S-NICE and the application.
                    With this reference point, S-NICE receives service requests from the application, such as resource
                    guarantee, traffic scheduling request, etc.
            ICC-S   the reference point between S-NICE and the content and context analysis FE.
                    The content and context analysis FE receives original information from the S-NICE infrastructure
                    functions, and provides the analysis capability and results to S-NICE. With this reference point, S-
                    NICE  configures  the  analysis  policy  of  the  content  and  context  analysis  FE,  in  order  to  collect
                    application related contents on demand.
            IMF-S   the reference point between S-NICE and the management functions.
                    With this reference point, S-NICE interacts with the management functions to provide network
                    management  related  information  to  the  management  functions,  such  as  network  traffic
                    information, network alarm information and network topology information.
            ICPE-S   the reference point between S-NICE and the CPE functions.

                    With this reference point, S-NICE interacts with the CPE functions to collect CPE information, such
                    as access network type, network available bandwidth and related application information.


            9       Security considerations

            The security requirements of S-NICE are aligned with the security requirements of NICE [ITU-T Y.2301] and
            [ITU-T Y.2302]. Furthermore, S-NICE provides:
            –       Enhanced protection of the S-NICE controller functions, because the logically centralized controller
                    could be a single point of failure, or a target of malicious attacks;
            –       Secure  mechanisms  of  S-NICE  orchestration  functions  to  against  unauthorized  network
                    configurations  (e.g.,  routing  path  establishment)  upon  demand  by  third  party  services  or
                    applications;
            –       Network  isolation  of  S-NICE  infrastructure  functions  for  both  virtualized  and  physical  network
                    resources, in order to protect the network from malware attacks, even when some components of
                    the network have already been affected;

            –       Appropriate  mechanisms  of  S-NICE  infrastructure  functions  to  monitor  abnormal  situations,  to
                    detect and defend from attacks and to recover network components and their status.





















            218
   223   224   225   226   227   228   229   230   231   232   233