Page 228 - 5G Basics - Core Network Aspects
P. 228
1 Core network aspects
ISUP-S the reference point between S-NICE and the service user profile FE.
With this reference point, S-NICE achieves user's profile information (such as mobile device
management (MDN)/international mobile subscriber identity (IMSI)/other identity, service
information) from the service user profile FE.
IAP-S the reference point between S-NICE and the application.
With this reference point, S-NICE receives service requests from the application, such as resource
guarantee, traffic scheduling request, etc.
ICC-S the reference point between S-NICE and the content and context analysis FE.
The content and context analysis FE receives original information from the S-NICE infrastructure
functions, and provides the analysis capability and results to S-NICE. With this reference point, S-
NICE configures the analysis policy of the content and context analysis FE, in order to collect
application related contents on demand.
IMF-S the reference point between S-NICE and the management functions.
With this reference point, S-NICE interacts with the management functions to provide network
management related information to the management functions, such as network traffic
information, network alarm information and network topology information.
ICPE-S the reference point between S-NICE and the CPE functions.
With this reference point, S-NICE interacts with the CPE functions to collect CPE information, such
as access network type, network available bandwidth and related application information.
9 Security considerations
The security requirements of S-NICE are aligned with the security requirements of NICE [ITU-T Y.2301] and
[ITU-T Y.2302]. Furthermore, S-NICE provides:
– Enhanced protection of the S-NICE controller functions, because the logically centralized controller
could be a single point of failure, or a target of malicious attacks;
– Secure mechanisms of S-NICE orchestration functions to against unauthorized network
configurations (e.g., routing path establishment) upon demand by third party services or
applications;
– Network isolation of S-NICE infrastructure functions for both virtualized and physical network
resources, in order to protect the network from malware attacks, even when some components of
the network have already been affected;
– Appropriate mechanisms of S-NICE infrastructure functions to monitor abnormal situations, to
detect and defend from attacks and to recover network components and their status.
218