Page 506 - 5G Basics - Core Network Aspects
P. 506
1 Core network aspects
UE L3HEF L3HEF L3HEF Corresp. HDC-FE MLM-FE(P) MLM-FE(P) MLM-FE(C)
A anchor B Node A B
RO indication
RO request
RO request
RO response
RO response
Loc update request
Loc update requ.
Loc update resp.
Tunnel mode Loc update response
request
Get QoS
for new
tunnel
Install tunnel endpoint
Install tunnel endpoint
Delete tunnel endpoint
Delete tunnel endpoint
Release
QoS
Delete tunnel endpoint
Delete tunnel endpoint
Release
QoS
Tunnel mod
response
Y.2018(09)_F10
Figure 10 – Routing optimization assuming network-based mobility at each end
8 Security considerations
The path between the UE and the network can pass over a variety of technologies, many of which are open
to attack. While the MMCF is considered to be in the trusted zone, the UE and the path from the UE to the
MMCF are considered untrusted. The following considerations govern the design of the architecture as it
relates to communications between the UE and the MMCF:
8.1 Security threats
T1 UE can be unauthorized to initiate the mobility signalling with MLM-FE.
T2 Mobility signalling can be tampered by intruders.
T3 MLM-FE can be impersonated to provide false information to UE.
T4 UE location can be eavesdropped by intruders.
T5 Traffic redirection attack can happen.
T6 Attacker can insert itself on-path by man-in-the-middle attack.
T7 DDoS attack can consume a large quantity of network resources.
496