Wednesday 12 July 2023

Small Data Transmission (SDT) in LTE and 5G NR

One of the features that was introduced part of 5G NR 3GPP Release 17 is known as Small Data Transmission (SDT). When small amount of data, in case of an IoT device, needs to be sent, there is no need to establish data radio bearers. The information can be sent as part of signalling message. A similar approach is available in case of 4G LTE. 

Quoting from Ofinno whitepaper 'Small Data Transmission: PHY/MAC', 

The SDT in the 3GPP simply refers to data transmission in an inactive state. Specifically, the SDT is a transmission for a short data burst in a connectionless state where a device does not need to establish and teardown connections when small amounts of data need to be sent.

In the 3GPP standards, the inactive state had not supported data transmission until Release 15. The 3GPP standards basically allowed the data transmission when ciphering and integrity protection are achieved during the connection establishment procedure. Therefore, the data transmission can occur after the successful completion of the establishment procedure between the device and network.

The problem arises as a device stays in the connected state for a short period of time and subsequently releases the connection once the small size data is sent. Generally, the device needs to perform multiple transmissions and receptions of control signals to initiate and maintain the connection with a network. As a payload size of the data is relatively smaller compared with the amounts of the control signals, making a connection for the small data transmission becomes more of a concern for both the network and the device due to the control signaling overhead.

The 3GPP has developed the SDT procedure to enable data transmission in the inactive state over the existing LTE and NR standards. The device initiates the SDT procedure by transmitting an RRC request message (e.g., SDT request message) and data in parallel instead of transmitting the data after the RRC request message processed by a network. Additional transmission and/or reception are optional. The device performs this SDT procedure without transition to the connected state (i.e., without making a connection to the network).

The SDT enables for the network to accept data transmission without signaling intensive bearer establishment and authentication procedure required for the RRC connection establishment or resume procedure. For example, in the SDT procedure, the device needs only one immediate transmission of a transport block (TB) that contains data and RRC request message. Furthermore, the device does not need to perform procedures (e.g., radio link monitoring) defined in the connected state since the RRC state is kept as the inactive state. This results in improving the battery life of the device by avoiding control signaling unnecessary for transmission of small size data.

The principle of the SDT is very simple. The network configures radio resources beforehand for the data transmission in the inactive state. For example, if the conditions to use the configured radio resources satisfy, the device transmits data and the RRC request message together via the configured radio resources. In the 3GPP standards, there are two types of the SDT depending on the ways to configure the radio resources: (1) SDT using a random access (RA) and (2) SDT using preconfigured radio resources. 

Figure 2 (top) illustrates different types of the SDT referred in 3GPP LTE and NR standards. The SDT using the random access in LTE and NR standards is referred to as an EDT (early data transmission) and RA-SDT (Random Access based SDT), respectively. For both the EDT and the RA-SDT, the device performs data transmission using shared radio resources of the random access procedure. Thus, the contention with other devices can occur over the access to the shared radio resources. The shared radio resources for the SDT are broadcast by system information and are configured as isolated from the one for a nonSDT RA procedure, i.e., the legacy RA procedure. On the other hands, the CG-SDT uses the preconfigured radio resources dedicated to the device. The SDT using the preconfigured radio resource is referred to as transmission via PUR (Preconfigured Uplink Resource) in the LTE standards. The NR standards refers the SDT using the preconfigured radio resource as CG-SDT (Configured Grant based SDT). The network configures the configuration parameters of the preconfigured radio resources when transiting the device in the connected state to the inactive state. For example, an RRC release message transmitted from the network for a connection release contains the configuration parameters of PUR or CG-SDT. No contention is expected for the SDT using the preconfigured radio resource since the configuration parameters are dedicated to the device. 

You can continue reading the details in whitepaper here. Ofinno has another whitepaper on this topic, 'Small Data Transmission (SDT): Protocol Aspects' here.

3GPP also recently published an article on this topic here. Quoting from the article:

With SDT it is possible for the device to send small amounts of data while remaining in the inactive state. Note that this idea resembles the early GSM systems where SMS messages where sent via the control signalling; that is, transferring small amounts of data while the mobile did not have a (voice) connection.

SDT is a procedure which allows data and/or signalling transmission while the device remains in inactive state without transitioning to connected state. SDT is enabled on a radio bearer basis and is initiated by the UE only if less than a configured amount of UL data awaits transmission across all radio bearers for which SDT is enabled. Otherwise the normal data transmission scheme is used.

With SDT the data is transmitted quickly on the allocated resource. The IoT device initiates the SDT procedure by transmitting an RRC request message and payload data in parallel, instead of the usual procedure where the data is transmitted after the RRC request message is processed by a network.

It is not only the speed and the reduced size of the transmitted data which make SDT such a suitable process for IoT devices. Since the device stays in the inactive state, it does not have to perform many tasks associated with the active state. This further improves the battery life of the IoT device. Additional transmission and/or reception are optional.

There are two ways of performing SDT:

  1. via random access (RA-SDT)
  2. via preconfigured radio resources (CG-SDT)

Random Access SDT

With RA-SDT, the IoT device does not have a dedicated radio resource, and it is possible that the random access message clashes with similar RA-SDT random access messages from other IoT devices. The device gets to know the radio resources for the RA procedure from system information messages, in a similar way to non RA-SDT devices. However, the RA radio resources for SDT and non SDT devices are kept separate; that is, these device types do not interfere with each other in random access

The RA-SDT procedure can be a two-step or a four-step random access procedure. In two-step procedure the payload data is already sent with the initial random access message, whereas in four-step procedure the device first performs contention resolution with the random access request - random access response message pair, and then sends the UL payload with RRC Resume Request. The procedure may continue with further uplink and downlink small data transmissions, and then it is terminated with an RRC Release from the network.

Below are the signalling diagrams for both two-step and four-step RA-SDT procedures. Note that in both cases the UE stays in the RRC inactive state during the whole process.

Configured Grant SDT

For CG-SDT, the radio resources are allocated periodically based on the estimation of the UE’s traffic requirements. This uplink scheduling method is called Configured Grant (CG). With CG-SDT there will be no message clashes with other IoT devices since the radio resources are dedicated for each device. The resource allocation is signalled to the IoT device by the network when the device leaves the connected state.

If the amount of data in the UE's tx buffer is larger than a defined limit, then the data transmission is done using the normal non-SDT procedure.

For SDT process, the device selects the CG-SDT as the SDT type if the resources for the CG-SDT are configured on the selected uplink carrier. If the resources for the CG-SDT are unavailable or invalid, the RA-SDT or the non-SDT RA procedure will be chosen if those are configured. If no SDT type configuration is available then a normal non-SDT data transmission is performed.

With IoT devices proliferating, it makes sense to optimise data transfer and anything else that will reduce the power consumption and let the battery in the devices last for much longer.

Related Posts

Wednesday 21 June 2023

3GPP TSG RAN and TSG SA Release-19 Workshop Summary

3GPP recently announced the milestone of reaching 100th plenaries of the three Technical Specification Groups (TSGs) in 3GPP which took place in Taipei last week. If you are unsure what TSGs are, we recently made a tutorial of 3GPP, available here.

During the plenary TSG SA and TSG RAN held workshops on Release 19. The top level link for RAN workshop is here while that for SA is here. SA also has HTML link of the documents here.

The slide above is from the RAN chair's summary provides list of topics that were discussed. The following is the executive summary from the draft workshop report:

The 3GPP TSG RAN Rel-19 face-to-face workshop was held June 15 - June 16, 2023 in Taipei hosted by TAICS (Taiwan Association of Information and Communication Standards) and MediaTek with 174 participants (see Annex A) and 491 Tdocs (see Annex B). A GotoWebinar conference call was carried out during the whole workshop to display discussed documents and to allow listen & talk access for people joining remotely.

The workshop agenda was provided in RWS-230001 and split into 3 main parts:

  • High-level overview proposals for Rel-19: 18 Tdocs handled, 46 not treated, 1 in the end endorsed (RP-230488)
  • Specific RAN1/2/3-led Rel-19 topics: 29 Tdocs handled, 369 not treated
  • RAN4-led Rel-19 topics (for information only): 20 not treated

Note: High-level overview proposals for Rel-19 and RAN4-led Rel-19 topics had the restriction of maximum one contribution led per company.

Some guidance about the workshop was provided on the RAN email reflector on 28.04.23 and 02.05.23.

Time plan versions of the workshop were provided on 02.05.23, 11.06.23 and on 15.06.23.

Workshop inputs were possible from 28.04.23 until the submission deadline 31.05.23 9pm UTC.

(Late Tdoc requests as well as revisions of Tdocs after the Tdoc request deadline 30.05.23 9pm UTC were avoided in order to not complicate the Tdoc handling, like quotas for AI 4 and 6, preparations of the workshop in parallel to RAN #100 and preparations of the summary etc.)

Originally, Thursday 15.06.23 and Friday 16.06.23 morning were planned for presentations of a limited set of 47 workshop contributions (selected by the RAN chair trying to achieve a fair coverage of the topics and interests and taking into account that there were many more inputs that can be handled in a 2 days workshop) and Friday afternoon was reserved for the discussion of a summary of the RAN chair (in RWS-230488). Note: Since the presentation part went faster and the Friday lunch break was skipped, the workshop ended on Friday afternoon earlier than originally planned.

Finally, the RAN chair's summary in RWS-230488 was endorsed indicating the motivations and handling of the workshop, the Rel-19 timeline and load plans and the management and categorization of topics.

TSG SA didn't have a summary slide but SWS-230002, output of drafting session on Consolidated SA WG2 Rel-19 Work, listed the following topics:

  • Satellite Architecure Enhancements
  • XRM Enhancements and Metaverse
  • AI/ML enhancements
  • Multi-access (Dual 3GPP + ATSSS Enh)
  • Integrated Sensing and Communication
  • Ambient IoT
  • Energy Efficiency / Energy Saving as a Service
  • IMS and NG_RTC enhancements
  • Edge Computing Enhancements
  • Proximity Services enhancements 
  • TSC/URLLC/TRS enhancements 
  • Network Sharing 
  • User identities + identification of device behind RG/AP
  • 5G Femto 
  • UAS enhancements 
  • VMR Enhancements 
  • UPEAS Enhancements 

Fattesinh Deshmukh has a summary of 3GPP RAN Rel-19 Workshop on LinkedIn here. Nokia has their summary of the workshop here.

Related Posts

Wednesday 31 May 2023

New 5G NTN Spectrum Bands in FR1 and FR2

Release-17 includes two new FR1 bands for NTN; n255 (a.k.a. NTN 1.6GHz) and n256 (a.k.a. NTN 2GHz). The picture is from a slide in Rohde & Schwarz presentation available here. Quoting from an article by Reiner Stuhlfauth, Technology Manager Wireless, Rohde & Schwarz:

Currently, several frequency ranges are being discussed within 3GPP for NTN. Some are in the FR1 legacy spectrum, and some beyond 10 GHz and FR2. The current FR1 bands discussed for NTN are:

  • The S-band frequencies from 1980 to 2010 MHz in uplink (UL) direction and from 2170 to 2200 MHz in downlink (DL) direction (Band n256).
  • The L-band frequencies from 1525 to 1559 MHz DL together with 1626.5 to 1660.5 MHz for the UL (Band n255).1

These frequency ranges have lower path attenuation, and they’re already used in legacy communications. Thus, components are available now, but the bands are very crowded, and the usable bandwidth is restricted. Current maximum bandwidth is 20 MHz with up to 40-MHz overall bandwidth envisaged in the future [TR 38.811].

As far as long-term NTN spectrum use is concerned, 3GPP is discussing NR-NTN above 10 GHz. The Ka-band is the highest-priority band with uplinks between 17.7 and 20.2 GHz and downlinks between 27.5 and 30 GHz, based on ITU information regarding satellite communications frequency use.2 Among current FR2 challenges, one is that some of the discussed bands fall into the spectrum gap between FR1 and FR2 and that NTN frequencies will use FDD duplex mode due to the long roundtrip time.

Worth highlighting again that the bands above, including n510, n511 and n512 are all FDD bands due to the long round trip times.

The latest issue of 3GPP highlight magazine has an article on NTN as well. Quoting from the article:

The NTN standard completed as part of 3GPP Release 17 defines key enhancements to support satellite networks for two types of radio protocols/interfaces:

  • 5G NR radio interface family also known as NR-NTN
  • 4G NB-IoT & eMTC radio interfaces family known as IoT-NTN

These critical enhancements including adaptation for satellite latency and doppler effects have been carefully defined to support a wide range of satellite network deployment scenarios and orbits (i.e., LEO, MEO and GEO), terminal types (handheld, IoT, vehicle mounted), frequency bands, beam types (Earth fixed/Earth moving) and sizes. The NTN standard also addresses mobility procedures across both terrestrial and non-terrestrial network components. Release 17 further includes Radio Frequency and Radio Resource Management specifications for terminals and satellite access nodes operating in two FR1 frequency ranges allocated to Mobile Satellite Services (i.e., n255 and n256).

You can read it here.

Related Posts

Tuesday 23 May 2023

Top 10 New (2022) Security Standards That You Need to Know About!

I had been meaning to add this session to the blog for a while. Some security researchers may find these useful. 

At RSA Conference 2022, Bret Jordan, CTO, Emerging Technologies, Broadcom and Kirsty Paine, Advisor - Technology & Innovation, EMEA, Splunk Inc. presented a talk covering what they described as the most important, interesting and impactful technical standards, hot off the press and so 2022. From the internet and all its things, to the latest cybersecurity defenses, including 5G updates and more acronyms than one can shake a stick at. 

The video is embedded below and the slides are available here.

Related Posts

Wednesday 3 May 2023

Qualcomm Webinar on 'Realizing mission-critical industrial automation with 5G'

Private 5G networks have immense potential to transform industries by improving flexibility within the shop floor of the industries. Industrial 5G networks hold the promise to transform mission-critical industrial automation by using the built-in 5G features of higher bandwidth, lower latency, greater reliability, and improved security.

Some of the ways in which Industrial 5G (I5G) networks will help transform mission-critical industrial networks using automation include:

  • Enhanced Communication: I5G networks will offer faster and more reliable communication between machines, sensors, and other devices. This will lead to better synchronization, increased efficiency, and reduced downtime in industrial processes.
  • High-Quality Video: I5G networks will provide high-quality video streaming, enabling real-time monitoring of industrial processes. This will be particularly useful in applications such as remote inspections, quality control, and process optimization.
  • Edge Computing: I5G networks will support edge computing, that will enable processing of data close to where it is generated. This will help to keep latency to a minimum thereby improve response times and making it possible to perform critical tasks in real-time.
  • Improved Security: I5G networks will provide improved security features along with network slicing, which will enable the creation of secure virtual networks for specific applications or users. This will in-turn help to protect against cyberattacks and ensure the integrity of data.
  • Reduced Downtime: I5G networks will help to reduce downtime by providing real-time monitoring and predictive maintenance capabilities. This will allow identification of potential problems before they cause downtime thereby enabling proactive maintenance and repairs.

Overall, I5G networks have the potential and the capability to significantly improve mission-critical industrial automation by providing faster, more reliable, and secure communication, enabling real-time monitoring and control, and reducing downtime through predictive maintenance capabilities.

In addition, Private/Industrial 5G will help with Time-Sensitive Networking (TSN) by providing a highly reliable and low-latency wireless communication network that can support real-time industrial control and automation applications. TSN is a set of IEEE standards that enable time-critical data to be transmitted over Ethernet networks with very low latency and high reliability.

I5G networks provide a wireless alternative to wired Ethernet networks for TSN applications, which can be advantageous in environments where deploying Ethernet cabling is difficult or costly. With I5G, TSN traffic can be prioritized and transmitted over the network with low latency and high reliability, which is critical for industrial automation and control applications that require precise timing and synchronization.

Moreover, I5G networks can be deployed with network slicing capabilities, allowing for the creation of multiple virtual networks with different performance characteristics tailored to specific applications or user groups. This means that TSN traffic can be isolated and prioritized over other types of traffic, ensuring that critical data is always transmitted with the highest priority and reliability.

Last year, Qualcomm hosted a webinar on 'Realizing mission-critical industrial automation with 5G'. The webinar is embedded below:

Here is the summary of what the webinar includes:

Manufacturers seeking better operational efficiencies, with reduced downtime and higher yield, are at the leading edge of the Industry 4.0 transformation. With mobile system components and reliable wireless connectivity between them, flexible manufacturing systems can be reconfigured quickly for new tasks, to troubleshoot issues, or in response to shifts in supply and demand. 

5G connectivity enables flexibility in demanding industrial environments with key capabilities such as ultra-reliable wireless connectivity, wireless Ethernet, time-sensitive networking (TSN), and positioning. There is a long history of R&D collaboration between Bosch Rexroth and Qualcomm Technologies for the effective application of these 5G capabilities to industrial automation use cases. At the Robert Bosch Elektronik GmbH factory in Salzgitter, Germany, this collaboration has reached new heights by demonstrating time-synchronized control of an industrial robot, and remote positioning of an automated guided vehicle (AGV) over a live, ultra-reliable 5G private network.

Watch the session to learn how:

  • Qualcomm Technologies and Bosch Rexroth are collaborating to accelerate the Industry 4.0 transformation
  • 5G technologies deliver key capabilities for mission-critical industrial automation
  • Distributed control solutions can work effectively across 5G TSN networks
  • A single 5G technology platform solves connectivity and positioning needs for flexible manufacturing

The video is also available on Qualcomm site here and the slides are here.

A shorter video looking behind the tech to see how Qualcomm and Bosch are partnering to enable mission-critical industrial automation over a 5G private network is as follows:

Related Posts

Thursday 6 April 2023

ETSI's Summit on Sustainability: ICT Standards for a Greener World

The ETSI Summit on Sustainability - How ICT developments and standards can enable sustainability and have a positive impact on society, took place on 30 March 2023 and focused on the key role of the ICT industry and related standardization activities to support Green initiatives. The event brought a large and global audience of over 220 stakeholders including operators, solution providers, policy makers and standards bodies or fora working on the topic.

A multitude of presentations including two interactive panel sessions, rhythmed the day and succeeded to make it a highly interactive Summit, pointing out challenges and how ICT can be both the problem and the solution.

The opening session examined the sustainability challenges and global green initiatives from numerous global standards bodies and fora. One of the suggested actions was to adopt ESG (Environmental Social Governance) goals as an integral part of the company’s objectives. Another highlight from the session was the need for standards work on the measuring and reporting of “avoided emissions,” that is being covered by ongoing work in ETSI. Feedback from the audience pointed out that it would be beneficial to further investigate the balance of ICT deployments vs real needs. Do we really need to endlessly deploy new technologies, when exiting ones serve the need?

The following are presentations from the welcome address and session 1:

The second session focused on the role of ICT in sustainability and was animated by two panels. The first one addressed the operators’ objectives and their plans for sustainability. The second one dealt with various initiatives being taken by solutions providers to meet the needs expressed by the operators and society as a whole. Suggested actions emerging from the debate included putting sustainability criteria in the procurement phase towards the vendors and enhance collaboration between operators, to share their common requirements and provide them to the supply chain ecosystem. In an animated exchange between the Panellists and the audience it was highlighted that there is an urgent need to reduce energy consumption, extend the lifecycles of ICT equipment and systematically recycle and repurpose in order to reduce ICT waste.

The following are presentations from session 2:

  • Session 02 - The Role of ICT in Sustainability: The session comprises two interactive panel sessions examining 1) Operators objectives and plans for Sustainability and 2) several initiatives being taken by solutions providers to meet those objectives. Session Chaired by David Boswarthick, ETSI
    • Operators Panel Moderated by Anita Dohler, NGMN Alliance e.V.: The purpose of this panel is to examine what are the sustainability plans, challenges & priorities for Operators
      • Saima Ansari, Deutsche Telekom
      • P. Balaji, Vodafone Idea
      • Marc Grant, AT&T
      • Luca Pesando, TIM
    • Solution Providers Panel Moderated by Joe Barrett, GSA, Global Mobile Suppliers Association - The purpose is to examine what the current solutions and remaining challenges on Sustainability are.

The afternoon opened with an  overview of ETSI, 3GPP and oneM2M activities supporting technologies for sustainability. One of the presentations highlighted that ICT should initially focus its own environmental impacts and consider digital sobriety as it is recognized that the cleanest energy is the one that is not consumed.

The following are presentations from session 3:

The summit concluded with a dynamic exchange around what more telecoms can do to move forward in the right direction. ICT and specifically data centres create a significant carbon footprint, and there was a call to use the ISO Net Zero guidelines in order to develop sustainable strategies. The industry should adopt an eco-design (sustainability by design) approach and seek to have products that are energy efficient, with longer life cycles, recyclable and repairable.

The following are presentations from session 4:

As a conclusion it was agreed that ICT is part of the sustainability problem and must seek to reduce its own emissions, whilst at the same time ICT is certainly part of the solution and should be applied to other domains in order to help them reach their own sustainability goals. As a first step, making ICT more sustainable should be the #01 priority for the industry today and ETSI groups TC EE (environmental engineering), TC ATTM (access, terminal and multiplexing) and ISG OEU (operational energy efficiency for users) are currently providing the standards to enable this transition to greener digital technologies.

Event Wrap-Up / Conclusions is available here.

Should you wish to learn more about the summit, all of the presentations including the conclusion slides are available here.

Related Posts

Friday 10 March 2023

How many Cell Sites and Base Stations Worldwide?

I wrote a blog post on this topic nearly three years back on the Operator Watch Blog here. That post is very handy as every few months someone or other asks me about this number. Here is a slightly updated number, though I am not confident on its accuracy. 

Gabriel Brown, analyst at Heavy Reading shares this chart above in the annual online Open RAN Digital Symposium. Based on the chart above, there are 7 million physical sites and 10 million logical sites. As there are many sites hosting infrastructure from multiple operators, the number of logical sites are more than the number of physical sites.

Again, most of the sites have distributed RAN (D-RAN) so there may be one or more base stations (baseband unit or BBU) and each base station can serve one or more radios. See links at the bottom for tutorials on these topics.

China Tower had nearly 2.1 million telecom towers installed with 3.36m tower tenants at end of 2022. An MIIT minister said that China's operators will deploy 600k 5G base stations in 2023, taking total to 2.9m.

The number of 5G radios in India just crossed 100,000 according to latest data released by the Department of Telecommunications. A base station generally manages multiple radios so not sure how many base stations would be there for 5G and even for older Gs.

In South Korea, according to the Ministry of Science and ICT and the mobile communication industry, as of December 2021, had 460,000 5G wireless stations of which, base stations accounted for 94% of the total, or 430,000 units, while repeaters only accounted for 30,000 units, or 6%.

Light Reading reported in September 2022 that there are nearly 419,000 cell sites across the US, according to the newest figures from CTIA. 

China and USA are roughly the same size so you can see how China is ensuring their mobile networks provide the best QoE. It should also be noted that the population of China is over four times that of the USA. On the other hand, India and China have the same population but India is one third the size of China roughly.

Related Posts:

Thursday 16 February 2023

Accelerating O-RAN Adoption Through Open Source

Telecom Infra Project's Fyuz 2022 conference took place in Madrid from 25 to 27 October 2022. It provided a unique experience by combining technology with gastronomy to stir the attendee’s imagination. It was an event where leaders of open and disaggregated network solutions and the wider telecoms industry gathered to share and discuss recipes for success. Many of the sessions on days 1 & 2 discussed how O-RAN Alliance and TIP work with and complement each other.

On the morning of day 2, one of the breakout sessions discussed how to accelerate O-RAN adoption with the help of open source software. The description of the session as follows:

Modern standards often include code-like sections in their specifications. Open source can provide reference implementation testbeds to inform the specifications and facilitate testing and integrating for ecosystem components. The work of the OSC, ONAP, OAI, and ONF can improve the quality of specifications and facilitate the integration and testing of commercial products. 

The following is a playlist of the videos of the session.

The following is the list of speakers and their topics:

  • O-RAN SC Overview: Accomplishments and Future Work by James Li, Deputy Director and Principal Software Architect, Converged Service Solutions, China Mobile.
  • RIC APP Track Updates by Ramesh Sriraman, Global Technology Director, HCL Technologies. 
  • Accelerating O-RAN adoption with OpenAirInterface by  Florian Kaltenberger, Associate Professor, EURECOM and General Secretary, OAI Software Alliance.
  • William Diego Maza, Network Innovation Manager at Orange explains How Open Source Fits into Orange’s Open RAN Strategy.
  • O-RAN SMO Containerization by Pavan Samudrala Senior Member Technical Staff at Aarna Networks.
  • O-RAN SC INF Project that enables building an Open Source O-Cloud for RAN Infrastructure and is delivered by Gil Hellmann, VP, Telecom Solutions Engineering at Wind River.
  • Salvatore D'Oro, Research Assistant Professor, Northeastern University, Boston, USA looks at Experimenting with AI in O-RAN with OpenRAN Gym.

Related Posts

Friday 3 February 2023

ATIS Webinar on "3GPP Release 18 Overview: A World of 5G-Advanced"

Yesterday, ATIS, one of the seven 3GPP Organizational Partner (OP), delivered on online webinar on 3GPP Release 18 Overview: The World of 5G-Advanced. A summary of the webinar according to ATIS as follows:

As the first release of 5G-Advanced, Release 18 has been progressing well despite the challenges in fully resuming 3GPP face-to-face meetings in 2022.

In this webinar, ATIS provides a high-level summary of 3GPP Release 18: the confirmed Rel-18 timeline, status for the ongoing study and work items, and the newly converted work items from the completed study items. We also give a brief introduction of the preparation for Release 19 aiming for approval of the package of projects in December 2023.

Distinguished speakers included:

  • Wanshi Chen (Qualcomm, Chair of 3GPP RAN Plenary) will provide a view on radio interface and RAN system aspects.
  • Puneet Jain (Intel, Chair of 3GPP System Architecture Group – SA2) will look at whole system capabilities and network aspects.
  • Moderator: Iain Sharp, Principal Technologist, ATIS

The recording of the webinar is embedded below and slides available here.

Just a reminder, 5G covers Release 15, 16 and 17. 5G-Advanced is Release-18 onwards. Ideally, 18, 18 and 20. 6G should start with Release 21. Based on the current industry adoption of 5G, there is no reason to push the next generation on the operators before it's mature and everyone is ready to take it onboard.

Related Posts:

Tuesday 17 January 2023

Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)

3GPP Release 17 introduced a new feature called AKMA (Authentication and Key Management for Applications), the goal of which is to enable the authentication and generation of application keys based on 3GPP credentials for all UE types in the 5G System, especially IoT devices, ensuring to bootstrap the security between the UE and the applications in the 5G system.

3GPP TR 21.917 has an excellent summary as follows:

Authentication and key management for applications based on 3GPP credential in 5G (AKMA) is a cellular-network-based delegated authentication system specified for the 5G system, helping establish a secure tunnel between the end user and the application server. Using AKMA, a user can log in to an application service only based on the 3GPP credential which is the permanent key stored in the user’s tamper-resistant smart card UICC. The application service provider can also delegate the task of user authentication to the mobile network operator by using AKMA. 

The AKMA architecture and procedures are specified by SA3 in TS 33.535, with the related study showing how its general principles are derived documented in TR 33.835. The AKMA feature introduces a new Network Function into the 5G system, which is the AKMA Anchor Function (AAnF). Its detailed services and API definitions are specified by CT3 in TS 29.535. Earlier generations of cellular networks include two similar standards specified by SA3, which are generic bootstrapping architecture (GBA) and battery-efficient security for very low throughput machine type communication devices (BEST). Since the AKMA feature is deemed as a successor of these systems, the work is launched by SA3 without the involvement of stage 1.

In the latest issue of 3GPP Highlights Magazine, Suresh Nair, 3GPP Working Group SA3 Chair, Saurabh Khare & Jing Ping (Nokia) has explained the AKMA procedure. The article is also available on 3GPP website here. The article lists the following as AKMA advantages:

  • Since the AKMA framework uses authentication and authorization of the UE leveraging the PLMN credentials stored on the USIM, this becomes as strong as the network primary authentication and subsequent keys derived further to UE and Application Function (AF) interface.
  • The Application Functions can leverage the authentication service provided by the AKMA Anchor Function (AAnF) without additional CAPEX and OPEX.
  • The architecture provides a direct interface between the UE and the AF where a customized application-specific interface can be built, including the key management, key lifetime extension, etc.

The Journal of ICT Standardization has a paper on Authentication Mechanisms in the 5G System. It details AKMA and much more. It's a great place to start for anyone new looking to understand different 5G Authentication Mechanisms. 

Related Posts