5G 6G and IoT
5G 6G and IoT
Kanagasundaram K
Agenda
➔ 5G Overview
What is 5G?
Evaluation 1G to 5G and 6G
5G/6G Use Cases
Source: https://pdfs.semanticscholar.org/92cf/1e3eb16a2f18db2766897164e084c995e36e.pdf
6G Advantages
https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
Comparison between 5G and 6G Architecture
Source:
The shift to 6G communications: vision and requirements
Drivers for High speed Networks
Source: https://futurenetworks.ieee.org/tech-focus/june-2017/standards-for-5g-and-beyond
Capabilities of 5G
Source: https://en.wikipedia.org/wiki/5G
Capabilities of 5G/6G
Source:
3GPP/5G_INFRASTRUCTURE_WORK_3GPP_MAYER.pd
5G Architecture
Session Management
Traffic Steering
Policy enforcement and QoS Control
Service Based Architecture Reference Point Architecture
Security and
Authentication
Mobility management
SMF Selection
Source:
3GPP/5G_INFRASTRUCTURE_WORK_3GPP_MAYER.pd
Network Transformation from 4G to 5G
http://www.5gamericas.org/files/3215/1190/8811/5G_Services_and_Use_Cases.pdf
Network Slicing
https://arxiv.org/pdf/1703.04676.pdf
Self Organizing Network
❖ Defined in Release 8 of 3GPP (36.902)
➢ First available with LTE
❖ Types
➢ Distributed SON - eNB
➢ Centralized SON - OSS
➢ Hybrid SON
❖ Characteristics
➢ Scalability, Stability, Agility
❖ Other network types
➢ Adaptive - fixed conditions
➢ Autonomous - Adaptive + no Human
➢ Cognitive - Learning and adaptive to the
environment
➢ SON - Adaptive, Autonomous,decide
independently. Learn and improve
performance based on feedback
Implementation of Self-Organizing Network (SON) on Cellular Technology based on Big Data Network Analytics - Muhammad Firdaus
Self Configuration
Example
O. G. Aliu, A. Imran, M. A. Imran, and B. Evans, “A Survey of Self Organisation in Future Cellular Networks
IoT Challenges and Opportunities
● Massive number of connected Devices
and Sensors
● Vest amount of data generated and
processed
● Heavenly Automation Infrastructure
● Real Time monitoring and Analytics
● Visualization and User experience
● Large scale deployment
● Security and Privacy
Challenges in IoT and 5G/6G integration
● Scalability Issues - Managing Billions of
devices - AI Driven Management
● Security and Privacy Concerns - increased
cyber threats - Advanced Authentication and
encryption
● Energy Consumptions & sustainability - Energy
demand Iot 5g/6G - Green IoT and Energy
Efficient comm Protocol
● Cost and Infrastructure Challenges - High
deployment cost - OpenRAN and Shared spectrum
● Interoperability and Standardization - Lack
of standards of IoT devices - Unified
frameworks for seamless comm.
IoT-Security Challenges
● Device Authentication and Authorization
● Data Encryption
● Firmware and software Updates
● Physical Security
● Network security
● Privacy Concerns
● Life Cycle and Supply Chain Management
AI Application in IoT
● Predictive Maintenance
● Anomaly Detection
● Optimized Resource Management
● Smart Automation, Robotics
○ Home, industrial, etc
● Monitoring and Diagnostics
○ Health Care, Network Operation,
Traffic, etc
● Environmental Monitoring and
Sustainability
● Supply chain Optimization
AI, ML Applications in Securing IoT
● Anomaly Detection ● Vulnerability Management
○ Baseline the normal behaviour, Pattern
○ ML Based system can automatically detect
○ Detect deviations and alletrs
Vulnerability
○ Ex: Network, user and application
○ Use Software Configurations, versions and
behaviours
patch level
● Behavioral Analysis ○ Help detect and mitigate critical issues
○ ML based analysis of IOT devices and
Users
● Network Intrusion Detection and
○ To detect security incidents, insider Prevention
threats or security compromises ○ AI Powered IDS and IPS
● Threat Intelligence ○ ML Algorithms analyse Traffic Patterns,
protocol anomalies, attack signature
○ Aggregate and analyze data from various
sources to identify emerging threats ● Authentication and Access
○ Sources - Open source feeds,
vulnerabilities, attack techniques
Control
○ AI Based Authentication - Contextual and
● Malware Detection multifactor
○ Detect Malwares - botnets, ○ ML can detect Anomalies in user patterns
ransomware and behaviour
○ ML models trained on large datasets of ● Security Analytics
known malware ○ AI, ML can analyse data form IOT and
● Adversarial Machine Learning Security system, correlate and detect
○ Detect and mitigate attacks against ML incidents
based security systems ● Application of GPTs
● Automated Incident Response ○ Natural Language understanding
○ SOAR - AI powered Security Orchestration, ○ Security Education and Training
Automation and response ○ And all the above
References
Gupta, A., & Jha, R. K. (2015). "A survey of 5G network: Architecture and emerging
technologies." IEEE Access.
Zhang, Z., Wang, Z., et al. (2019). "6G Wireless Networks: Vision, Requirements, Architecture,
and Key Technologies." IEEE Vehicular Technology Magazine.
Alsabah, M., et al. (2021). "Green IoT: Energy-efficient solutions for next-generation IoT
applications." IEEE Internet of Things Journal.
Li, X., et al. (2022). "Security and Privacy in 6G Networks: Research Directions and
Challenges." IEEE Communications Surveys & Tutorials.
Raza, U., et al. (2018). "Low Power Wide Area Networks: An Overview." IEEE Communications
Surveys & Tutorials.
References:
1. https://docbox.etsi.org/Workshop/2017/20170406_ETSI_SUMMIT_5G_NWK_INFRASTRUCTURE/01_SESSION_A_CHALL
ENGES_5G_INFRAST_DEVELOP/5G_INFRASTRUCTURE_WORK_3GPP_MAYER.pdf
2. https://futurenetworks.ieee.org/tech-focus/june-2017/standards-for-5g-and-beyond
3. http://www.3gpp.org/specifications/67-releases
4. http://www.5gamericas.org/files/3215/1190/8811/5G_Services_and_Use_Cases.pdf
5. Network Slicing for 5G with SDN/NFV: Concepts,Architectures and Challenges, https://arxiv.org/pdf/1703.04676.pdf
6. Network Function Virtualization (NFV); Archetectural Overview
https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.01.01_60/gs_nfv002v010101p.pdf
7. NFV and SDN—Key Technology Enablers for 5G Networks, Faqir Zarrar Yousaf, Michael Bredel, Sibylle Schaller, and Fabian
Schneider, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 11, NOVEMBER 2017
8. Network Slicing for 5G with SDN/NFV: Concepts, Architectures and Challenges, J. Ordonez-Lucena , P. Ameigeiras , D.
Lopez, J.J. Ramos-Munoz , J. Lorca, J. Folgueira, IEEE Communications Magazine, DOI 10.1109/MCOM.2017.1600935
https://www.3gpp.org/ftp/Information/presentations/Presentations_2024/04_SA6_past-present-future_v20.pdf
SDN
What is SDN?
❖ SDN is the outcome of the “Clean Slate Program”; which is an interdisciplinary
research program by Sanford University
❖ Aimed to build a new network with out considering the complexities of the existing
systems
❖ Key aspects of SDN include:
➢ separation of data and control planes
➢ a uniform vendor agnostic interface called OpenFlow between control and data
planes
➢ logically centralized control plane that constructs and presents a logical map of
the entire network to services or control applications on top
➢ slicing and virtualization of the underlying network
Limitations of current networking
Control Plane
Control Plane
❖ In the OpenFlow Architecture, an interface at the network switch is used to program the packet
matching and forwarding operations on the device through external control device called
“Controller”.
Main Components of an Openflow Switch
❖ The OpenFlow Logical Switch consists of one or more flow tables and a
group table.
Controller
OpenFlow Protocol
OpenFlow Channel
Group Table
❖ Network functions virtualization (NFV) (also known as virtual network function (VNF))
offers a new way to design, deploy and manage networking services. NFV
decouples the network functions, such as network address translation (NAT),
firewalling, intrusion detection, domain name service (DNS), and caching, to name a
few, from proprietary hardware appliances so they can run in software.
❖ It’s designed to consolidate and deliver the networking components needed to
support a fully virtualized infrastructure – including virtual servers, storage, and even
other networks. It utilizes standard IT virtualization technologies that run on
high-volume service, switch and storage hardware to virtualize network functions. It
is applicable to any data plane processing or control plane function in both wired
and wireless network infrastructures.
End to End Network Service with VNF
Source: https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.01.01_60/gs_nfv002v010101p.pdf
ETSI - NFV Reference Architecture Framework
(MONO)
Source: https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.01.01_60/gs_nfv002v010101p.pdf
The Benefits of Network Functions Virtualization
https://www.3gpp.org/ftp/Information/presentations/Presentations_2024/04_SA6_past-present-future_v20.pdf