5G Phase 2 Security- Associated Threat Model and risk mitigation solutions

Introduction: SA3 group within 3GPP is currently responsible for security in the 5G System including the 3GPP enhancements for IoT and vertical industries. Furthermore, since the introduction of the 5G …

How vulnerable is 5G – security viewpoint

Executive Summary: The blog starts with a question, are we introducing new threat surface in 5G, we have already made radio flattened and split into RU-DU-CU and attach virtualized capabilities …

5G Functional Split: Is a choice of cost-effectiveness or network optimization

Executive Summary Functional split is not a new concept in RAN domain, when we moved from 2G to 3G world, CSP had already implemented functional split abstracting in the following …

Open RAN and Openness

Executive summary: With the introduction of nG (n>=5), mobile networks and the equipment that runs them must become more software-driven, virtualized, flexible, intelligent and energy efficient.  In the RAN domain, …

5G: A Transformation Journey towards smart cloud choice or necessity

Introduction: The Fifth Generation of Mobile Telephony, or 5G, or 5GS, is pushing out further, transforming connectivity which enables faster data transfer speeds.  Worldwide, operators are adopting 5G to support …