60 research outputs found

    Identification of operational risk of embedded Subscriber Identity Module (SIM) technology based on ISO 31000: Systematic Literature Review

    Get PDF
    In the current digital era, telecommunications industry technology is growing rapidly, impacting the demands for innovation in the telecommunications operator business. One of them is the change in the size of the Subscriber Identity Module (SIM) card model, which is getting smaller, and the use of embedded SIM (eSIM) technology on smartphones. This study aims to identify operational risk factors from the change in SIM card technology to eSIM. The research method used is the Systematic Literature Review (SLR) method. This study documents and reviews scientific journal papers from scientific databases published from 2015 to 2022 on risk management in the information technology field, following this research's objectives. The results obtained from this study showed that there were 43 journals studied, of which four had the theme of technology-embedded subscriber identity module (eSIM), and 13 discussed risk operations technolog

    SUPPORTING DYNAMIC NETWORK SLICING AND POLICY CREATION FOR END DEVICES IN PRIVATE 5G NETWORKS

    Get PDF
    Described herein are techniques for handling dynamic slicing requirements of User Equipment (UE) by performing remote activation (e.g., Over-the-Air Provisioning (OTAP)) of the logical profiles captured in the embedded Subscriber Identity Module (eSIM) which are created for the different slicing needs in private 5G networks. Also described are techniques for installing policies based on the Manufacturer Usage Description (MUD) Uniform Resource Locator (URL) in a private 5G network and efficiently retaining it during a 5G outage

    New Paradigms for Access Control in Constrained Environments

    No full text
    International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already connected and five times more devices are expected to be deployed in the next five years. Technological standarization and the management and fostering of rapid innovation by governments are among the main challenges of the IoT. However, security and privacy are the key to make the IoT reliable and trusted. Security mechanisms for the IoT should provide features such as scalability, interoperability and lightness. This paper adresses authentication and access control in the frame of the IoT. It presents Physical Unclonable Functions (PUF), which can provide cheap, secure, tamper-proof secret keys to authentify constrained M2M devices. To be successfully used in the IoT context, this technology needs to be embedded in a standardized identity and access management framework. On the other hand, Embedded Subscriber Identity Module (eSIM) can provide cellular connectivity with scalability, interoperability and standard compliant security protocols. The paper discusses an authorization scheme for a constrained resource server taking advantage of PUF and eSIM features. Concrete IoT uses cases are discussed (SCADA and building automation)

    eSIM: новый технологический вызов для операторов мобильной связи

    Get PDF
    This article investigates the potential of promising eSIM technology. The essential features of eSIM technology including its benefits and drawbacks on the issues of storage multiple carrier profiles on one integrated electronic device (chip) and the way of devices connection to cellular communications without physical SIM cards are revealed. It is noted that the implementation of the eSIM standard leads to theincreased competition in mobile communications.В данной статье исследуется потенциал технологии eSIM. Рассматриваются основные особенности технологии, связанные с вопросами хранения нескольких операторских профилей на одном электронном устройстве (чипе) и способами подключения устройств к сети мобильной связи без физических SIM-карт, преимущества и недостатки технологии. Отмечается, чтовнедрение eSIM ведет к повышению конкуренции на рынке мобильной связи

    REMOTE AGENT-BASED OBSERVABILITY TECHNIQUE FOR IOT APPLICATION TELEMETRY DATA COLLECTION

    Get PDF
    Techniques are presented herein that support a remote observability capability (comprising remote visibility, monitoring, and troubleshooting) for Internet of things (IoT) devices that are connected behind an IoT gateway (by agnostic network connectivity) through a dynamically deployed Enterprise Agent that is able to monitor all of the underlying state changes (through a southbound interface in an operational technology (OT) protocol agnostic manner) in IoT devices and then relay the collected telemetry data to a cloud-based facility. Aspects of the presented techniques leverage an embedded Subscriber Identity Module (eSIM)-based Java Card facility to collect telemetry data through a metrics, events, logs, and traces (MELT) framework and an OpenTelemetry (OTel) application programming interface (API) along with a wireless modem. Further aspects of the presented techniques leverage an IoT SIM Applet For Secure End-2-End Communication (SAFE) agent

    Security Analysis of the Consumer Remote SIM Provisioning Protocol

    Full text link
    Remote SIM provisioning (RSP) for consumer devices is the protocol specified by the GSM Association for downloading SIM profiles into a secure element in a mobile device. The process is commonly known as eSIM, and it is expected to replace removable SIM cards. The security of the protocol is critical because the profile includes the credentials with which the mobile device will authenticate to the mobile network. In this paper, we present a formal security analysis of the consumer RSP protocol. We model the multi-party protocol in applied pi calculus, define formal security goals, and verify them in ProVerif. The analysis shows that the consumer RSP protocol protects against a network adversary when all the intended participants are honest. However, we also model the protocol in realistic partial compromise scenarios where the adversary controls a legitimate participant or communication channel. The security failures in the partial compromise scenarios reveal weaknesses in the protocol design. The most important observation is that the security of RSP depends unnecessarily on it being encapsulated in a TLS tunnel. Also, the lack of pre-established identifiers means that a compromised download server anywhere in the world or a compromised secure element can be used for attacks against RSP between honest participants. Additionally, the lack of reliable methods for verifying user intent can lead to serious security failures. Based on the findings, we recommend practical improvements to RSP implementations, to future versions of the specification, and to mobile operator processes to increase the robustness of eSIM security.Comment: 33 pages, 8 figures, Associated ProVerif model files located at https://github.com/peltona/rsp_mode

    AKMA Support in Multi SIM User Equipment

    Get PDF
    Multi SIM User Equipment (UE) can have more than one physical slot for Universal Integrated Circuit Card (UICC). The eUICC is an embedded version of the UICC, which cannot be physically removed from the communication device. Currently, 3rd Generation Partnership Project (3GPP) is working on developing Authentication and Key Management for Applications (AKMA), with which user can bootstrap authentication towards application server from his mobile subscription. We consider the scenario that may become common in devices with Multi SIM and eUICC, in which one subscription is used for primary services such as voice and data, and another subscription is used for AKMA services. In this scenario, the purpose is to use AKMA services simultaneously and without interrupting primary services. There are existing requirements for Multi SIM and eUICC, which restrain this scenario from being successful. The solution that we propose includes arrangements and adaptations, in order to provide secure and uninterrupted services of both primary and AKMA services.Peer reviewe

    Value Network Analysis of Embedded Subscriber Identity Module in Machine to Machine Communication

    Get PDF
    SIM card technology has evolved in size and feature over the years. Now machine to machine communication has paved the way of embedded SIM (eSIM) integration into devices. This evolution of eSIM is still a little far off but might become essential sooner rather than later if the traffic, usage and new services of M2M booms. This thesis discusses the possible future scenarios and value networks of eSIM based M2M communication that will shape the ecosystem in the next 10 years time frame. Necessary background regarding SIM card evolution is discussed before going into the future scenario. The thesis also consists of studies on current cellular network structure, Internet of things and Machine-to-machine communication from various sources to understand both technical and business dynamics of these services. By the virtue of brainstorming sessions and expert interview from industry the basic trends and key uncertainties are refined to use as the basis of scenario planning. Also efforts have been made to identify the business roles and corresponding interested actors to take over these roles through value network configuration method. Four possible future scenarios are constructed according to Schoemaker's scenario planning method which explore possible changes in the M2M industry due to eSIM. The scenarios reflect the diverse interests of the involved stakeholders and their influence over the market. Value network configurations further investigate the different possible evolution paths to introduce scope for new business models. Analysis and results from this thesis can be a good indicator for future M2M and eSIM ecosystem

    5G new radio evolution towards enhanced features

    Get PDF
    Abstract. Smartphones, as well as other smart devices, with the capability of having more than one subscriber identity module (SIM) at once have been on the market for several decades. The support and implementation for these current multi-SIM smart devices has been largely done without radio specifications, meaning that these implementations are completely proprietary. As the market and use of multi-SIM enabled devices grow, operators and network vendors have identified that there is a need to standardise certain aspects of multi-SIM functionality. This is needed to solve several issues regarding multi-SIM operations between the user equipment (UE) and network (NW). In this thesis, the NR 3GPP Release 17 is analysed and 5G modem implementations for some of the introduced multi-SIM features are designed. Impact to both UE and NW side are taken into consideration for the introduced multi-SIM features. The designed 5G modem implementations for multi-SIM can not completely validated until the implementation is completed for the 5G enabled networks.5G radion uusien ominaisuuksien kehittyminen. Tiivistelmä. Älypuhelimia, kuten muitakin älykkäitä laitteita, joissa voi olla useampi kuin yksi SIM-kortti yhtäaikaisesti, on ollut markkinoilla jo useita vuosikymmeniä.Tuki ja implementaatiot tällaisille multi-SIM älylaitteille on suurimmaksi osaksi tehty ilman radiospesifikaatioita, joka tarkoittaa, että tällaiset implementaatiot ovat täysin valmistajien omia toteuksia. Operaattorit ja verkkovalmistajat ovat tunnistaneet tarpeen standardoida tiettyjä osa-alueita multi-SIM toiminnallisuudesta markkinoiden ja multi-SIM-laitteiden käytön kasvamisen myötä. Tämä on tarpeen, jotta multi-SIM toiminnalisuuteen liittyvät ongelmat saadaan ratkaistua käyttäjien laitteiden (UE) ja verkkojen (NW) välillä. Tässä työssä analysoidaan NR 3GPP Release 17:n määrityksiä ja työn puitteissa 5G modeemi-implementaatiot joillekin esitetyille multi-SIM toiminnallisuuksille on suunniteltu. Vaikutukset sekä UE- että NW-puolelle on otettu huomioon esitetyille multi-SIM-toiminnallisuuksille. Suunniteltua 5G modeemitoteutusta ja vaikutuksia multi-SIM:lle ei voida täysin validoida UE- ja NW- puolella ennen kuin toteukset on tehty 5G verkoille

    USAGE OF 5G IN UAV MISSIONS FOR ISR

    Get PDF
    Traditionally, UAVs operate on a one-to-one transmission mode where the UAVs have one data link between one ground command and control station. Therefore, the radius at which the UAV can travel is limited. The bandwidth of the traditional link is limited to less than 8Mbps and the quality of the video is below 1080p. 4G technology has been applied to the UAV data link to solve some of these more traditional problems. However, the 4G data link also comes with its own limitations such as downlink interference and can only be useful in scenarios with a high delay tolerance. 5G technology solves the spatial coverage problem by increasing the number of antenna modules and fusing the antenna module and radio hardware. The result is a three-dimensional beam. The UAV itself can be used as a base station for the 5G network, so that all ground stations can be connected as the UAV continues its flight path. UAVs can also be used as aerial nodes in a larger swarm network to offer coverage over larger areas. Additionally, the use of the OpenStack architecture can allow the Navy to customize protocols as desired. The proposed research includes investigating how current UAV to ship/shore communications are conducted. The objective of this thesis is to determine if 5G communications are possible between UAV and ship/shore assets, to successfully connect a UAV to the 4G and possibly 5G network and to determine if UAVs can send data between each other to the ground station.Lieutenant Commander, United States NavyApproved for public release. Distribution is unlimited
    corecore