Abstract 5G network background
5G Security

5G Security Glossary

Comprehensive reference of 5G security terms, concepts, protocols, and technologies for telecommunications security professionals.

Browse Terms Alphabetically

Browse by Category

3GPP
Standards

The 3rd Generation Partnership Project is a standards organization that develops protocols for mobile telecommunications. 3GPP has defined the security architecture for 5G networks in TS 33.501.

Related Terms:

5G-AKA
SEPP
TS 33.501
5G Core (5GC)
Architecture

The core network of 5G systems, based on a service-based architecture (SBA) where network functions offer services to other authorized network functions via APIs.

Related Terms:

AMF
SMF
UPF
Service-Based Architecture
5G-AKA
Authentication

5G Authentication and Key Agreement is the primary authentication method in 5G networks, enhancing the security of previous AKA versions with additional security features like binding authentication to the serving network and protection against fake base stations.

Related Terms:

EAP-AKA'
SUCI
SUPI
AUSF
5G NR
Architecture

5G New Radio is the radio access technology for 5G networks, supporting enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and massive machine-type communications (mMTC).

Related Terms:

gNB
eMBB
URLLC
mMTC
ABBA
Authentication

Anti-Bidding down Between Architectures parameter is used in 5G to prevent bidding down attacks where an attacker forces the use of less secure authentication protocols.

Related Terms:

5G-AKA
EAP-AKA'
AMF
Architecture

Access and Mobility Management Function is responsible for connection and mobility management in 5G networks. It handles registration, connection, reachability, and mobility management functions.

Related Terms:

5G Core
SEAF
UE
ARPF
Authentication

Authentication Repository and Processing Function is a component of the UDM that stores authentication credentials and generates authentication vectors for 5G-AKA and EAP-AKA'.

Related Terms:

UDM
AUSF
5G-AKA
AUSF
Authentication

Authentication Server Function is responsible for authenticating UEs in 5G networks. It acts as the authentication server for 5G-AKA and EAP-AKA'.

Related Terms:

5G-AKA
EAP-AKA'
UDM
SEAF
Bidding Down Attack
Attacks

An attack where an adversary forces a UE and network to use a less secure protocol version or security algorithm than they would normally use.

Related Terms:

ABBA
Security Algorithm Negotiation

Complete Glossary

3

3GPP
Standards

The 3rd Generation Partnership Project is a standards organization that develops protocols for mobile telecommunications. 3GPP has defined the security architecture for 5G networks in TS 33.501.

Related Terms:

5G-AKA
SEPP
TS 33.501

5

5G Core (5GC)
Architecture

The core network of 5G systems, based on a service-based architecture (SBA) where network functions offer services to other authorized network functions via APIs.

Related Terms:

AMF
SMF
UPF
Service-Based Architecture
5G-AKA
Authentication

5G Authentication and Key Agreement is the primary authentication method in 5G networks, enhancing the security of previous AKA versions with additional security features like binding authentication to the serving network and protection against fake base stations.

Related Terms:

EAP-AKA'
SUCI
SUPI
AUSF
5G NR
Architecture

5G New Radio is the radio access technology for 5G networks, supporting enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and massive machine-type communications (mMTC).

Related Terms:

gNB
eMBB
URLLC
mMTC

A

ABBA
Authentication

Anti-Bidding down Between Architectures parameter is used in 5G to prevent bidding down attacks where an attacker forces the use of less secure authentication protocols.

Related Terms:

5G-AKA
EAP-AKA'
AMF
Architecture

Access and Mobility Management Function is responsible for connection and mobility management in 5G networks. It handles registration, connection, reachability, and mobility management functions.

Related Terms:

5G Core
SEAF
UE
ARPF
Authentication

Authentication Repository and Processing Function is a component of the UDM that stores authentication credentials and generates authentication vectors for 5G-AKA and EAP-AKA'.

Related Terms:

UDM
AUSF
5G-AKA
AUSF
Authentication

Authentication Server Function is responsible for authenticating UEs in 5G networks. It acts as the authentication server for 5G-AKA and EAP-AKA'.

Related Terms:

5G-AKA
EAP-AKA'
UDM
SEAF

B

Bidding Down Attack
Attacks

An attack where an adversary forces a UE and network to use a less secure protocol version or security algorithm than they would normally use.

Related Terms:

ABBA
Security Algorithm Negotiation

C

CUPS
Architecture

Control and User Plane Separation is an architectural enhancement that separates the control plane and user plane functions, allowing them to scale independently and be deployed in different locations.

Related Terms:

Control Plane
User Plane
UPF
SMF
Concealment Key (CK)
Encryption

A key used by the UE to encrypt the SUPI to create the SUCI, protecting the subscriber's permanent identity over the air interface.

Related Terms:

SUPI
SUCI
ECIES
Control Plane
Architecture

The part of the network that carries signaling traffic and is responsible for routing and controlling the network connections rather than actually carrying the user data.

Related Terms:

User Plane
CUPS
AMF
SMF

E

EAP-AKA'
Authentication

Extensible Authentication Protocol for Authentication and Key Agreement Prime is an alternative authentication method in 5G networks, particularly useful for non-3GPP access.

Related Terms:

5G-AKA
AUSF
Non-3GPP Access
ECIES
Encryption

Elliptic Curve Integrated Encryption Scheme is used in 5G networks for SUPI protection, encrypting the subscriber's permanent identity to create the SUCI.

Related Terms:

SUPI
SUCI
Concealment Key
eMBB
Use Cases

Enhanced Mobile Broadband is one of the three main 5G use cases, focusing on high data rates and increased capacity for applications like high-definition video streaming and virtual reality.

Related Terms:

URLLC
mMTC
5G NR

F

False Base Station Attack
Attacks

An attack where a malicious device impersonates a legitimate base station to intercept communications between UEs and the network. 5G includes several countermeasures against this attack.

Related Terms:

SUCI
5G-AKA
IMSI Catcher

G

gNB
Architecture

Next Generation NodeB is the 5G base station that connects UEs to the 5G Core network. It includes both centralized and distributed units (CU and DU) in some deployments.

Related Terms:

5G NR
CU
DU
UE
GUTI
Privacy

Globally Unique Temporary UE Identity is a temporary identifier assigned to a UE to avoid exposing the permanent identity (SUPI) during communications after initial registration.

Related Terms:

SUPI
SUCI
5G-GUTI

H

HPLMN
Architecture

Home Public Land Mobile Network is the network operated by the mobile provider with whom the subscriber has a contract and maintains their subscription data.

Related Terms:

VPLMN
UDM
AUSF
HTTP/2
Protocols

The protocol used for service-based interfaces in the 5G Core, replacing Diameter used in 4G. All 5G Core network functions communicate using RESTful APIs over HTTP/2.

Related Terms:

Service-Based Architecture
RESTful API
5G Core

I

IMSI Catcher
Attacks

A device that mimics a cell tower to intercept mobile communications and track users. 5G's SUCI mechanism is designed to prevent IMSI catching attacks.

Related Terms:

SUPI
SUCI
False Base Station Attack

K

K
Authentication

The subscriber's permanent key stored in the USIM and the ARPF, used as the root of all security contexts in 5G authentication.

Related Terms:

5G-AKA
ARPF
USIM
KAUSF
Authentication

Key for the Authentication Server Function, derived during 5G-AKA authentication and used to derive further keys in the key hierarchy.

Related Terms:

KSEAF
5G-AKA
Key Hierarchy
KAMF
Authentication

Key for the Access and Mobility Management Function, derived from KSEAF and used to protect signaling between the UE and AMF.

Related Terms:

KSEAF
AMF
Key Hierarchy
Key Hierarchy
Authentication

The structured derivation of multiple security keys from a root key in 5G, ensuring that different security contexts use separate keys.

Related Terms:

K
KAUSF
KSEAF
KAMF
KgNB
KgNB
Authentication

Key for the gNB, derived from KAMF and used to protect the radio interface between the UE and gNB.

Related Terms:

KAMF
gNB
Key Hierarchy
KSEAF
Authentication

Key for the Security Anchor Function, derived from KAUSF and bound to the serving network to prevent key compromise across networks.

Related Terms:

KAUSF
SEAF
Key Hierarchy

M

MEC
Architecture

Multi-access Edge Computing is a network architecture that enables cloud computing capabilities at the edge of the network, close to the end-users, reducing latency for applications.

Related Terms:

URLLC
Network Slicing
Local Breakout
mMTC
Use Cases

Massive Machine Type Communications is one of the three main 5G use cases, focusing on connecting a vast number of IoT devices with low power requirements.

Related Terms:

eMBB
URLLC
IoT Security

N

N1 Interface
Interfaces

The interface between the UE and AMF, carrying NAS signaling for registration, authentication, session management, and mobility.

Related Terms:

AMF
UE
NAS
N2 Interface
Interfaces

The interface between the RAN (gNB) and AMF, carrying signaling related to radio resource management and UE mobility.

Related Terms:

AMF
gNB
NGAP
N3 Interface
Interfaces

The interface between the RAN (gNB) and UPF, carrying user plane data between the radio network and the core network.

Related Terms:

UPF
gNB
GTP-U
NAS
Protocols

Non-Access Stratum is the protocol layer between the UE and AMF, handling functions like registration, authentication, and session management.

Related Terms:

AMF
UE
N1 Interface
Network Slicing
Architecture

A key feature of 5G that allows multiple virtual networks to be created on top of a common physical infrastructure, each optimized for specific services or customers.

Related Terms:

NSSF
S-NSSAI
Slice Isolation
NGAP
Protocols

Next Generation Application Protocol is the control plane protocol used on the N2 interface between the gNB and AMF.

Related Terms:

N2 Interface
AMF
gNB
NSSF
Architecture

Network Slice Selection Function selects the appropriate network slice instances for UEs and provides assistance information for the AMF selection.

Related Terms:

Network Slicing
S-NSSAI
AMF

O

OAuth 2.0
Authentication

The authorization framework used in 5G service-based architecture to secure API access between network functions.

Related Terms:

NRF
Service-Based Architecture
HTTP/2

P

PCF
Architecture

Policy Control Function provides policy rules to control plane functions and ensures consistent policy decisions across the network.

Related Terms:

5G Core
AMF
SMF
PFCP
Protocols

Packet Forwarding Control Protocol is used between the SMF and UPF to control user plane forwarding behaviors.

Related Terms:

SMF
UPF
CUPS

R

RESTful API
Protocols

Representational State Transfer APIs are used in 5G service-based architecture for communication between network functions, based on HTTP methods.

Related Terms:

Service-Based Architecture
HTTP/2
5G Core
RRC
Protocols

Radio Resource Control is the protocol used for control signaling between the UE and gNB, handling functions like connection establishment and radio bearer configuration.

Related Terms:

gNB
UE
5G NR

S

SBA
Architecture

Service-Based Architecture is the architectural model of the 5G Core where network functions provide services to each other through RESTful APIs.

Related Terms:

RESTful API
HTTP/2
5G Core
SEAF
Authentication

Security Anchor Function is part of the AMF and terminates the KSEAF from the home network, anchoring the security of a UE to the serving network.

Related Terms:

AMF
KSEAF
5G-AKA
SEPP
Security

Security Edge Protection Proxy provides security for interconnect traffic between different operator networks, implementing topology hiding and message filtering.

Related Terms:

N32 Interface
Roaming
TLS
Slice Isolation
Security

A security principle in network slicing where resources and traffic of one network slice are separated from other slices to prevent cross-slice attacks.

Related Terms:

Network Slicing
S-NSSAI
NSSF
SMF
Architecture

Session Management Function is responsible for session management, IP address allocation, and control aspects of user plane functions in 5G networks.

Related Terms:

5G Core
UPF
CUPS
S-NSSAI
Architecture

Single Network Slice Selection Assistance Information identifies a network slice and consists of a Slice/Service Type (SST) and optional Slice Differentiator (SD).

Related Terms:

Network Slicing
NSSF
SST
SUCI
Privacy

Subscription Concealed Identifier is the encrypted version of SUPI, used to protect the subscriber's permanent identity during initial registration.

Related Terms:

SUPI
ECIES
Concealment Key
SUPI
Privacy

Subscription Permanent Identifier is the permanent identity of a subscriber in 5G, typically in the form of an IMSI, but never transmitted in clear text over the air.

Related Terms:

SUCI
IMSI
UDM

T

TLS
Encryption

Transport Layer Security is used to secure HTTP/2 communications between network functions in the 5G Core and between SEPPs for inter-operator security.

Related Terms:

HTTP/2
SEPP
Service-Based Architecture
TS 33.501
Standards

The 3GPP technical specification that defines the security architecture and procedures for 5G systems, including authentication, key management, and security mechanisms.

Related Terms:

3GPP
5G-AKA
SUCI

U

UDM
Architecture

Unified Data Management stores subscriber data and handles authentication credentials in 5G networks, containing the ARPF functionality.

Related Terms:

ARPF
AUSF
SUPI
UE
Architecture

User Equipment is the device used by an end-user for communication, such as a smartphone, tablet, or IoT device connected to the 5G network.

Related Terms:

USIM
gNB
5G NR
UPF
Architecture

User Plane Function handles user data packets, packet routing and forwarding, QoS handling, and serves as the external PDU session point of interconnect to data networks.

Related Terms:

SMF
CUPS
User Plane
URLLC
Use Cases

Ultra-Reliable Low-Latency Communications is one of the three main 5G use cases, focusing on applications requiring extremely low latency and high reliability.

Related Terms:

eMBB
mMTC
MEC
User Plane
Architecture

The part of the network that carries the actual user data traffic, as opposed to signaling and control information.

Related Terms:

Control Plane
CUPS
UPF
USIM
Authentication

Universal Subscriber Identity Module is the application running on the physical SIM card that stores subscriber identity and authentication information for 5G networks.

Related Terms:

K
SUPI
UE

V

VPLMN
Architecture

Visited Public Land Mobile Network is the network that a subscriber is using when roaming outside their home network (HPLMN).

Related Terms:

HPLMN
Roaming
SEPP

Z

Zero Trust Architecture
Security

A security concept applied to 5G networks where trust is never assumed and verification is always required, regardless of whether the connection is from inside or outside the network perimeter.

Related Terms:

OAuth 2.0
Network Slicing
SBA

Related 5G Security Resources

5G Security Architecture
Understand the security architecture of 5G networks

Explore the comprehensive security architecture of 5G networks, including authentication, encryption, and key management.

5G Attack Vectors
Learn about various attack vectors in 5G networks

Discover the different attack vectors and vulnerabilities in 5G networks, including radio interface, core network, and signaling attacks.

5G Security Testing
Methodologies for testing 5G network security

Learn about methodologies and tools for testing the security of 5G networks, including penetration testing and vulnerability assessment.