Cover Page

5G Explained

Security and Deployment of Advanced Mobile Communications

 

Jyrki T. J. Penttinen

Atlanta, Georgia, USA

Wiley Logo

Author Biography

image

Dr. Jyrki T. J. Penttinen, the author of 5G Explained, started his activities in mobile communications industry in 1987 by evaluating early‐stage NMT‐900, DECT, and GSM radio network performance. After he obtained the MSc (EE) grade from the Helsinki University of Technology (HUT) in 1994, he worked for Telecom Finland (Sonera and TeliaSonera Finland) and Xfera Spain (Yoigo), performing technical tasks related to 2G and 3G. He also established and managed Finesstel Ltd. in 2002–2003, carrying out multiple consultancy and training projects in Europe and in the Americas. Afterward, he worked for Nokia and Nokia Siemens Networks in Mexico, Spain, and in the United States from 2004 to 2013. During this time with mobile network operators and equipment manufacturers, Dr. Penttinen was involved in a wide range of operational and research activities related to system and architectural design, investigation, standardization, training, and technical management. His focus and special interest were in the radio interface of cellular networks and mobile TV such as GSM, GPRS/EDGE, UMTS/HSPA, and DVB‐H. From 2014 to 2018, in his position as Program Manager with G+D Mobile Security Americas, USA, his focus areas included mobile and IoT security and innovation with a special emphasis on 5G. Since 2018, he has worked for GSMA North America as Technology Manager assisting operator members with the adoption, design, development, and deployment of GSMA specifications and programmes.

Dr. Penttinen obtained his LicSc (Tech) and DSc (Tech) degrees from HUT (currently known as Aalto University, School of Science and Technology) in 1999 and 2011, respectively. In addition to his main work, he has been an active lecturer and has written dozens of technical articles and authored telecommunications books, from which those published by Wiley are The Wireless Communications Security (2017), The LTE‐Advanced Deployment Handbook (2016), The Telecommunications Handbook (2015), The LTE/SAE Deployment Handbook (2011), and The DVB‐H Handbook (2009). More information on his publications can be found at www.finesstel.com.

Preface

Mobile communication systems have vastly evolved since the introduction of the first, analogue generation in 1980s. Ever since, each new commercial system has offered novelty functions and features outperforming the older ones. The current generations have indeed been operational in a parallel fashion all this time except for the very first generation, which was decommissioned practically everywhere as we entered new millennia.

The fourth generation – the 3GPP's LTE‐Advanced being the flagship of this era – has claimed its position as the most established system in global scale during 2010s. We are now looking forward to using the next, completely new generation, as has been the “tradition” for the past few decades. Based on these quite systematic cycles, it is easy to guess that the fifth generation will be again superior compared to any of its predecessors in terms of spectral efficiency, data rates, and capacity, among other important aspects essential for fluent user experiences. This time, 5G is an optimized enabler for time‐ and delay‐sensitive applications such as virtual‐reality and augmented‐reality solutions.

Not only does 5G have considerable enhancements in terms of the latency and data rates, but it also takes care of a huge amount of Internet of Things (IoT) devices. It is assumed that machine‐to‐machine type of communications (MTC) will grow significantly during and after the first half of the 2010s. 5G is optimized by default for supporting such a big number of simultaneously communicating devices.

5G will also change the fundamental philosophy of the networks by modernizing the old reference architecture model infrastructure to support service‐based architecture and virtualized environment where only the essential network functions are utilized as instances per need. For this purpose, 5G relies considerably on the increasing number of data centers on the field. They have common, virtualized hardware that paves the way for optimized utilization of physical resources while the software‐based network functions can be utilized much more dynamically, efficiently, and faster compared to older network architectures that are based on dedicated hardware and software per each network element. This modernization of the core networks will provide highly useful techniques such as network slicing, which facilitates the network optimization for different use cases in a highly dynamic manner.

Historically, the mobile communications landscape has been rather fragmented, with multiple commercial systems forming each generation. At present, the telecom industry seems to be interested in a much more unified mobile communication system, which indeed can be achieved by the deployment of 3GPP‐defined 5G networks in a global scale. We might thus finally see a truly unique and single standard defining the new generation, which will ease the interoperability and is also beneficial for customers and multiple stakeholders thanks to the expected economies of scale.

Academia has contributed strongly to the investigation of novelty candidate technologies for 5G radio and core networks while the industry has developed and tested shortlisting the most feasible concepts. Technical performance of these candidates has been under thorough testing during the pilots and trials, while the technical 3GPP specifications defining 5G system have been maturing. This high level of industry interest has been beneficial for the standardization to maintain and even expedite the original development schedules. As a result, Release 15 of 3GPP was frozen in June 2018, and after final adjustments, it is ready for providing truly interoperable solutions to equipment manufacturers and mobile network operators.

It should be noted that the 3GPP Release 15 represents merely the first phase of 5G, which works for the introduction of key 5G services while 3GPP still maintains and enhances technical specifications of the parallel systems for 2G (GSM), 3G (UMTS/HSPA), and 4G (LTE/LTE‐Advanced).

There will be new and enhanced 5G specifications, too, to comply with the strict 5G functional and performance requirements of the IMT‐2020 (International Mobile Telecommunications for 5G), which has been defined by ITU (International Telecommunications Union). After the late drops referring to the additional items in Release 15, the second phase of 3GPP's 5G will be published in the technical specifications of Release 16 by the beginning of the next decade. So, the first 5G networks complying fully with the IMT‐2020 requirements are expected to be deployed as of 2020.

The 3GPP Release 16 will bring along many new functionalities, enhancing the initial 5G performance. This phased approach provides means for a fluent and expedited deployment of 5G services based on the previous core infrastructure in the initial deployments, as defined in the 4G Enhanced Packet Core (EPC) specifications of 3GPP. One example of this hybrid mode is the set of non‐standalone modes, which the mobile network operators can deploy selectively while waiting for the 3GPP Release 16‐based solutions.

While the 5G specifications have been under development through the second half of 2018, there has already been plenty of speculative information available on 5G in printed form. Now, as the 3GPP Release 15 has been frozen, this book summarizes concretely the essential aspects of 5G based on the latest knowledge interpreted from the specifications and industry. This book presents the overall concept of 5G, helping the reader to understand the “big picture” of the theme and presenting focused points on security and deployment aspects.

I hope you enjoy the contents of this book in your preparation for the exiting journey in exploring yet another mobile generation! As has been the case with my previous books published by Wiley, I would highly appreciate all your feedback via my email address, jyrki.penttinen@hotmail.com.

Jyrki T. J. Penttinen

Atlanta, GA, USA

Acknowledgments

This 5G Explained complements my previous five books published with Wiley on telecommunication technologies since 2009. Looking back at the development, it is fascinating to realize how the systems evolve with such an overwhelming pace, providing us users with better performance and new, more interesting functionalities. As we approach the 5G era, this is especially clear with such groundbreaking, new principles applied in the networks.

Along with this sixth book, I express my warmest thanks for all the support to the Wiley teams I have worked with throughout the respective 10‐year period. As for specifically this 5G Explained book, I want to give special thanks to Ms. Sandra Grayson for such great support and editorial guidance. I thank also Ms. Cheryl Ferguson for the editing, Ms. Sonali M. Melwani for all the coordination in shaping the manuscript into the final book, and Ms. Nithya Sechin and Apoorva Sindoori for keeping track of the advances.

One quite important part of the security section of this book would not have been possible to summarize without the support of my colleagues of Giesecke+Devrient at G+D Mobile Security. I want to express my special thanks to Mr. Claus Dietze, who contributed an important base to the security chapter. Knowing this list will not even come close to being complete, I also want to extend my gratitude to my former colleagues of Giesecke+Devrient for all the support specifically related to 5G, which eased my way in understanding and documenting aspects that I believe will be of utmost importance in the 5G era. Please note, though, that this book has been accomplished by myself in my personal capacity as an author. The opinions expressed in this book are thus my own and do not necessarily reflect the view of my current or past employers.

As has already been kind of “tradition,” I have done this work during my spare time. I am thus thankful for all the support and patience of my close family, Paloma, Katriina, Pertti, Stephanie, Carolyne, and Miguel, and all the ones on my side who encouraged me to continue to pursue this passion.

Jyrki T. J. Penttinen

Atlanta, GA, USA

Abbreviation List

1G
first generation of mobile communications; analogue systems
2G
second generation of mobile communications; digital systems
3G
third generation of mobile communications; multimedia‐capable systems
3GPP
3rd Generation Partnership Project
4G
fourth generation of mobile communications; enhanced multimedia systems
5G
fifth generation of mobile communications; systems suitable for connected society
5GAA
5G Automotive Association
5G‐EIR
5G Equipment Identity Register
5G‐GUTI
5G Globally Unique Temporary Identity
MM sub
Mobility Management sublayer
5G‐PPP
5G Infrastructure Public‐Private Partnership
5GS
5G system
6LoWPAN
IPv6 Low‐power wireless personal area network
AAA
authentication, authorization, and accounting
AAS
active antenna system
ADAS
advanced driver assistance system
AERIS
Applications for the Environment: Real‐Time Information Synthesis
AES
Advanced Encryption Standard
AF
application function
AI
artificial intelligence
AID
application identifier
AKA
Authentication and Key Agreement
AM
Acknowledge Mode
AMBR
Aggregate Maximum Bit Rate
AMF
Access and Mobility Management Function
AMPS
Advanced Mobile Phone System
AN
access network
ANR
Automatic Neighbor Relations
AP
access point
AP
Application Protocol
API
application programming interface
ARIB
Association of Radio Industries and Businesses in Japan
ARP
auto radio phone
ARPF
Authentication Credential Repository and Processing Function
AS
access stratum
ASA
authorized shared access
ASN.1
Abstract Syntax Notation One
ATIS
Alliance for Telecommunications Industry Solutions in the U.S.
AU
application unit
AUSF
Authentication Server Function
AV
authentication vectors
AWGN
Additive White Gaussian Noise
BDS
BeiDou Navigation Satellite System
BH
backhaul
BPSK
Binary Phase Shift Keying
BS
base station
BSC
base station controller
BSM
basic safety messages
BTS
base transceiver station
C2C CC
Car‐to‐Car Communication Consortium
CA
carrier aggregation
CA
certification authority
CAD
connected and automated driving
CAPIF
Common API Framework
Cat
category (IoT)
CBRS
Citizens Broadband Radio Service
CC
common criteria (ISO/IEC)
CCSA
China Communications Standards Association
CDF
cumulative distribution function
CDR
charging data record
CEPT
Conférence Européenne des Postes et des Télécommunications
CID
cell ID
C‐IoT
cellular IoT
C‐ITS
Cooperative Intelligent Transport System
CIP
Critical Infrastructure Protection
CK
ciphering key
CM
connection management
CM sub
connection management sublayer
CN
core network
CNT
computer network technologies
CoAP
Constrained Application Protocol
CoMP
coordinated multipoint
CORD
Central Office Re‐architected as Data Center
COTS
commercial off‐the‐shelf
CP
control plane
CP
cyclic prefix
CPA
certified public accountants
CPS
cyber physical security
CPU
central processing unit
CRC
Cyclic Redundancy Check
CriC
critical communications
CSA
Cloud Security Alliance
CSC
Cloud Service Category
CSI‐RS
channel‐state information reference signal
CSMA‐CA
Carrier Sense Multiple Access and Collision Avoidance
CSN
Connectivity Service Network
CSP
Cloud Service Providers
CTL
control
CU
centralized unit
CUPS
Control and User Plane Separation (EPC nodes)
C‐V2X
cellular V2X
DC
dual connectivity
DCI
downlink control information
DDoS
distributed denial of service
DECT
Digital Enhanced Cordless Telecommunications
DHCP
Dynamic Host Control Protocol
DL
downlink
DM
device management
DM‐RS
demodulation reference signals
DN
data network
DNN
Data Network Name
DNS
Dynamic Name Server
DoD
Department of Defense (USA)
DPI
deep packet inspection
DRB
data radio bearer
DRM
digital rights management
DSRC
dedicated short‐range communications
DSS
Data Security Standard
DTF
discrete Fourier transform
DU
distributed unit
E CID
enhanced cell ID
EAP
Extensible Authentication Protocol
EC
European Commission
ECC
Electronic Communications Committee
EC‐GSM
enhanced coverage GSM (IoT)
ECM
EPS Connection Management
ECO
European Communications Office
EDGE
Enhanced Data rates for Global evolution
EE
energy efficiency
EGPRS
enhanced GPRS
EIRP
Effective Isotropic Radiated Power
eLAA
enhanced LAA
eLTE
Evolved LTE
eMBB
evolved Multimedia Broadband
eMBMS
evolved MBMS
EMM
EPS Mobility Management
eMTC
evolved Machine‐Type Communication
eNodeB
evolved NodeB (eNB)
EPC
Evolved Packet Core (4G)
EPS
Enhanced Packet System
eSIM
embedded subscriber identity module
E‐SMLC
Evolved Serving Mobile Location Centre
ETN
Edge Transport Node
ETSI
European Telecommunications Standards Institute
EU
European Union
eUICC
embedded UICC
EUM
eUICC Manufacturer
E‐UTRA
Evolved UTRA
E‐UTRAN
Evolved UMTS Terrestrial Radio Access Network
FBMC
Filter Bank Multicarrier
FCC
Federal Communications Commission (USA)
FDD
frequency division duplex
FDM
frequency division multiplexing
FEC
Forward Error Correction
FF
form factor
FFT
fast Fourier transform
FG
Forwarding Graph (NF)
FH
fronthaul
FIPS
Federal Information Processing Standards
FM
fault management
FMVSS
Federal Motor Vehicle Safety Standard
FR
frequency range
GAA
General Authorized Access (CBRS)
GBR
guaranteed bit rate
GGSN
Gateway GPRS Support Node
GMLC
Gateway Mobile Location Center
gNB
5G NodeB
GNSS
Global Navigation Satellites System
GP
Global Platform
GPRS
General Packet Radio Service
GPS
global positioning system
GSC
Global Standards Collaboration
GSM
Global System for Mobile communications
GSMA
GSM Association
gsmSCF
GSM Service Control Function
GTP
GPRS Tunneling Protocol
GTP U
GPRS Tunneling Protocol in user plane
GWCN
gateway core network
HARQ
hybrid automatic repeat and request
HCE
host card emulation
HE AV
home environment AV
HeNodeB
home eNodeB
HG
home gateway
HIPAA
Health Insurance Portability and Accountability Act
HLS
higher layer split (gNB)
hNRF
NRF in the home PLMN
HPLMN
home public land mobile network
HR
home routed
HS
hot spot
hSEPP
Home Security Edge Protection Proxy
HSM
hardware security module
HSPA
High Speed Packet Access
HSS
Home Subscription Server
H‐SMF
home SMF
HW
hardware
I2C
Inter‐Integrated Circuit
IaaS
Infrastructure as a Service
IATN
Inter‐Area Transport Node
ICC
Integrated Circuit Cards
ICI
Inter‐Carrier Interference
ICT
information and communication technology
IDFT
inverse discrete Fourier transform
IE
Information Element
IEC
International Electrotechnical Commission
IEEE
Institute of Electrical and Electronics Engineers
IEEE‐SA
IEEE Standards Association
IETF
Internet Engineering Task Force
IFFT
inverse fast Fourier transform
IK
integrity key
IMS
IP Multimedia Subsystem
IMT‐2000
International Mobile Telecommunications (3G)
IoT
Internet of Things
IoT‐GSI
Global Standards Initiative on Internet of Things
IP
Internet Protocol
IPX
Internet Protocol Packet eXchange
ISA
International Society for Automation
ISG
Industry Specification Group
ISI
inter‐symbol interference
ISO
International Standardization Organisation
ISP
Internet service provider
iSSP
integrated SSP
IT
information technology
ITL
image trusted loader
ITS
Intelligent Transportations Systems
ITU
International Telecommunication Union
ITU‐R
radio section of ITU
ITU‐T
telecommunication sector of ITU
iUICC
integrated UICC
IWMSC
inter‐working MSC
JTC
Joint Technical Committee (ISO/IEC)
KDF
Key Derivation Function
Kn
key, n refers to key's purpose, see Chapter 8, Table 3
KPI
key performance indicator
LAA
License Assisted Access
LBO
local breakout
LBS
location‐based service
LDPC
Low‐Density Parity Check
LI
Lawful Interception
LLS
lower‐layer split (gNB)
LOS
line of sight
LPWAN
low‐power wide area network
LSA
Licensed Shared Access
LTE
long‐term evolution
LTE‐A
LTE‐Advanced
LTE‐M
IoT‐mode of LTE
LTE‐U
unlicensed LTE band
M2M
machine‐to‐machine
MAC
Medium Access Control
MANET
Mobile Ad‐hoc Network
MAP
Mobile Application Part
MBB
Mobile Broadband
MBMS
Multimedia Broadcast Multicast Service
MBS
Metropolitan Beacon System
MCC
Mobile Country Code
MCE
Mobile Cloud Engine
MCPTT
mission‐critical push‐to‐talk
MCS
Modulation and Coding Scheme
MDT
mobile data terminal
ME
mobile equipment
MEC
Mobile Edge Computing
METIS
Mobile and wireless communications Enablers for Twenty‐twenty (2020) Information Society
MIMO
multiple‐in, multiple‐out
mIoT
massive Internet of Things
MITM
man in the middle
MM sub
Mobility Management sublayer
MM
Mobility Management
MME
Mobility Management Entity
mMTC
massive machine‐type communications
MN
master node
MNC
Mobile Network Code
MNO
mobile network operator
MO
mobile originated (SMS)
MOCN
Multi Operator Core Network
MORAN
Multiple Operator RAN
MR‐DC
Multi‐RAT Dual Connectivity
MS
mobile station
MSC
Mobile Services Switching Center
MSIN
Mobile Subscription Identification Number
MT
mobile terminated (SMS)
MTA
Mobile Telephony System (version A)
MTC
machine‐type communications
MU‐MIMO
Multi User MIMO
MUX
multiplexer
MVNO
Mobile Virtual Network Operator
N3IWF
Non‐3GPP Interworking Function
NaaS
Network as a Service
NAS
non‐access stratum
NB‐IoT
narrow‐band IoT
NCR
neighbor cell relation
NDS
Network Domain Security
NEA
NR encryption algorithm (NEA0…3)
NEF
Network Exposure Function
NEO
network operations
NERC
North American Electric Reliability Corporation
NF
network function
NF
noise figure
NFC
near‐field communications
NFV
network functions virtualization
NG‐AP
NG Application Protocol
NG
Next Generation
NGC
Next Generation Core (5G)
NGCN
Next Generation Core Network
ng‐eNB
Next Generation evolved NodeB (enhanced 4G eNB)
NGMN
Next Generation Mobile Networks
NG‐RAN
Next Generation Radio Access Network
NH
next hop
NHTSA
National Highway Transportation and Safety Administration
NIA
NG integrity algorithm (NIA0…3)
NIST
National Institute of Standards and Technology (USA)
NLOS
non‐line of sight
NMT
Nordic Mobile Telephony
NOMA
nonorthogonal multiple access
NPRM
notice of proposed rulemaking
NR
New Radio (5G)
NRF
Network Repository Function
NSSAI
Network Slice Selection Assistance Information
NSSF
Network Slice Selection Function
NVM
non‐volatile memory
NWDA
Network Data Analytics
NWDAF
Network Data Analytics Function
O&A
operations and maintenance
OBU
on‐board unit
OCP
Open Compute Project
OEM
original equipment manufacturer
OFDM
orthogonal frequency division multiplexing
OFDMA
OFDM Access
OFL
Open Firmware Loader
OLA
operating level agreement
OMA
Open Mobile Alliance
ONAP
Open Network Automation Platform
OOB
out‐of‐band leakage
OS
operating system
OSI
Open System Interconnect
OSS
operations support system
OTA
over the air
OTDOA
observed time difference of arrival
OTP
one‐time programmable
OWASP
Open Web Application Security Project
PaaS
Platform‐as‐a‐Service
PAL
priority access license (CBRS)
PAPR
peak‐to‐average power ratio
PBCH
Physical Broadcast Channel
PCF
Policy Control Function
PCI
payment card industry
PCRF
Policy and Charging Enforcement Function
PDCCH
Physical Downlink Control Channel
PDCP
Packet Data Convergence Protocol
PDN
Packet Data Network
PDSCH
Physical Downlink Shared Channel
PDU
packet data unit
PEI
Permanent Equipment Identity
PFCP
packet forwarding control plane
PFDF
Packet Flow Descriptions Function
P‐GW
Proxy Gateway
PHI
protected health information
PKI
public key infrastructure
PLMN
public land mobile network
PM
performance monitoring
PNF
Physical Network Functions
PoC
proof of concept
POS
point of sales
PRACH
Physical Random‐Access Channel
PRS
positioning reference signals
PSK
phase shift keying
PSM
power save mode
PSS
primary synchronization signal
PTP
point‐to‐point
PT‐RS
Phase‐Tracking Reference Signals
PUCCH
Physical Uplink Control Channel
PUSCH
Physical Uplink Shared Channel
PWS
Public Warning System
QAM
quadrature amplitude modulation
QCI
QoS class identifier
QoE
quality of experience
QoS
quality of service
QPSK
Quadrature Phase Shift Keying
QZSS
Quasi Zenith Satellite System
RAM
random access memory
RAN
radio access network
RAT
radio access technology
RF
radio frequency
RLB
radio link budget
RLC
Radio Link Control
RM
registration management
RN
remote node
RNC
Radio Network Controller
RNL
Radio Network Layer
ROM
read‐only memory
RPMA
Random Phase Multiple Access
RPO
Recovery Point Objective
RR sub
radio resource management sublayer
RRC
Radio Resource Control
RRH
remote radio head
RRM
Radio Resource Management
RSP
remote SIM provisioning
RSU
roadside unit
RT
ray tracing
RTO
recovery time objective
SA
Secure Appliance
SA
security association
SA
standalone
SA
system architecture
SAE
System Architecture Evolution
SAP
service access point
SAS
Security Accreditation Scheme (GSMA)
SAS‐SM
SAS for subscription management
SAS‐UP
SAS for UICC production
SBA
service‐based architecture
SBAS
space‐based augmentation systems
SBC
session border controller
SC&C
Smart Cities and Communities (ITU)
SCA
Smart Card Alliance (currently STA)
SCEF
Service Capability Exposure Function
SC‐FDM
single‐carrier frequency division multiplex
SC‐FDMA
single‐carrier frequency division multiple access
SCG
Secondary Cell Group
SCM
security context management
SCMF
Security Context Management Function
SCP
smart card platform (ETSI)
SCTP
Stream Control Transmission Protocol
SDCI
Sponsored Data Connectivity Improvements
SDF
Service Data Flow
SDN
software‐defined networking
SDO
standards developing organizations
SDS
structured data storage
SDU
Service Data Unit
SE
secure element
SEAF
Security Anchor Function
SEL
spectral efficiency loss
SEPP
Security Edge Protection Proxy
SGSN
Serving GPRS Support Node
S‐GW
Serving Gateway
SIDF
Subscription Identifier De‐Concealing Function
SIM
subscriber identity module
SiP
system in package
SISO
single‐input, single‐output
SLA
service‐level agreement
SLR
service‐level reporting
SM AL
Short Message Application Layer
SM CP
Short Message Control Protocol
SMI
Structure of Management Information
SM RL
Short Message Relay Layer
SM RP
Short Message Relay Protocol
SM TL
Short Message Transfer Layer
SM
session management
SMC
Short Message Control
SMF
Session Management Function
SMR
Short Message Relay
SMS
Short Message Service
SMSF
Short Message Service Function
SN
secondary node; slave node
SNSSAI
Single Network Slice Selection Assistance Information
SOC
service organization control
SoC
system on chip
SON
self‐optimizing network
SPCF
Security Policy Control Function
SPI
Serial Peripheral Interface
SQL
Structured Query Language
SRS
Sounding Reference Signal
SSAE16
Statement on Standards for Attestation Engagements 16
SSC
Session and Service Continuity (mode)
SSP
Secure Smart Platform
SSS
secondary synchronization signal
STA
Secure Technology Alliance
STAR
Security, Trust & Assurance Registry (CSA)
SUCI
Subscriber Concealed Identifier
SUL
supplementary uplink
SU‐MIMO
single‐user MIMO
SUPI
Subscription Permanent Identifier
SUPL
secure user plane location
SW
software
TA
tracking area
TACS
Total Access Communications System
TB
transport block
TBS
Terrestrial Beacon System
TC
Technical Committee (of ETSI)
TCAP
Transaction Capabilities Application Part
TCG
Trusted Computing Group
TCO
total cost of ownership
TDD
Time Division Duplex
TDF
Traffic Detection Function
TDM
Time Division Multiplexing
TDMA
Time Division Multiple Access
TEE
Trusted Execution Environment
TIA
Telecommunications Industry Association (USA)
TIF
Transport Intelligent Function
TIP
Telecom Infra Project
TI‐SCCP
Transport Independent Signaling Connection Control Part
TLS
Transport Layer Security
TLV
type‐length‐value
TN
transport node
TNL
transport network layer
TP
transmission point
TPM
Trusted Platform Module
TRE
tamper‐resistant element
TRxP
Transmission Reception Point
TSAG
Telecommunication Standardization Advisory Group
TSDSI
Telecommunications Standards Development Society in India
TSG
Technical Specification Group (3GPP)
TSON
Time‐Shared Optical Network
TTA
Telecommunications Technology Association in Korea
TTC
Telecommunication Technology Committee in Japan
UDC
Uplink Data Compression
UDM
unified data management
UDP
User Datagram Protocol
UDR
Unified Data Repository
UDSF
Unstructured Data Storage Function
UE
user equipment
UFMC
Universal Filter Multi‐Carrier
UHF
ultra‐high frequency
UICC
universal integrated circuit card
UL
uplink
UL‐CL
uplink classifier
UM
Unacknowledged Mode
UMTS
Universal Mobile Telecommunications System
UP
user plane
UPF
User Plane Function
UPS
unbreakable power system
URLLC
ultra‐reliable low latency communications
USAT
USIM Application Toolkit
USB
universal serial bus
USIM
universal SIM
UTRAN
UMTS Terrestrial Radio Access Network
UX
user experience
V2I
vehicle‐to‐infrastructure
V2P
vehicle‐to‐pedestrian
V2R
vehicle‐to‐roadside
V2V
vehicle‐to‐vehicle
V2X
vehicle‐to‐everything
V5GTF
Verizon 5G Technology Forum
VANET
Vehicular Ad‐hoc Network (car‐to‐car communications)
vCDN
virtual Content Delivery Network
vEPC
virtual evolved packet core
vIMS
virtual IP Multimedia Subsystem
VM
virtual machine
VNF
Virtual Network Functions
vNRF
NRF in the visited PLMN
VPLMN
visited PLMN
VPN
virtual private network
VPP
Virtual Primary Platform
VR
virtual reality
vSEPP
visited network's security proxy
V‐SMF
visited SMF
vUICC
virtual UICC
WAVE
Wireless Access in Vehicular Environments
WCDMA
Wideband Code Division Multiple Access
WDM‐PON
Wavelength Division Multiplexing Passive Optical Network
WGFM
Working Group for Frequency Management (ECC)
WiMAX
Worldwide Interoperability for Microwave Access
WISP
wireless Internet service provider
WLAN
Wireless Local Area Network
WRC
World Radio Conference