SlideShare a Scribd company logo
1
VIRTUALIZATION SOLUTIONS &
DEEP LEARNING WHITEPAPER
SECURING 4G AND 5G
NETWORKS
Phone: 561-306-4996
Email: sales@eglacorp.com
751 Park of Commerce Dr. Suite 128
Boca Raton, FL, 33487
EGLA CORP – July 2020
© 2020 EGLA CORP, All rights reserved
www.eglacorp.com | www.eglacomm.net/ip
2
SECURING WIRELESS INFRASTRUTURE IN
4G and 5G SYSTEMS
By Dr Edwin A. Hernandez
PROBLEM STATEMENT
Modern wireless communications use a mixture of Radio Frequency (RF) and
Internet communications. These wireless networks employ modern modulation
techniques that are defined by the 3rd
Generation Partnership Program (3GPP).
In general, the standardization process is arrived by agreement among multiple
wireless vendors and technology experts. These agreements or standards have
developed a modern infrastructure leading 4G and 5G communication systems
where all communication is all IP-based or “Internet Protocol”-based.
Hence, securing these systems and mobile communications is crucial as the
same challenges being faced by internet applications are also observed by
voice calls, messages, video calls in 4G and 5G networks.
In essence, the great vulnerability in all 4G and 5G systems resides in “control”
of that IP infrastructure and relinquishing that control to a 3rd
party and not
managing your own mobile traffic creates a major threat.
ENCRYPTION, VPN, AND TUNNELING DO NOT SUFFICE WHEN THERE IS NO
CONTROL OF YOUR WIRELESS NETWORK TRAFFIC.
HOW 4G AND 5G INFRASTRUCTURE
WORKS?
4G infrastructures are substantially similar
to a 5G, as they both use IP. Although,
other component names and functionality
maybe used, both systems use “Internet
Protocols” as a foundation. The good thing
is that both technologies can then be virtualized and secured.
© 2020 EGLA CORP, All rights reserved
www.eglacorp.com | www.eglacomm.net/ip
3
4G and 5G systems rely on two entities to interface all mobile users with an
infrastructure and are called eNodeB in 4G and gNB in 5G (a.k.a. Base
Stations). These base stations operate in a similar way as a standard home-
based WIFI system with your cable provider. In other words, by having an
internet link, a base station communicates with the infrastructure using internet
signals by delivering voice, web, and other traffic to the eNodeBs (or gNBs) that
is later sent directly from the mobile phone to the internet.
In other words, all mobile device
traffic including phone calls,
video calls, positioning, and all
web requests that are made
from all devices to the public
internet network is “seen” by the
“carrier.”
As a side effect, all mobile
network traffic provides carriers
and operators with additional financial value while raising privacy and security
issues. This is not new as most internet users are familiar with privacy and
security questions derived from using Facebook, Google, Youtube, and many
other applications. In fact, all traffic regardless of anonymity claims, can be
utilized to fingerprint users, detect movement patterns, and even intercept
communications if that control is lost.
THREAT
Foreign entities as HUAWEI are being questioned and banned from 4G and 5G
deployments in the US and Europe, as a threat of eavesdropping and traffic
management is possible. China has been notorious for controlling their own
infrastructure and censuring internet traffic.
There are several techniques that eavesdropping that can go basically
undetected, in fact HUAWEI and other Chinese vendors use machine learning
and artificial intelligence extensively to a) reconfigure the network, b) to
© 2020 EGLA CORP, All rights reserved
www.eglacorp.com | www.eglacomm.net/ip
4
implement deep learning capabilities in the system for optimization, and c)
smarts use of network access.
Hence protecting, all mobile logs, IP Addresses, origination and termination of
calls, web requests, VPN, and others is very important, and that is the main
reason why Huawei is not allowed in some of these markets.
HOW 4G INFRASTRUCTURE CARRIES NETWORK TRAFFIC
First we will understand how infrastructure in 4G systems work and introduce
our solution.
Our solution relies on “Virtual Network Function” operatior which consists in
moving sensitive functionality in the network to a private cloud that is controlled
by a trusted party. Hence, securing eNodeB and gNB (Base Station) traffic from
all systems to a virtual network is key to improve security and enhance privacy.
As shown, the following diagram, a UE (mobile phone) communicates with the
PDN (public internet). All the blocks in between can be virtual and execute in at
private cloud at a trusted location..
Public
Internet
© 2020 EGLA CORP, All rights reserved
www.eglacorp.com | www.eglacomm.net/ip
5
The chart above shows that in our solution all signaling required by a 4G
terminal or mobile phone can be directed to a virtual infrastructure. Each line of
communication between UE (User Equipment) and the PDN Packet Data
Network) and all components in between that include S-GW, P-GW, and the a
PDN(CN) are now under a trusted management and chances of eavesdropping
or tracking uses is substantially diminished. The path shown below is now
secured.
Even telecommunication carriers such as AT&T, Verizon, T-Mobile & Sprint, and
other operators are exposed to threats derived of injecting IP Tunnels, obtaining
log files with sensitive information from servers, and potential indirect
eavesdropping of all network traffic.
Clearly, the proposed infrastructure now carries all web requests from all
applications made by a mobile phone to internet-based applications such as a
web server, email, social medial, video conference, streaming, google searches,
and other sensitive network traffic.
This white paper will cover two available solutions that EGLA CORP can help
with.
UE WEB,
VIDEO,
MESSAGES
© 2020 EGLA CORP, All rights reserved
www.eglacorp.com | www.eglacomm.net/ip
6
SOLUTION 1. INFRASTRUCTURE
VIRTUALIZATION
EGLA CORP has a virtualization
solution that consists in creating a
virtual carrier of your own, by
replicating S-GW, P-GW, MME, PDN
and other 4G components in the
network to work as a private carrier
win a controlled infrastructure
managed by a trusted party.
The solution uses cloud-based
instances that include all those
components in the cloud. The cloud
can be formed using docker, VmWare,
or XenServer instances that leverage modern techniques of management and
securing a “cloud.”
Our system then brings that required control over all mobile communications
transmissions that are made by a mobile terminal. The private system handles
all mobile traffic from all base stations at Verizon, AT&T, or T-Mobile to this
network infrastructure and each phone can be provisioned with its own number
and set pf IP addresses.
Also provisioning of that system is done by a SIM Card that is issued by the
trusted entity controlling this environment.
Operationally, a virtualized infrastructure functions in a similar way to a “virtual
network operator” that uses AT&T, Verizon, and T-Mobile licensed frequencies.
As shown, our system can be installed in a trusted on-premise location, at your
own facility, except an agreement to use the licensed spectrum by AT&T,
Verizon, or T-Mobile. Verizon and T-Mobile have over 30+ virtual network
operators.
However, since all mobile device encryption keys and all IP transmissions are
generated and orchestrated from the virtualized cloud, all communications
between all endpoints are only known by the private virtualized infrastructure.
© 2020 EGLA CORP, All rights reserved
www.eglacorp.com | www.eglacomm.net/ip
7
“INTERFACING THE PRIVATE SYSTEM TO OTHER CARRIERS FOR CALLS,
MESSAGING ,EVEN LONG-DISTANCE CALLS IS FEASIBLE”
The solution will then look like this:
SOLUTION #2. VIRTUALIZATION WITH CBRS OR CITIZENS BROADBAND
RADIO SERVICE
In order to gain entire control to the communication’s path and for a complete
end-to-end solution, a CBRS eNodeB is required. The FCC has liberated the
CBRS band or Citizens Broadband Radio Service for LTE services and
eNodeB’s can be installed to create a private 4G LTE network.
Moreover, CBRS-band base stations do not require any regulatory approval by
the FCC as those bands can be employed and can carry 4G Traffic, just as you
can enjoy WIFI spectrum. Most mobile phones can connect to these bands
already and operation in those bands requires deployment of base stations in
areas where those communications need to be secured as shown:
© 2020 EGLA CORP, All rights reserved
www.eglacorp.com | www.eglacomm.net/ip
8
Hence, Solution #1 and #2 are designed for the
future and suitable for reuse of many of its
components for future updates in 4G systems, as
well as, it is upgradable to 5G. As 5G frequencies
and devices become mainstream, deploying 5G is
easier than ever.
ADDITIONAL SECURITY WITH BLUEHEXAGON
Now that infrastructure is virtualized, cloud-based
protection of data and infrastructure is possible
including modern deep learning techniques. In
partnership with BLUEHEXAGON, we offer an
Artificial Intelligence system capable of securing a cloud-based platform and our
network function virtualization system.
BLUEHEXAGON is deployed as part of our cloud and uses deep learning to
protect all communications within the network infrastructure.
IN FACT, BY APPLYING DEEP LEARNING TO THE COMPLETE INSPECTION OF
HEADERS AND PAYLOADS, YOU CAN DETECT THREATS IN REAL-TIME, AND
STOP PATIENT-ZERO OR PREVENT FURTHER LATERAL MOVEMENT.
BLUE HEXAGON REAL-TIME DEEP LEARNING CAN ADDRESS.
Deep learning and artificial intelligence further secures our solution.
© 2020 EGLA CORP, All rights reserved
www.eglacorp.com | www.eglacomm.net/ip
9
OUR EXPERTISE
Our CTO and owner, Dr. Edwin Hernandez is a world expert in wireless and has
been a judge for the Mobile World Congress 2019 and 2020. As a judge, Dr.
Hernandez evaluated cutting edge 4G, 5G systems and other advanced
infrastructure technologies made by global players.
Additionally, Dr. Hernandez
has assisted wireless
communications patent cases
in 4G and assisted with these
technologies including its own. Among the technologies that EGLA CORP has
a license to US Patents:
• 7,231,330, 7,697,508 and 8,213,417
• 9,071,957 and 9,338,629
• 10,123,074 and 10,524,002

More Related Content

What's hot

Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
Dirk Kutscher
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in Aviation
Assem mousa
 
5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas
Spilios Georgakopoulos
 
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-20215G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
IPLOOK Networks
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
Ericsson
 
5 g platform
5 g platform5 g platform
5 g platform
Ericsson
 
Understanding 5G, Benefits of 5G courses
Understanding 5G, Benefits of 5G coursesUnderstanding 5G, Benefits of 5G courses
Understanding 5G, Benefits of 5G courses
Bryan Len
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson
 
Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812
Transition Consulting Limited, India
 
ICT Insights Issue 17 (03/2016)
ICT Insights Issue 17 (03/2016) ICT Insights Issue 17 (03/2016)
ICT Insights Issue 17 (03/2016)
Sitha Sok
 
5g tutorial
5g tutorial5g tutorial
5g tutorial
larbi gacemi
 
Private 5G Networks and Vendor Diversification
Private 5G Networks and Vendor DiversificationPrivate 5G Networks and Vendor Diversification
Private 5G Networks and Vendor Diversification
Dean Bubley
 
COMSovereign Holding Presentation Nov 2021
COMSovereign Holding Presentation Nov 2021COMSovereign Holding Presentation Nov 2021
COMSovereign Holding Presentation Nov 2021
RedChip Companies, Inc.
 
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G SummitJisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Martin Hamilton
 
Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE
Sukhvinder Singh Malik
 
IPLOOK Technologies(E.V)
IPLOOK Technologies(E.V)IPLOOK Technologies(E.V)
IPLOOK Technologies(E.V)
IPLOOK Networks
 
Digital Tranformation Strategy(5G) in Nokia Hellas
Digital Tranformation Strategy(5G) in Nokia HellasDigital Tranformation Strategy(5G) in Nokia Hellas
Digital Tranformation Strategy(5G) in Nokia Hellas
Spilios Georgakopoulos
 
5G| What's Next
5G| What's Next 5G| What's Next
5G| What's Next
paul young cpa, cga
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson
 
Reporte a cerca de 6G
Reporte a cerca de 6GReporte a cerca de 6G
Reporte a cerca de 6G
Miguel Mora
 

What's hot (20)

Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in Aviation
 
5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas
 
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-20215G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
5 g platform
5 g platform5 g platform
5 g platform
 
Understanding 5G, Benefits of 5G courses
Understanding 5G, Benefits of 5G coursesUnderstanding 5G, Benefits of 5G courses
Understanding 5G, Benefits of 5G courses
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812
 
ICT Insights Issue 17 (03/2016)
ICT Insights Issue 17 (03/2016) ICT Insights Issue 17 (03/2016)
ICT Insights Issue 17 (03/2016)
 
5g tutorial
5g tutorial5g tutorial
5g tutorial
 
Private 5G Networks and Vendor Diversification
Private 5G Networks and Vendor DiversificationPrivate 5G Networks and Vendor Diversification
Private 5G Networks and Vendor Diversification
 
COMSovereign Holding Presentation Nov 2021
COMSovereign Holding Presentation Nov 2021COMSovereign Holding Presentation Nov 2021
COMSovereign Holding Presentation Nov 2021
 
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G SummitJisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
 
Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE
 
IPLOOK Technologies(E.V)
IPLOOK Technologies(E.V)IPLOOK Technologies(E.V)
IPLOOK Technologies(E.V)
 
Digital Tranformation Strategy(5G) in Nokia Hellas
Digital Tranformation Strategy(5G) in Nokia HellasDigital Tranformation Strategy(5G) in Nokia Hellas
Digital Tranformation Strategy(5G) in Nokia Hellas
 
5G| What's Next
5G| What's Next 5G| What's Next
5G| What's Next
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Reporte a cerca de 6G
Reporte a cerca de 6GReporte a cerca de 6G
Reporte a cerca de 6G
 

Similar to Securing 4G and LTE systems with Deep Learning and Virtualization

5G Network
5G Network5G Network
5G Network
DigitalNational
 
What Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadWhat Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional Berhad
DigitalNational
 
5 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT15 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT1
Avijeet Negel
 
5G_MOBILE_TECHNOLOGY_Seminar_Guided_By_E.pdf
5G_MOBILE_TECHNOLOGY_Seminar_Guided_By_E.pdf5G_MOBILE_TECHNOLOGY_Seminar_Guided_By_E.pdf
5G_MOBILE_TECHNOLOGY_Seminar_Guided_By_E.pdf
Ali Ahmed
 
Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20
Druid Software
 
What is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdfWhat is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdf
Antenna Manufacturer Coco
 
5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY
oishimustafi1
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
IRJET Journal
 
5 g technology bdma
5 g technology bdma5 g technology bdma
5 g technology bdma
Srihari
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-core
warchitect
 
5 g-ppt
5 g-ppt5 g-ppt
5 g-ppt
mohith2398
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devices
Satya Harish
 
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
EdisonAndresZapataOc
 
Gemalto Review: 5G Feature
Gemalto Review: 5G FeatureGemalto Review: 5G Feature
Gemalto Review: 5G Feature
Nexus Publishing
 
Cor review2018-a
Cor review2018-aCor review2018-a
Cor review2018-a
Nexus Publishing
 
Quick Quote App Portfolio
Quick Quote App PortfolioQuick Quote App Portfolio
Quick Quote App Portfolio
Nexus Publishing
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st century
anjansubbarao
 
5G Moblie Computing
5G Moblie Computing5G Moblie Computing
5G Moblie Computing
Haider Ali Malik
 
5 g mobile system
5 g mobile system5 g mobile system
5 g mobile system
Vaishnav Lavatre
 

Similar to Securing 4G and LTE systems with Deep Learning and Virtualization (20)

5G Network
5G Network5G Network
5G Network
 
What Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadWhat Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional Berhad
 
5 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT15 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT1
 
5G_MOBILE_TECHNOLOGY_Seminar_Guided_By_E.pdf
5G_MOBILE_TECHNOLOGY_Seminar_Guided_By_E.pdf5G_MOBILE_TECHNOLOGY_Seminar_Guided_By_E.pdf
5G_MOBILE_TECHNOLOGY_Seminar_Guided_By_E.pdf
 
Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20
 
What is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdfWhat is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdf
 
5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
5 g technology bdma
5 g technology bdma5 g technology bdma
5 g technology bdma
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-core
 
5 g-ppt
5 g-ppt5 g-ppt
5 g-ppt
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devices
 
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
 
Gemalto Review: 5G Feature
Gemalto Review: 5G FeatureGemalto Review: 5G Feature
Gemalto Review: 5G Feature
 
Cor review2018-a
Cor review2018-aCor review2018-a
Cor review2018-a
 
Quick Quote App Portfolio
Quick Quote App PortfolioQuick Quote App Portfolio
Quick Quote App Portfolio
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st century
 
5G Moblie Computing
5G Moblie Computing5G Moblie Computing
5G Moblie Computing
 
3 g and 4g final ppt
3 g and 4g final ppt3 g and 4g final ppt
3 g and 4g final ppt
 
5 g mobile system
5 g mobile system5 g mobile system
5 g mobile system
 

More from Dr. Edwin Hernandez

Propuesta para la creación de un Centro de Innovación para la Refundación ...
Propuesta para la creación de un Centro de Innovación para la Refundación ...Propuesta para la creación de un Centro de Innovación para la Refundación ...
Propuesta para la creación de un Centro de Innovación para la Refundación ...
Dr. Edwin Hernandez
 
EGLA CORP - Honduras Abril 27 , 2024.pptx
EGLA CORP - Honduras Abril 27 , 2024.pptxEGLA CORP - Honduras Abril 27 , 2024.pptx
EGLA CORP - Honduras Abril 27 , 2024.pptx
Dr. Edwin Hernandez
 
MEVIA Platform for Music and Video
MEVIA Platform for Music and VideoMEVIA Platform for Music and Video
MEVIA Platform for Music and Video
Dr. Edwin Hernandez
 
Proposal NFT Metaverse Projects.pdf
Proposal NFT Metaverse Projects.pdfProposal NFT Metaverse Projects.pdf
Proposal NFT Metaverse Projects.pdf
Dr. Edwin Hernandez
 
Emulation MobileCAD
Emulation MobileCADEmulation MobileCAD
Emulation MobileCAD
Dr. Edwin Hernandez
 
EGLA NFT Offering
EGLA NFT OfferingEGLA NFT Offering
EGLA NFT Offering
Dr. Edwin Hernandez
 
Next Generation Spaces for Startups
Next Generation Spaces for Startups Next Generation Spaces for Startups
Next Generation Spaces for Startups
Dr. Edwin Hernandez
 
Analisis del Fraude Electoral en el 2017 - EGLA CORP
Analisis del Fraude Electoral en el 2017 - EGLA CORPAnalisis del Fraude Electoral en el 2017 - EGLA CORP
Analisis del Fraude Electoral en el 2017 - EGLA CORP
Dr. Edwin Hernandez
 
EGLAVATOR - Innovation, intellectual property services, and capital 2022 - 1
EGLAVATOR - Innovation, intellectual property services, and capital 2022 - 1EGLAVATOR - Innovation, intellectual property services, and capital 2022 - 1
EGLAVATOR - Innovation, intellectual property services, and capital 2022 - 1
Dr. Edwin Hernandez
 
MEVIA and Cloud to Cable TV Intellectual Property
MEVIA and Cloud to Cable TV Intellectual PropertyMEVIA and Cloud to Cable TV Intellectual Property
MEVIA and Cloud to Cable TV Intellectual Property
Dr. Edwin Hernandez
 
EGLAVATOR - Who are we?
EGLAVATOR - Who are we?EGLAVATOR - Who are we?
EGLAVATOR - Who are we?
Dr. Edwin Hernandez
 
Tips para mejorar ventas digitales
Tips para mejorar ventas digitalesTips para mejorar ventas digitales
Tips para mejorar ventas digitales
Dr. Edwin Hernandez
 
EGLAVATOR by EGLA CORP
EGLAVATOR by EGLA CORPEGLAVATOR by EGLA CORP
EGLAVATOR by EGLA CORP
Dr. Edwin Hernandez
 
MEVIA - Technology Updates - 2020
MEVIA - Technology Updates -  2020MEVIA - Technology Updates -  2020
MEVIA - Technology Updates - 2020
Dr. Edwin Hernandez
 
MEVIA - Entertaiment and Cloud-based Solution for Yachts
MEVIA - Entertaiment and Cloud-based Solution for Yachts MEVIA - Entertaiment and Cloud-based Solution for Yachts
MEVIA - Entertaiment and Cloud-based Solution for Yachts
Dr. Edwin Hernandez
 
NextGENTV broadcasting with Cloud to Cable (ATSC 3.0) - Broadcasting to CABSAT
NextGENTV broadcasting with Cloud to Cable  (ATSC 3.0) - Broadcasting to CABSATNextGENTV broadcasting with Cloud to Cable  (ATSC 3.0) - Broadcasting to CABSAT
NextGENTV broadcasting with Cloud to Cable (ATSC 3.0) - Broadcasting to CABSAT
Dr. Edwin Hernandez
 
New Revenue Opportunities for Cloud Apps and Services with CloudtoCable
New Revenue Opportunities for Cloud Apps and Services with CloudtoCableNew Revenue Opportunities for Cloud Apps and Services with CloudtoCable
New Revenue Opportunities for Cloud Apps and Services with CloudtoCable
Dr. Edwin Hernandez
 
EGLA CORP: Innovation, Intellectual Property Services, and Capital
EGLA CORP:  Innovation, Intellectual Property Services, and CapitalEGLA CORP:  Innovation, Intellectual Property Services, and Capital
EGLA CORP: Innovation, Intellectual Property Services, and Capital
Dr. Edwin Hernandez
 
Music for Cable Music Service for Operators
Music for Cable   Music Service for OperatorsMusic for Cable   Music Service for Operators
Music for Cable Music Service for Operators
Dr. Edwin Hernandez
 
Cloud to Cable intellectual Property Portfolio
Cloud to Cable intellectual Property PortfolioCloud to Cable intellectual Property Portfolio
Cloud to Cable intellectual Property Portfolio
Dr. Edwin Hernandez
 

More from Dr. Edwin Hernandez (20)

Propuesta para la creación de un Centro de Innovación para la Refundación ...
Propuesta para la creación de un Centro de Innovación para la Refundación ...Propuesta para la creación de un Centro de Innovación para la Refundación ...
Propuesta para la creación de un Centro de Innovación para la Refundación ...
 
EGLA CORP - Honduras Abril 27 , 2024.pptx
EGLA CORP - Honduras Abril 27 , 2024.pptxEGLA CORP - Honduras Abril 27 , 2024.pptx
EGLA CORP - Honduras Abril 27 , 2024.pptx
 
MEVIA Platform for Music and Video
MEVIA Platform for Music and VideoMEVIA Platform for Music and Video
MEVIA Platform for Music and Video
 
Proposal NFT Metaverse Projects.pdf
Proposal NFT Metaverse Projects.pdfProposal NFT Metaverse Projects.pdf
Proposal NFT Metaverse Projects.pdf
 
Emulation MobileCAD
Emulation MobileCADEmulation MobileCAD
Emulation MobileCAD
 
EGLA NFT Offering
EGLA NFT OfferingEGLA NFT Offering
EGLA NFT Offering
 
Next Generation Spaces for Startups
Next Generation Spaces for Startups Next Generation Spaces for Startups
Next Generation Spaces for Startups
 
Analisis del Fraude Electoral en el 2017 - EGLA CORP
Analisis del Fraude Electoral en el 2017 - EGLA CORPAnalisis del Fraude Electoral en el 2017 - EGLA CORP
Analisis del Fraude Electoral en el 2017 - EGLA CORP
 
EGLAVATOR - Innovation, intellectual property services, and capital 2022 - 1
EGLAVATOR - Innovation, intellectual property services, and capital 2022 - 1EGLAVATOR - Innovation, intellectual property services, and capital 2022 - 1
EGLAVATOR - Innovation, intellectual property services, and capital 2022 - 1
 
MEVIA and Cloud to Cable TV Intellectual Property
MEVIA and Cloud to Cable TV Intellectual PropertyMEVIA and Cloud to Cable TV Intellectual Property
MEVIA and Cloud to Cable TV Intellectual Property
 
EGLAVATOR - Who are we?
EGLAVATOR - Who are we?EGLAVATOR - Who are we?
EGLAVATOR - Who are we?
 
Tips para mejorar ventas digitales
Tips para mejorar ventas digitalesTips para mejorar ventas digitales
Tips para mejorar ventas digitales
 
EGLAVATOR by EGLA CORP
EGLAVATOR by EGLA CORPEGLAVATOR by EGLA CORP
EGLAVATOR by EGLA CORP
 
MEVIA - Technology Updates - 2020
MEVIA - Technology Updates -  2020MEVIA - Technology Updates -  2020
MEVIA - Technology Updates - 2020
 
MEVIA - Entertaiment and Cloud-based Solution for Yachts
MEVIA - Entertaiment and Cloud-based Solution for Yachts MEVIA - Entertaiment and Cloud-based Solution for Yachts
MEVIA - Entertaiment and Cloud-based Solution for Yachts
 
NextGENTV broadcasting with Cloud to Cable (ATSC 3.0) - Broadcasting to CABSAT
NextGENTV broadcasting with Cloud to Cable  (ATSC 3.0) - Broadcasting to CABSATNextGENTV broadcasting with Cloud to Cable  (ATSC 3.0) - Broadcasting to CABSAT
NextGENTV broadcasting with Cloud to Cable (ATSC 3.0) - Broadcasting to CABSAT
 
New Revenue Opportunities for Cloud Apps and Services with CloudtoCable
New Revenue Opportunities for Cloud Apps and Services with CloudtoCableNew Revenue Opportunities for Cloud Apps and Services with CloudtoCable
New Revenue Opportunities for Cloud Apps and Services with CloudtoCable
 
EGLA CORP: Innovation, Intellectual Property Services, and Capital
EGLA CORP:  Innovation, Intellectual Property Services, and CapitalEGLA CORP:  Innovation, Intellectual Property Services, and Capital
EGLA CORP: Innovation, Intellectual Property Services, and Capital
 
Music for Cable Music Service for Operators
Music for Cable   Music Service for OperatorsMusic for Cable   Music Service for Operators
Music for Cable Music Service for Operators
 
Cloud to Cable intellectual Property Portfolio
Cloud to Cable intellectual Property PortfolioCloud to Cable intellectual Property Portfolio
Cloud to Cable intellectual Property Portfolio
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Securing 4G and LTE systems with Deep Learning and Virtualization

  • 1. 1 VIRTUALIZATION SOLUTIONS & DEEP LEARNING WHITEPAPER SECURING 4G AND 5G NETWORKS Phone: 561-306-4996 Email: sales@eglacorp.com 751 Park of Commerce Dr. Suite 128 Boca Raton, FL, 33487 EGLA CORP – July 2020
  • 2. © 2020 EGLA CORP, All rights reserved www.eglacorp.com | www.eglacomm.net/ip 2 SECURING WIRELESS INFRASTRUTURE IN 4G and 5G SYSTEMS By Dr Edwin A. Hernandez PROBLEM STATEMENT Modern wireless communications use a mixture of Radio Frequency (RF) and Internet communications. These wireless networks employ modern modulation techniques that are defined by the 3rd Generation Partnership Program (3GPP). In general, the standardization process is arrived by agreement among multiple wireless vendors and technology experts. These agreements or standards have developed a modern infrastructure leading 4G and 5G communication systems where all communication is all IP-based or “Internet Protocol”-based. Hence, securing these systems and mobile communications is crucial as the same challenges being faced by internet applications are also observed by voice calls, messages, video calls in 4G and 5G networks. In essence, the great vulnerability in all 4G and 5G systems resides in “control” of that IP infrastructure and relinquishing that control to a 3rd party and not managing your own mobile traffic creates a major threat. ENCRYPTION, VPN, AND TUNNELING DO NOT SUFFICE WHEN THERE IS NO CONTROL OF YOUR WIRELESS NETWORK TRAFFIC. HOW 4G AND 5G INFRASTRUCTURE WORKS? 4G infrastructures are substantially similar to a 5G, as they both use IP. Although, other component names and functionality maybe used, both systems use “Internet Protocols” as a foundation. The good thing is that both technologies can then be virtualized and secured.
  • 3. © 2020 EGLA CORP, All rights reserved www.eglacorp.com | www.eglacomm.net/ip 3 4G and 5G systems rely on two entities to interface all mobile users with an infrastructure and are called eNodeB in 4G and gNB in 5G (a.k.a. Base Stations). These base stations operate in a similar way as a standard home- based WIFI system with your cable provider. In other words, by having an internet link, a base station communicates with the infrastructure using internet signals by delivering voice, web, and other traffic to the eNodeBs (or gNBs) that is later sent directly from the mobile phone to the internet. In other words, all mobile device traffic including phone calls, video calls, positioning, and all web requests that are made from all devices to the public internet network is “seen” by the “carrier.” As a side effect, all mobile network traffic provides carriers and operators with additional financial value while raising privacy and security issues. This is not new as most internet users are familiar with privacy and security questions derived from using Facebook, Google, Youtube, and many other applications. In fact, all traffic regardless of anonymity claims, can be utilized to fingerprint users, detect movement patterns, and even intercept communications if that control is lost. THREAT Foreign entities as HUAWEI are being questioned and banned from 4G and 5G deployments in the US and Europe, as a threat of eavesdropping and traffic management is possible. China has been notorious for controlling their own infrastructure and censuring internet traffic. There are several techniques that eavesdropping that can go basically undetected, in fact HUAWEI and other Chinese vendors use machine learning and artificial intelligence extensively to a) reconfigure the network, b) to
  • 4. © 2020 EGLA CORP, All rights reserved www.eglacorp.com | www.eglacomm.net/ip 4 implement deep learning capabilities in the system for optimization, and c) smarts use of network access. Hence protecting, all mobile logs, IP Addresses, origination and termination of calls, web requests, VPN, and others is very important, and that is the main reason why Huawei is not allowed in some of these markets. HOW 4G INFRASTRUCTURE CARRIES NETWORK TRAFFIC First we will understand how infrastructure in 4G systems work and introduce our solution. Our solution relies on “Virtual Network Function” operatior which consists in moving sensitive functionality in the network to a private cloud that is controlled by a trusted party. Hence, securing eNodeB and gNB (Base Station) traffic from all systems to a virtual network is key to improve security and enhance privacy. As shown, the following diagram, a UE (mobile phone) communicates with the PDN (public internet). All the blocks in between can be virtual and execute in at private cloud at a trusted location.. Public Internet
  • 5. © 2020 EGLA CORP, All rights reserved www.eglacorp.com | www.eglacomm.net/ip 5 The chart above shows that in our solution all signaling required by a 4G terminal or mobile phone can be directed to a virtual infrastructure. Each line of communication between UE (User Equipment) and the PDN Packet Data Network) and all components in between that include S-GW, P-GW, and the a PDN(CN) are now under a trusted management and chances of eavesdropping or tracking uses is substantially diminished. The path shown below is now secured. Even telecommunication carriers such as AT&T, Verizon, T-Mobile & Sprint, and other operators are exposed to threats derived of injecting IP Tunnels, obtaining log files with sensitive information from servers, and potential indirect eavesdropping of all network traffic. Clearly, the proposed infrastructure now carries all web requests from all applications made by a mobile phone to internet-based applications such as a web server, email, social medial, video conference, streaming, google searches, and other sensitive network traffic. This white paper will cover two available solutions that EGLA CORP can help with. UE WEB, VIDEO, MESSAGES
  • 6. © 2020 EGLA CORP, All rights reserved www.eglacorp.com | www.eglacomm.net/ip 6 SOLUTION 1. INFRASTRUCTURE VIRTUALIZATION EGLA CORP has a virtualization solution that consists in creating a virtual carrier of your own, by replicating S-GW, P-GW, MME, PDN and other 4G components in the network to work as a private carrier win a controlled infrastructure managed by a trusted party. The solution uses cloud-based instances that include all those components in the cloud. The cloud can be formed using docker, VmWare, or XenServer instances that leverage modern techniques of management and securing a “cloud.” Our system then brings that required control over all mobile communications transmissions that are made by a mobile terminal. The private system handles all mobile traffic from all base stations at Verizon, AT&T, or T-Mobile to this network infrastructure and each phone can be provisioned with its own number and set pf IP addresses. Also provisioning of that system is done by a SIM Card that is issued by the trusted entity controlling this environment. Operationally, a virtualized infrastructure functions in a similar way to a “virtual network operator” that uses AT&T, Verizon, and T-Mobile licensed frequencies. As shown, our system can be installed in a trusted on-premise location, at your own facility, except an agreement to use the licensed spectrum by AT&T, Verizon, or T-Mobile. Verizon and T-Mobile have over 30+ virtual network operators. However, since all mobile device encryption keys and all IP transmissions are generated and orchestrated from the virtualized cloud, all communications between all endpoints are only known by the private virtualized infrastructure.
  • 7. © 2020 EGLA CORP, All rights reserved www.eglacorp.com | www.eglacomm.net/ip 7 “INTERFACING THE PRIVATE SYSTEM TO OTHER CARRIERS FOR CALLS, MESSAGING ,EVEN LONG-DISTANCE CALLS IS FEASIBLE” The solution will then look like this: SOLUTION #2. VIRTUALIZATION WITH CBRS OR CITIZENS BROADBAND RADIO SERVICE In order to gain entire control to the communication’s path and for a complete end-to-end solution, a CBRS eNodeB is required. The FCC has liberated the CBRS band or Citizens Broadband Radio Service for LTE services and eNodeB’s can be installed to create a private 4G LTE network. Moreover, CBRS-band base stations do not require any regulatory approval by the FCC as those bands can be employed and can carry 4G Traffic, just as you can enjoy WIFI spectrum. Most mobile phones can connect to these bands already and operation in those bands requires deployment of base stations in areas where those communications need to be secured as shown:
  • 8. © 2020 EGLA CORP, All rights reserved www.eglacorp.com | www.eglacomm.net/ip 8 Hence, Solution #1 and #2 are designed for the future and suitable for reuse of many of its components for future updates in 4G systems, as well as, it is upgradable to 5G. As 5G frequencies and devices become mainstream, deploying 5G is easier than ever. ADDITIONAL SECURITY WITH BLUEHEXAGON Now that infrastructure is virtualized, cloud-based protection of data and infrastructure is possible including modern deep learning techniques. In partnership with BLUEHEXAGON, we offer an Artificial Intelligence system capable of securing a cloud-based platform and our network function virtualization system. BLUEHEXAGON is deployed as part of our cloud and uses deep learning to protect all communications within the network infrastructure. IN FACT, BY APPLYING DEEP LEARNING TO THE COMPLETE INSPECTION OF HEADERS AND PAYLOADS, YOU CAN DETECT THREATS IN REAL-TIME, AND STOP PATIENT-ZERO OR PREVENT FURTHER LATERAL MOVEMENT. BLUE HEXAGON REAL-TIME DEEP LEARNING CAN ADDRESS. Deep learning and artificial intelligence further secures our solution.
  • 9. © 2020 EGLA CORP, All rights reserved www.eglacorp.com | www.eglacomm.net/ip 9 OUR EXPERTISE Our CTO and owner, Dr. Edwin Hernandez is a world expert in wireless and has been a judge for the Mobile World Congress 2019 and 2020. As a judge, Dr. Hernandez evaluated cutting edge 4G, 5G systems and other advanced infrastructure technologies made by global players. Additionally, Dr. Hernandez has assisted wireless communications patent cases in 4G and assisted with these technologies including its own. Among the technologies that EGLA CORP has a license to US Patents: • 7,231,330, 7,697,508 and 8,213,417 • 9,071,957 and 9,338,629 • 10,123,074 and 10,524,002