SlideShare a Scribd company logo
‘Small Cells’ and the City
Form factors, deployment and Security aspects
Zahid Ghadialy
Managing Director, eXplanoTech
3g4g.blogspot.com
31/10/2012
Briefly about eXplanoTech
Non-Confidential
© eXplanoTech Ltd.
2
Technical Consulting
• Requirement Analysis
• Project Management
• Architecture and Specification
• Design, Implementation, Integration &
Deployment
• Testing Services (inc. IOT, CAT, Conformance, Field)
• Maintenance
Trainings
• Technology trainings
• Product trainings
• Process trainings
• Executive trainings
• Trainings on integrating cultural aspects in work
Resourcing and Recruitment
• Talent acquisition
• Executive head hunt
• Resourcing of projects
• Managed Services
• Technology and Business Intelligence domains
The ‘Promised land’
 Informa Telecoms & Media expects the small market to experience
significant growth over the next few years, reaching 91.9 million small
cells by 2016 - Small Cell Market Status, June 2012 via Small Cell
Forum
Non-Confidential
© eXplanoTech Ltd.
3
Non-Confidential
© eXplanoTech Ltd.
4
Picture Source: Small Cells, Femtocells and the LTE Business Model - P. Jarich, Service Director, Current Analysis
I think we should have 3 categories to
differentiate the cells: Closed Residential
Femtocells, Small Cells and Macro cells
Non-Confidential
© eXplanoTech Ltd.
5
Source: Small Cells, Femtocells and the LTE Business Model - P. Jarich, Service Director, Current Analysis
Small Cell Form factors and Deployment
Non-Confidential
© eXplanoTech Ltd.
6
Case Study of Telefonica UK (O2), WiFi deployment
in London, in time for Olympics, July 2012
 6 months to deploy the small cells (WiFi AP’s) – to finish
by July 2012
 Exhibition road deployment (shown later) – 9 metrocells
providing 1Gbps/sq km
 400 different planning applications had to be submitted
for deploying these small cells on the lamp posts
 Backhaul is fibre for one AP and 5GHz WiFi as a backhaul
for other AP’s
 The Access Points (AP’s) had to be coloured black in some
cases to get council approval
 3G Metrocells will be deployed by end of 2012 on the
same sites as WiFi AP’s.
Non-Confidential
© eXplanoTech Ltd.
7
Non-Confidential
© eXplanoTech Ltd.
8Source: Telefonica UK's LTE & Small Cell Trials - Robert Joyce, Chief Radio Engineer, TFUK
Non-Confidential
© eXplanoTech Ltd.
9
Source: Telefonica UK's LTE & Small Cell Trials - Robert Joyce, Chief Radio Engineer, TFUK
Non-Confidential
© eXplanoTech Ltd.
10
Source: Delivery of Wi-Fi / 3G small cells network into London - Steve Brown, New Technology Trials Manager, TFUK
Non-Confidential
© eXplanoTech Ltd.
11
Source: Delivery of Wi-Fi / 3G small cells network into London - Steve Brown, New Technology Trials Manager, TFUK
Non-Confidential
© eXplanoTech Ltd.
12
Alcatel-Lucent lightRadio Metro Cell
Source: Alcatel-Lucent
Non-Confidential
© eXplanoTech Ltd.
13
Source: Delivery of Wi-Fi / 3G small cells network into London - Steve Brown, New Technology Trials Manager, TFUK
‘Small cells’ deployment challenges
 Site Acquisition
 Location, Planning permission, Rent, Bullet proof, Environment
(wind, ice)
 Power
 Power source should be available 24/7. Deployment on light poles
can have a problem if power switched off centrally
 Performance
 Backhaul
 Health concerns
 Visual appearance
 Opex.
Based on the discussion in ‘Operator Mindshare session’ on 29/10/2012
Non-Confidential
© eXplanoTech Ltd.
14
Non-Confidential
© eXplanoTech Ltd.
15
Source: Delivery of Wi-Fi / 3G small cells network into London - Steve Brown, New Technology Trials Manager, TFUK
Small Cell site security
Non-Confidential
© eXplanoTech Ltd.
16
Small Cells Threat Analysis - 1
1) Compromise of H(e)NB authentication token by a brute
force attack via a weak authentication algorithm.
2) Compromise of H(e)NB authentication token by local
physical intrusion.
3) Inserting valid authentication token into a manipulated
H(e)NB.
4) User cloning the H(e)NB authentication Token.
5) Man-in-the-middle attacks on H(e)NB first network
access.
6) Booting H(e)NB with fraudulent software (“re-
flashing”).
7) Fraudulent software update / configuration changes.
8) Physical tampering with H(e)NB.
9) Eavesdropping of the other user’s UTRAN or E-UTRAN
user data.
10) Masquerade as other users.
11) Changing of the H(e)NB location without reporting.
12) Software simulation of H(e)NB.
13) Traffic tunnelling between H(e)NBs.
14) Misconfiguration of the firewall in the modem/router.
15) Denial of service attacks against H(e)NB.
16) Denial of service attacks against core network.
17) Compromise of an H(e)NB by exploiting weaknesses of
active network services
18) User’s network ID revealed to H(e)NodeB owner
19) Mis-configuration of H(e)NB
20) Mis-configuration of access control list (ACL) or
compromise of the access control list
21) Radio resource management tampering
22) Masquerade as a valid H(e)NB
23) Provide radio access service over a CSG
24) H(e)NB announcing incorrect location to the network
25) Manipulation of external time source
26) Environmental/side channel attacks against H(e)NB
27) Attack on OAM and its traffic
28) Threat of H(e)NB connectivity to network access
29) Handover to CSG H(e)NB.
Non-Confidential
© eXplanoTech Ltd.
17
Source: 3GPP TR 33.820: Technical Specification Group Service and System Aspects; Security of H(e)NB
Small Cells Threat Analysis - 2
The above threat maybe grouped
together as the following:
 Compromise of H(e)NB
Credentials
 1, 2, 4
 Physical attacks on a
H(e)NB
 3, 6, 8, 26
 Configuration attacks on a
H(e)NB
 7, 19, 20
 Protocol attacks on a H(e)NB
 5, 15, 17, 25, 27, 28
 Attacks on the core network,
including H(e)NB location-
based attacks
 11, 12, 13, 14, 16, 24
 User Data and identity privacy
attacks
 9, 10, 18, 22, 23
 Attacks on Radio resources
and management
 21
Non-Confidential
© eXplanoTech Ltd.
18
Small Cells Basic Security Issues
Non-Confidential
© eXplanoTech Ltd.
19Source: Securing Femtocell Networks - Natasha Tamaskar, VP, Product Marketing, GENBAND
Small Cells Basic Security Issues
IPsec and Security Gateway
Non-Confidential
© eXplanoTech Ltd.
20
Source: Securing Femtocell
Networks - Natasha Tamaskar, VP,
Product Marketing, GENBAND
HSPA HNB and LTE HeNB Architecture
Non-Confidential
© eXplanoTech Ltd.
21
Core Networks
Gateway
Iu IP Data Uu
(No Encryption) (IPSEC)
(Integrity and Ciphering)
RNC + NodeB
Network Architecture with Home NodeB
Core Networks
Gateway
S1 IP Data LTE Uu
(Integrity and Ciphering) (IPSEC)
(Integrity and Ciphering)
eNodeB
Network Architecture with Home eNodeB
Small Cells Threat Analysis - 2
The above threat maybe grouped
together as the following:
 Compromise of H(e)NB
Credentials
 1, 2, 4
 Physical attacks on a
H(e)NB
 3, 6, 8, 26
 Configuration attacks on a
H(e)NB
 7, 19, 20
 Protocol attacks on a H(e)NB
 5, 15, 17, 25, 27, 28
 Attacks on the core network,
including H(e)NB location-
based attacks
 11, 12, 13, 14, 16, 24
 User Data and identity privacy
attacks
 9, 10, 18, 22, 23
 Attacks on Radio resources
and management
 21
Non-Confidential
© eXplanoTech Ltd.
22
Physical Threats
Vandalism and Natural Disasters
Non-Confidential
© eXplanoTech Ltd.
23
Backhaul Security
Non-Confidential
© eXplanoTech Ltd.
24
Backhaul Security
ACL, Filtering & Verification of source and destination
Non-Confidential
© eXplanoTech Ltd.
25
ACL = Access Control Lists
Non-Confidential
© eXplanoTech Ltd.
26
Source: Delivery of Wi-Fi / 3G small cells
network into London - Steve Brown, New
Technology Trials Manager, TFUK
Any Questions?
Source: http://dilbert.com/strips/comic/2000-12-16/
Non-Confidential
© eXplanoTech Ltd.
27
Non-Confidential
© eXplanoTech Ltd.
28

More Related Content

What's hot

Synchronisation and Time Distribution in Modern Telecommunications Networks
Synchronisation and Time Distribution in Modern Telecommunications NetworksSynchronisation and Time Distribution in Modern Telecommunications Networks
Synchronisation and Time Distribution in Modern Telecommunications Networks
3G4G
 
5 g mobile phone concept
5 g mobile phone    concept5 g mobile phone    concept
5 g mobile phone concept
jonesdaniel
 
4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks
Praveen Kumar
 
5 g webinar slides
5 g webinar slides5 g webinar slides
5 g webinar slides
mohammad ali amini
 
Advanced: 5G NR RRC Inactive State
Advanced: 5G NR RRC Inactive StateAdvanced: 5G NR RRC Inactive State
Advanced: 5G NR RRC Inactive State
3G4G
 
5G Evolution: Progressive Enhancement & N ew Features for New Markets
5G Evolution: Progressive Enhancement & N ew Features for New Markets5G Evolution: Progressive Enhancement & N ew Features for New Markets
5G Evolution: Progressive Enhancement & N ew Features for New Markets
3G4G
 
4G LTE Man in the Middle Attack with a Hacked Femtocell
4G LTE Man in the Middle Attack with a Hacked Femtocell4G LTE Man in the Middle Attack with a Hacked Femtocell
4G LTE Man in the Middle Attack with a Hacked Femtocell
3G4G
 
WiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beWiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11be
Bryan Len
 
5 g technology bdma
5 g technology bdma5 g technology bdma
5 g technology bdma
Srihari
 
Future Proofing With LTE-Advanced
Future Proofing With LTE-AdvancedFuture Proofing With LTE-Advanced
Future Proofing With LTE-Advanced
eXplanoTech
 
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research GroupSignals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
3G4G
 
Wireless network guide
Wireless network guideWireless network guide
Wireless network guide
Dooremoore
 
5G Network| What's Next | December 2018
5G Network| What's Next | December 20185G Network| What's Next | December 2018
5G Network| What's Next | December 2018
paul young cpa, cga
 
UK Spectrum Policy Forum - Simon Pike, Vodafone - Developing a UK perspective...
UK Spectrum Policy Forum - Simon Pike, Vodafone - Developing a UK perspective...UK Spectrum Policy Forum - Simon Pike, Vodafone - Developing a UK perspective...
UK Spectrum Policy Forum - Simon Pike, Vodafone - Developing a UK perspective...
techUK
 
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) DevicesBeginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
3G4G
 
Samir's whitepaper5g
Samir's whitepaper5gSamir's whitepaper5g
Samir's whitepaper5g
Samir Mohanty
 
Device-level AI for 5G and beyond
Device-level AI for 5G and beyondDevice-level AI for 5G and beyond
Device-level AI for 5G and beyond
3G4G
 
Critical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technologyCritical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technology
3G4G
 
Small cell and WiFi integration in EPC
Small cell and WiFi integration in EPCSmall cell and WiFi integration in EPC
Small cell and WiFi integration in EPC
eXplanoTech
 
Examining the Role of SDN and NFV in the Move Towards LTE-A and 5th Generation
Examining the Role of SDN and NFV in the Move Towards LTE-A and 5th Generation Examining the Role of SDN and NFV in the Move Towards LTE-A and 5th Generation
Examining the Role of SDN and NFV in the Move Towards LTE-A and 5th Generation
Alberto Boaventura
 

What's hot (20)

Synchronisation and Time Distribution in Modern Telecommunications Networks
Synchronisation and Time Distribution in Modern Telecommunications NetworksSynchronisation and Time Distribution in Modern Telecommunications Networks
Synchronisation and Time Distribution in Modern Telecommunications Networks
 
5 g mobile phone concept
5 g mobile phone    concept5 g mobile phone    concept
5 g mobile phone concept
 
4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks
 
5 g webinar slides
5 g webinar slides5 g webinar slides
5 g webinar slides
 
Advanced: 5G NR RRC Inactive State
Advanced: 5G NR RRC Inactive StateAdvanced: 5G NR RRC Inactive State
Advanced: 5G NR RRC Inactive State
 
5G Evolution: Progressive Enhancement & N ew Features for New Markets
5G Evolution: Progressive Enhancement & N ew Features for New Markets5G Evolution: Progressive Enhancement & N ew Features for New Markets
5G Evolution: Progressive Enhancement & N ew Features for New Markets
 
4G LTE Man in the Middle Attack with a Hacked Femtocell
4G LTE Man in the Middle Attack with a Hacked Femtocell4G LTE Man in the Middle Attack with a Hacked Femtocell
4G LTE Man in the Middle Attack with a Hacked Femtocell
 
WiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beWiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11be
 
5 g technology bdma
5 g technology bdma5 g technology bdma
5 g technology bdma
 
Future Proofing With LTE-Advanced
Future Proofing With LTE-AdvancedFuture Proofing With LTE-Advanced
Future Proofing With LTE-Advanced
 
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research GroupSignals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
 
Wireless network guide
Wireless network guideWireless network guide
Wireless network guide
 
5G Network| What's Next | December 2018
5G Network| What's Next | December 20185G Network| What's Next | December 2018
5G Network| What's Next | December 2018
 
UK Spectrum Policy Forum - Simon Pike, Vodafone - Developing a UK perspective...
UK Spectrum Policy Forum - Simon Pike, Vodafone - Developing a UK perspective...UK Spectrum Policy Forum - Simon Pike, Vodafone - Developing a UK perspective...
UK Spectrum Policy Forum - Simon Pike, Vodafone - Developing a UK perspective...
 
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) DevicesBeginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
 
Samir's whitepaper5g
Samir's whitepaper5gSamir's whitepaper5g
Samir's whitepaper5g
 
Device-level AI for 5G and beyond
Device-level AI for 5G and beyondDevice-level AI for 5G and beyond
Device-level AI for 5G and beyond
 
Critical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technologyCritical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technology
 
Small cell and WiFi integration in EPC
Small cell and WiFi integration in EPCSmall cell and WiFi integration in EPC
Small cell and WiFi integration in EPC
 
Examining the Role of SDN and NFV in the Move Towards LTE-A and 5th Generation
Examining the Role of SDN and NFV in the Move Towards LTE-A and 5th Generation Examining the Role of SDN and NFV in the Move Towards LTE-A and 5th Generation
Examining the Role of SDN and NFV in the Move Towards LTE-A and 5th Generation
 

Viewers also liked

5G: A 2020 Vision
5G: A 2020 Vision5G: A 2020 Vision
5G: A 2020 Vision
eXplanoTech
 
Drones, balloons and mini-satellites: unconventional connectivity solutions -...
Drones, balloons and mini-satellites: unconventional connectivity solutions -...Drones, balloons and mini-satellites: unconventional connectivity solutions -...
Drones, balloons and mini-satellites: unconventional connectivity solutions -...
IDATE DigiWorld
 
Efficient mobile backhaul
Efficient mobile backhaulEfficient mobile backhaul
Efficient mobile backhaul
CBNL
 
Rec 12 073 Lte Small Cells Presentation Arrows
Rec 12 073 Lte  Small Cells Presentation ArrowsRec 12 073 Lte  Small Cells Presentation Arrows
Rec 12 073 Lte Small Cells Presentation Arrows
shaylinau
 
Lte security overview
Lte security overviewLte security overview
Lte security overview
aliirfan04
 
LTE Asia 2012 Highlights from Alan Quayle
LTE Asia 2012 Highlights from Alan QuayleLTE Asia 2012 Highlights from Alan Quayle
LTE Asia 2012 Highlights from Alan Quayle
Alan Quayle
 
MMA Istanbul Day 2
MMA Istanbul Day 2MMA Istanbul Day 2
MMA Istanbul Day 2
Paul Berney
 
Highlights from day 1 of MMA Forum Istanbul 2012
Highlights from day 1 of MMA Forum Istanbul 2012Highlights from day 1 of MMA Forum Istanbul 2012
Highlights from day 1 of MMA Forum Istanbul 2012
Paul Berney
 
Broadband World Forum 2012 Highlights
Broadband World Forum 2012 HighlightsBroadband World Forum 2012 Highlights
Broadband World Forum 2012 Highlights
Alan Quayle
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and Challenges
Dr. Mazlan Abbas
 
The 1000x Mobile Data Challenge
The 1000x Mobile Data ChallengeThe 1000x Mobile Data Challenge
The 1000x Mobile Data Challenge
Qualcomm Research
 
4 g americas developing integrating high performance het-net october 2012
4 g americas  developing integrating high performance het-net october 20124 g americas  developing integrating high performance het-net october 2012
4 g americas developing integrating high performance het-net october 2012
Zoran Kehler
 
An introduction to Wireless Small Cell Networks
An introduction to Wireless Small Cell NetworksAn introduction to Wireless Small Cell Networks
An introduction to Wireless Small Cell Networks
Mehdi Bennis
 
SmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast ShootoutSmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast Shootout
David Chambers
 
Quick Summary of LTE Voice Summit 2015 #LTEVoice
Quick Summary of LTE Voice Summit 2015 #LTEVoiceQuick Summary of LTE Voice Summit 2015 #LTEVoice
Quick Summary of LTE Voice Summit 2015 #LTEVoice
3G4G
 
Mobile Telecoms Tech & Market Disruptions - April 2015 Version
Mobile Telecoms Tech & Market Disruptions -  April 2015 VersionMobile Telecoms Tech & Market Disruptions -  April 2015 Version
Mobile Telecoms Tech & Market Disruptions - April 2015 Version
Dean Bubley
 
3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things
Eiko Seidel
 
UK Spectrum Policy Forum Report: UK Spectrum Usage & Demand - First Edition
UK Spectrum Policy Forum Report: UK Spectrum Usage & Demand - First EditionUK Spectrum Policy Forum Report: UK Spectrum Usage & Demand - First Edition
UK Spectrum Policy Forum Report: UK Spectrum Usage & Demand - First Edition
techUK
 
Smart Batteries
Smart BatteriesSmart Batteries
Smart Batteries
eXplanoTech
 
Cellular Services over WiFi
Cellular Services over WiFiCellular Services over WiFi
Cellular Services over WiFi
3G4G
 

Viewers also liked (20)

5G: A 2020 Vision
5G: A 2020 Vision5G: A 2020 Vision
5G: A 2020 Vision
 
Drones, balloons and mini-satellites: unconventional connectivity solutions -...
Drones, balloons and mini-satellites: unconventional connectivity solutions -...Drones, balloons and mini-satellites: unconventional connectivity solutions -...
Drones, balloons and mini-satellites: unconventional connectivity solutions -...
 
Efficient mobile backhaul
Efficient mobile backhaulEfficient mobile backhaul
Efficient mobile backhaul
 
Rec 12 073 Lte Small Cells Presentation Arrows
Rec 12 073 Lte  Small Cells Presentation ArrowsRec 12 073 Lte  Small Cells Presentation Arrows
Rec 12 073 Lte Small Cells Presentation Arrows
 
Lte security overview
Lte security overviewLte security overview
Lte security overview
 
LTE Asia 2012 Highlights from Alan Quayle
LTE Asia 2012 Highlights from Alan QuayleLTE Asia 2012 Highlights from Alan Quayle
LTE Asia 2012 Highlights from Alan Quayle
 
MMA Istanbul Day 2
MMA Istanbul Day 2MMA Istanbul Day 2
MMA Istanbul Day 2
 
Highlights from day 1 of MMA Forum Istanbul 2012
Highlights from day 1 of MMA Forum Istanbul 2012Highlights from day 1 of MMA Forum Istanbul 2012
Highlights from day 1 of MMA Forum Istanbul 2012
 
Broadband World Forum 2012 Highlights
Broadband World Forum 2012 HighlightsBroadband World Forum 2012 Highlights
Broadband World Forum 2012 Highlights
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and Challenges
 
The 1000x Mobile Data Challenge
The 1000x Mobile Data ChallengeThe 1000x Mobile Data Challenge
The 1000x Mobile Data Challenge
 
4 g americas developing integrating high performance het-net october 2012
4 g americas  developing integrating high performance het-net october 20124 g americas  developing integrating high performance het-net october 2012
4 g americas developing integrating high performance het-net october 2012
 
An introduction to Wireless Small Cell Networks
An introduction to Wireless Small Cell NetworksAn introduction to Wireless Small Cell Networks
An introduction to Wireless Small Cell Networks
 
SmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast ShootoutSmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast Shootout
 
Quick Summary of LTE Voice Summit 2015 #LTEVoice
Quick Summary of LTE Voice Summit 2015 #LTEVoiceQuick Summary of LTE Voice Summit 2015 #LTEVoice
Quick Summary of LTE Voice Summit 2015 #LTEVoice
 
Mobile Telecoms Tech & Market Disruptions - April 2015 Version
Mobile Telecoms Tech & Market Disruptions -  April 2015 VersionMobile Telecoms Tech & Market Disruptions -  April 2015 Version
Mobile Telecoms Tech & Market Disruptions - April 2015 Version
 
3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things
 
UK Spectrum Policy Forum Report: UK Spectrum Usage & Demand - First Edition
UK Spectrum Policy Forum Report: UK Spectrum Usage & Demand - First EditionUK Spectrum Policy Forum Report: UK Spectrum Usage & Demand - First Edition
UK Spectrum Policy Forum Report: UK Spectrum Usage & Demand - First Edition
 
Smart Batteries
Smart BatteriesSmart Batteries
Smart Batteries
 
Cellular Services over WiFi
Cellular Services over WiFiCellular Services over WiFi
Cellular Services over WiFi
 

Similar to ‘Small Cells’ and the City

SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
IRJET Journal
 
Borapureddi Ashok_present
Borapureddi Ashok_presentBorapureddi Ashok_present
Borapureddi Ashok_present
BORAPUREDDI ASHOK
 
Final project report
Final project reportFinal project report
Final project report
RaziaSultanaHimu
 
Noticias tel dic
Noticias tel dicNoticias tel dic
Noticias tel dic
Francisco Apablaza
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
MohammadSwerki2
 
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph DatabaseTelecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
Neo4j
 
Resume.2016.03.08
Resume.2016.03.08Resume.2016.03.08
Resume.2016.03.08
Zhijie Li
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforum
videos
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12
Vishal Sharma, Ph.D.
 
Bluetooth vs zigbee
Bluetooth vs zigbeeBluetooth vs zigbee
Bluetooth vs zigbee
aimenriyadh
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Thierry Lestable
 
5G WIRELESS TRAINING
5G WIRELESS TRAINING5G WIRELESS TRAINING
5G WIRELESS TRAINING
Etta2020
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
Syed Mustafa
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
Dr. Edwin Hernandez
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
 
Introduction to IoT by Vectolabs
Introduction to IoT by VectolabsIntroduction to IoT by Vectolabs
Introduction to IoT by Vectolabs
Vectolabs Technologies Sdn Bhd
 
Knowledge Graphs for Network Digital Twins
Knowledge Graphs for Network Digital TwinsKnowledge Graphs for Network Digital Twins
Knowledge Graphs for Network Digital Twins
Neo4j
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
Chuck Petras
 
Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTE
Mary McEvoy Carroll
 

Similar to ‘Small Cells’ and the City (20)

SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Borapureddi Ashok_present
Borapureddi Ashok_presentBorapureddi Ashok_present
Borapureddi Ashok_present
 
Final project report
Final project reportFinal project report
Final project report
 
Noticias tel dic
Noticias tel dicNoticias tel dic
Noticias tel dic
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
 
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph DatabaseTelecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
 
Resume.2016.03.08
Resume.2016.03.08Resume.2016.03.08
Resume.2016.03.08
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforum
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12
 
Bluetooth vs zigbee
Bluetooth vs zigbeeBluetooth vs zigbee
Bluetooth vs zigbee
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
 
5G WIRELESS TRAINING
5G WIRELESS TRAINING5G WIRELESS TRAINING
5G WIRELESS TRAINING
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
Introduction to IoT by Vectolabs
Introduction to IoT by VectolabsIntroduction to IoT by Vectolabs
Introduction to IoT by Vectolabs
 
Knowledge Graphs for Network Digital Twins
Knowledge Graphs for Network Digital TwinsKnowledge Graphs for Network Digital Twins
Knowledge Graphs for Network Digital Twins
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTE
 

More from eXplanoTech

LTE, LTE-A and 4G
LTE, LTE-A and 4GLTE, LTE-A and 4G
LTE, LTE-A and 4G
eXplanoTech
 
From LTE to LTE-A
From LTE to LTE-AFrom LTE to LTE-A
From LTE to LTE-A
eXplanoTech
 
LTE-Broadcast: Reality Check
LTE-Broadcast: Reality CheckLTE-Broadcast: Reality Check
LTE-Broadcast: Reality Check
eXplanoTech
 
The Next ‘Killer Device’
The Next ‘Killer Device’The Next ‘Killer Device’
The Next ‘Killer Device’
eXplanoTech
 
Using LTE to Boost ARPU
Using LTE to Boost ARPUUsing LTE to Boost ARPU
Using LTE to Boost ARPU
eXplanoTech
 
Killer Applications or Devices
Killer Applications or DevicesKiller Applications or Devices
Killer Applications or Devices
eXplanoTech
 
Quick Summary of LTE Voice Summit 2014 #LTEVoice
Quick Summary of LTE Voice Summit 2014 #LTEVoiceQuick Summary of LTE Voice Summit 2014 #LTEVoice
Quick Summary of LTE Voice Summit 2014 #LTEVoice
eXplanoTech
 
An Introduction to Voice and SMS in LTE Networks
An Introduction to Voice and SMS in LTE NetworksAn Introduction to Voice and SMS in LTE Networks
An Introduction to Voice and SMS in LTE Networks
eXplanoTech
 
Smart Watches
Smart WatchesSmart Watches
Smart Watches
eXplanoTech
 
4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks
eXplanoTech
 
An Introduction to Self-Organizing Networks (SON)
An Introduction to Self-Organizing Networks (SON)An Introduction to Self-Organizing Networks (SON)
An Introduction to Self-Organizing Networks (SON)
eXplanoTech
 

More from eXplanoTech (11)

LTE, LTE-A and 4G
LTE, LTE-A and 4GLTE, LTE-A and 4G
LTE, LTE-A and 4G
 
From LTE to LTE-A
From LTE to LTE-AFrom LTE to LTE-A
From LTE to LTE-A
 
LTE-Broadcast: Reality Check
LTE-Broadcast: Reality CheckLTE-Broadcast: Reality Check
LTE-Broadcast: Reality Check
 
The Next ‘Killer Device’
The Next ‘Killer Device’The Next ‘Killer Device’
The Next ‘Killer Device’
 
Using LTE to Boost ARPU
Using LTE to Boost ARPUUsing LTE to Boost ARPU
Using LTE to Boost ARPU
 
Killer Applications or Devices
Killer Applications or DevicesKiller Applications or Devices
Killer Applications or Devices
 
Quick Summary of LTE Voice Summit 2014 #LTEVoice
Quick Summary of LTE Voice Summit 2014 #LTEVoiceQuick Summary of LTE Voice Summit 2014 #LTEVoice
Quick Summary of LTE Voice Summit 2014 #LTEVoice
 
An Introduction to Voice and SMS in LTE Networks
An Introduction to Voice and SMS in LTE NetworksAn Introduction to Voice and SMS in LTE Networks
An Introduction to Voice and SMS in LTE Networks
 
Smart Watches
Smart WatchesSmart Watches
Smart Watches
 
4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks
 
An Introduction to Self-Organizing Networks (SON)
An Introduction to Self-Organizing Networks (SON)An Introduction to Self-Organizing Networks (SON)
An Introduction to Self-Organizing Networks (SON)
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

‘Small Cells’ and the City

  • 1. ‘Small Cells’ and the City Form factors, deployment and Security aspects Zahid Ghadialy Managing Director, eXplanoTech 3g4g.blogspot.com 31/10/2012
  • 2. Briefly about eXplanoTech Non-Confidential © eXplanoTech Ltd. 2 Technical Consulting • Requirement Analysis • Project Management • Architecture and Specification • Design, Implementation, Integration & Deployment • Testing Services (inc. IOT, CAT, Conformance, Field) • Maintenance Trainings • Technology trainings • Product trainings • Process trainings • Executive trainings • Trainings on integrating cultural aspects in work Resourcing and Recruitment • Talent acquisition • Executive head hunt • Resourcing of projects • Managed Services • Technology and Business Intelligence domains
  • 3. The ‘Promised land’  Informa Telecoms & Media expects the small market to experience significant growth over the next few years, reaching 91.9 million small cells by 2016 - Small Cell Market Status, June 2012 via Small Cell Forum Non-Confidential © eXplanoTech Ltd. 3
  • 4. Non-Confidential © eXplanoTech Ltd. 4 Picture Source: Small Cells, Femtocells and the LTE Business Model - P. Jarich, Service Director, Current Analysis I think we should have 3 categories to differentiate the cells: Closed Residential Femtocells, Small Cells and Macro cells
  • 5. Non-Confidential © eXplanoTech Ltd. 5 Source: Small Cells, Femtocells and the LTE Business Model - P. Jarich, Service Director, Current Analysis
  • 6. Small Cell Form factors and Deployment Non-Confidential © eXplanoTech Ltd. 6
  • 7. Case Study of Telefonica UK (O2), WiFi deployment in London, in time for Olympics, July 2012  6 months to deploy the small cells (WiFi AP’s) – to finish by July 2012  Exhibition road deployment (shown later) – 9 metrocells providing 1Gbps/sq km  400 different planning applications had to be submitted for deploying these small cells on the lamp posts  Backhaul is fibre for one AP and 5GHz WiFi as a backhaul for other AP’s  The Access Points (AP’s) had to be coloured black in some cases to get council approval  3G Metrocells will be deployed by end of 2012 on the same sites as WiFi AP’s. Non-Confidential © eXplanoTech Ltd. 7
  • 8. Non-Confidential © eXplanoTech Ltd. 8Source: Telefonica UK's LTE & Small Cell Trials - Robert Joyce, Chief Radio Engineer, TFUK
  • 9. Non-Confidential © eXplanoTech Ltd. 9 Source: Telefonica UK's LTE & Small Cell Trials - Robert Joyce, Chief Radio Engineer, TFUK
  • 10. Non-Confidential © eXplanoTech Ltd. 10 Source: Delivery of Wi-Fi / 3G small cells network into London - Steve Brown, New Technology Trials Manager, TFUK
  • 11. Non-Confidential © eXplanoTech Ltd. 11 Source: Delivery of Wi-Fi / 3G small cells network into London - Steve Brown, New Technology Trials Manager, TFUK
  • 12. Non-Confidential © eXplanoTech Ltd. 12 Alcatel-Lucent lightRadio Metro Cell Source: Alcatel-Lucent
  • 13. Non-Confidential © eXplanoTech Ltd. 13 Source: Delivery of Wi-Fi / 3G small cells network into London - Steve Brown, New Technology Trials Manager, TFUK
  • 14. ‘Small cells’ deployment challenges  Site Acquisition  Location, Planning permission, Rent, Bullet proof, Environment (wind, ice)  Power  Power source should be available 24/7. Deployment on light poles can have a problem if power switched off centrally  Performance  Backhaul  Health concerns  Visual appearance  Opex. Based on the discussion in ‘Operator Mindshare session’ on 29/10/2012 Non-Confidential © eXplanoTech Ltd. 14
  • 15. Non-Confidential © eXplanoTech Ltd. 15 Source: Delivery of Wi-Fi / 3G small cells network into London - Steve Brown, New Technology Trials Manager, TFUK
  • 16. Small Cell site security Non-Confidential © eXplanoTech Ltd. 16
  • 17. Small Cells Threat Analysis - 1 1) Compromise of H(e)NB authentication token by a brute force attack via a weak authentication algorithm. 2) Compromise of H(e)NB authentication token by local physical intrusion. 3) Inserting valid authentication token into a manipulated H(e)NB. 4) User cloning the H(e)NB authentication Token. 5) Man-in-the-middle attacks on H(e)NB first network access. 6) Booting H(e)NB with fraudulent software (“re- flashing”). 7) Fraudulent software update / configuration changes. 8) Physical tampering with H(e)NB. 9) Eavesdropping of the other user’s UTRAN or E-UTRAN user data. 10) Masquerade as other users. 11) Changing of the H(e)NB location without reporting. 12) Software simulation of H(e)NB. 13) Traffic tunnelling between H(e)NBs. 14) Misconfiguration of the firewall in the modem/router. 15) Denial of service attacks against H(e)NB. 16) Denial of service attacks against core network. 17) Compromise of an H(e)NB by exploiting weaknesses of active network services 18) User’s network ID revealed to H(e)NodeB owner 19) Mis-configuration of H(e)NB 20) Mis-configuration of access control list (ACL) or compromise of the access control list 21) Radio resource management tampering 22) Masquerade as a valid H(e)NB 23) Provide radio access service over a CSG 24) H(e)NB announcing incorrect location to the network 25) Manipulation of external time source 26) Environmental/side channel attacks against H(e)NB 27) Attack on OAM and its traffic 28) Threat of H(e)NB connectivity to network access 29) Handover to CSG H(e)NB. Non-Confidential © eXplanoTech Ltd. 17 Source: 3GPP TR 33.820: Technical Specification Group Service and System Aspects; Security of H(e)NB
  • 18. Small Cells Threat Analysis - 2 The above threat maybe grouped together as the following:  Compromise of H(e)NB Credentials  1, 2, 4  Physical attacks on a H(e)NB  3, 6, 8, 26  Configuration attacks on a H(e)NB  7, 19, 20  Protocol attacks on a H(e)NB  5, 15, 17, 25, 27, 28  Attacks on the core network, including H(e)NB location- based attacks  11, 12, 13, 14, 16, 24  User Data and identity privacy attacks  9, 10, 18, 22, 23  Attacks on Radio resources and management  21 Non-Confidential © eXplanoTech Ltd. 18
  • 19. Small Cells Basic Security Issues Non-Confidential © eXplanoTech Ltd. 19Source: Securing Femtocell Networks - Natasha Tamaskar, VP, Product Marketing, GENBAND
  • 20. Small Cells Basic Security Issues IPsec and Security Gateway Non-Confidential © eXplanoTech Ltd. 20 Source: Securing Femtocell Networks - Natasha Tamaskar, VP, Product Marketing, GENBAND
  • 21. HSPA HNB and LTE HeNB Architecture Non-Confidential © eXplanoTech Ltd. 21 Core Networks Gateway Iu IP Data Uu (No Encryption) (IPSEC) (Integrity and Ciphering) RNC + NodeB Network Architecture with Home NodeB Core Networks Gateway S1 IP Data LTE Uu (Integrity and Ciphering) (IPSEC) (Integrity and Ciphering) eNodeB Network Architecture with Home eNodeB
  • 22. Small Cells Threat Analysis - 2 The above threat maybe grouped together as the following:  Compromise of H(e)NB Credentials  1, 2, 4  Physical attacks on a H(e)NB  3, 6, 8, 26  Configuration attacks on a H(e)NB  7, 19, 20  Protocol attacks on a H(e)NB  5, 15, 17, 25, 27, 28  Attacks on the core network, including H(e)NB location- based attacks  11, 12, 13, 14, 16, 24  User Data and identity privacy attacks  9, 10, 18, 22, 23  Attacks on Radio resources and management  21 Non-Confidential © eXplanoTech Ltd. 22
  • 23. Physical Threats Vandalism and Natural Disasters Non-Confidential © eXplanoTech Ltd. 23
  • 25. Backhaul Security ACL, Filtering & Verification of source and destination Non-Confidential © eXplanoTech Ltd. 25 ACL = Access Control Lists
  • 26. Non-Confidential © eXplanoTech Ltd. 26 Source: Delivery of Wi-Fi / 3G small cells network into London - Steve Brown, New Technology Trials Manager, TFUK