You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Use this template to submit Use Cases for submission to the 5G Super Blueprint Use Case & Requirements Advisory Group. All input is required unless marked "(optional)"



Use Case Name:ONE Summit Demo (November)
Use Case Description:
Problem Statement and how is the problem solved:

Problem Statement: Requirement to Showcase 5G SBP at ONE Summit. What can we do thats visual and hasn't been done before?

Problem Statement: Documentation. It is a requirment that documentation be delivered along with the Demo

Users Stories

  • a.
  • b.
  • c.

Demo Storyline (optional)


Interaction with other open source projects and components

  • a.
  • b.
  • c.

Links to existing documentation (Build Guide, Slideware, etc), if available (optional).


Links to existing demo/video, if available (optional).


Links to existing code/repos, if available (optional).



Use Case Name:ONE Summit Demo of Cryptographic Approach to Securing Network Slices (November)
Use Case Description:

Demonstration of mechanism for securing Network Slices using Proxy Re-encryption.

Secure distribution of AES keys used to decrypt streaming video

(currently a 5-minute video).

Problem Statement and how is the problem solved:

Problem Statement: 

Currently, there is no mechanism for the secure distribution of critical information, such as private keys and control channel data, throughout the 5G core network and across administrative domains.

How the problem is solved: 

Lattice-based Proxy Re-encryption (PRE) can be used to securely forward ciphertext from a producer to a consumer by way of a Broker and Key Authority server.

Users Stories

  • Alice wants to forward Charlie an encrypted video so that he can watch it. Alice is not able to decrypt and re-encrypt the video using Charlie’s public key, so she delegates the forwarding process to Bob.  She doesn’t completely trust Bob, but she wants him to forward her encrypted video, along with its encrypted decryption key, to Charlie. Delegating the secure forwarding process to Bob means that Alice does not have to decrypt and then re-encrypt the video in order for Charlie to securely receive a copy of it.

Demo Storyline (optional)

Post-Quantum secure distribution of keys can be done via Proxy Re-encryption.  The demonstration consists of a streaming video whose decryption key is distributed securely via a transitive, or multi-hop, PRE scheme.

Interaction with other open source projects and components

  • a.

Links to existing documentation (Build Guide, Slideware, etc), if available (optional).


Links to existing demo/video, if available (optional).


Links to existing code/repos, if available (optional).



Use Case Name:ONE Summit Demo of Programmable Network Defenses (November)
Use Case Description:

Demonstration of Programmable Network Defenses.

VoIP call under DDoS attack and call recovery after DDoS attack mitigation (currently a 5-minute video).

Problem Statement and how is the problem solved:

Problem Statement: 

The proliferation of IoT devices, which 5G will enable and promote, introduces the potential for larger scale DDoS attacks than ever before. 

How the problem is solved:

Software Defined Networking programmable network switches are distributed across the 5G network. These switches can adapt to evolving threats and be used to preemptively and rapidly mitigate an attack.

Users Stories

  • Alice initiates a VoIP call with Bob.  While they are talking, Bob’s endpoint is under DDoS attack. As a result, the call quality drops dramatically.  The programmable defenses instrumented throughout the network components detect the attack underway and rapidly mitigate it.  The call quality quickly comes back to a high fidelity and Alice and Bob are able to resume talking over the VoIP session.

Demo Storyline (optional)

The quality of an in-session VoIP call is reduced dramatically due to an ongoing DDoS attack (The reduced call quality either results from a direct attack on one of the VoIP endpoints or from collateral damage from the attack on another endpoint in the network).  The automatic defense kicks in, rapidly shutting down the DDoS attack and allowing the VoIP session to quickly return to a high fidelity call quality.

Interaction with other open source projects and components

  • ONAP
  • Free 5GC?

Links to existing documentation (Build Guide, Slideware, etc), if available (optional).


Links to existing demo/video, if available (optional).


Links to existing code/repos, if available (optional).


  • No labels