Use this template to submit Use Cases for submission to the 5G Super Blueprint Use Case & Requirements Advisory Group. All input is required unless marked "(optional)"
Use Case Name: | ONE Summit Demo (November) |
---|---|
Use Case Description: | |
Problem Statement and how is the problem solved: | Problem Statement: Requirement to Showcase 5G SBP at ONE Summit. What can we do thats visual and hasn't been done before? Problem Statement: Documentation. It is a requirment that documentation be delivered along with the Demo |
Users Stories |
|
Demo Storyline (optional) | |
Interaction with other open source projects and components |
|
Links to existing documentation (Build Guide, Slideware, etc), if available (optional). | |
Links to existing demo/video, if available (optional). | |
Links to existing code/repos, if available (optional). |
Use Case Name: | ONE Summit Demo of Cryptographic Approach to Securing Network Slices (November) |
---|---|
Use Case Description: | Demonstration of mechanism for securing Network Slices using Proxy Re-encryption. Secure distribution of AES keys used to decrypt streaming video (currently a 5-minute video). |
Problem Statement and how is the problem solved: | Problem Statement: Currently, there is no mechanism for the secure distribution of critical information, such as private keys and control channel data, throughout the 5G core network and across administrative domains. How the problem is solved: Lattice-based Proxy Re-encryption (PRE) can be used to securely forward ciphertext from a producer to a consumer by way of a Broker and Key Authority server. |
Users Stories |
|
Demo Storyline (optional) | Post-Quantum secure distribution of keys can be done via Proxy Re-encryption. The demonstration consists of a streaming video whose decryption key is distributed securely via a transitive, or multi-hop, PRE scheme. |
Interaction with other open source projects and components |
|
Links to existing documentation (Build Guide, Slideware, etc), if available (optional). | |
Links to existing demo/video, if available (optional). | |
Links to existing code/repos, if available (optional). |
Use Case Name: | ONE Summit Demo of Programmable Network Defenses (November) |
---|---|
Use Case Description: | Demonstration of Programmable Network Defenses. VoIP call under DDoS attack and call recovery after DDoS attack mitigation (currently a 5-minute video). |
Problem Statement and how is the problem solved: | Problem Statement: The proliferation of IoT devices, which 5G will enable and promote, introduces the potential for larger scale DDoS attacks than ever before. How the problem is solved: Software Defined Networking programmable network switches are distributed across the 5G network. These switches can adapt to evolving threats and be used to preemptively and rapidly mitigate an attack. |
Users Stories |
|
Demo Storyline (optional) | The quality of an in-session VoIP call is reduced dramatically due to an ongoing DDoS attack (The reduced call quality either results from a direct attack on one of the VoIP endpoints or from collateral damage from the attack on another endpoint in the network). The automatic defense kicks in, rapidly shutting down the DDoS attack and allowing the VoIP session to quickly return to a high fidelity call quality. |
Interaction with other open source projects and components |
|
Links to existing documentation (Build Guide, Slideware, etc), if available (optional). | |
Links to existing demo/video, if available (optional). | |
Links to existing code/repos, if available (optional). |