525.678.8VL - Next Generation Mobile Networks and Security with 5G

Electrical and Computer Engineering
Fall 2023


The primary focus of this course is to introduce the next generation mobile networks, including both Cellular and WLAN technologies in great detail, to discuss various types of IP-based mobility protocols, namely Mobile-IP, Mobile IPv6, ProxyMIPv6, SIP-mobility, and Cellular IP, and to explore systems optimization techniques to support seamless handover during Inter RAT handover (e.g., 4G, 5G, and WLAN). Additionally, the course will briefly introduce the principles of cellular communications system and will then move on to describe the evolution of different generations of cellular systems including 2G, 3G, 4G, and 5G as being defined in 3GPP. At the same time it will discuss IEEE WLAN standards as developed by IEEE 802 working group including 802.11 (a, b, g, n) and 802.11 (ax, ay, ac). The Media Independent Handover standard IEEE 802.21 (e.g., integrating WLAN and 3G/4G cellular networks to provide session/service continuity) is also introduced. Further, the course will describe the 4G Long Term Evolution (LTE) in detail, covering its various components—namely Evolved UMTS Terrestrial Radio Access Network (E-UTRAN), EPC (Evolved Packet Network), and IMS (IP Multimedia Subsystem)—and all the associated interfaces and protocols, and the current efforts on 5G evolution and will touch upon various 5G pillars, namely SDN (Software Defined Networking), Network Function Virtualization, Cloud RAN, Network Slicing, Mobile Edge Cloud, and Edge Security. Finally, the course will highlight various standards activities within 3GPP, IEEE, IETF, NGMN, and ITU and will introduce some research problems for future study in the mobility area, presenting various deployment use cases and experimental results from the open-source testbeds.


Profile photo of Ashutosh Dutta.

Ashutosh Dutta


Course Structure

Preliminary version of the slides will be posted ahead of the class. Modified versions will be published after the class. Since this is VL class, the class will be recorded and will be available after the class in Canvas.

Homework Assignment will be published in the Canvas. Quizzes will be given during the class.

Mid-term and Final Exams will be Open Book.

Course Topics

1. Cellular Overview

1.1 Cellular 1G

1.1.1 System architecture

1.1.2 Handoff procedure

1.2 Cellular 2G mobility

1.2.1 GSM

2.2.2 IS-95

1.3 Cellular 3G mobility

1.3.1 WCDMA

1.3.2 CDMA2000

1.4 4G Networks

1.4.1 Evolved Packet System (LTE)

1.4.2 WiMAX-based mobility

1.5 Heterogeneous Handover

1.5.1 UMTS-WLAN Handover

1.5.2 LTE-WLAN Handover


Mobility Taxonomy

5.1 Types of mobility

5.1.1 Terminal mobility

5.1.2 Personal mobility

5.1.3 Session mobility

5.1.4 Service mobility

5.1 Network layer macro mobility

5.2 Network layer micro mobility

5.3 NETMOB - Network Mobility

5.4 Transport layer mobility

5.5 Application layer mobility

5.6 Host Identity Protocol


Layer 2 Security

Wired Equivalent Privacy

IEEE 802.11i

Network Layer Security

IPSec and Virtual Private Networks

The AH and ESP Protocols

Security Association

IKE: Key Management in IPSec

Transport Layer Security

Secured Socket Layer

Application Layer Security



Mobile IP Security

-        Application of Security Protocols (E.g., IPSec)

-        Key Management in Mobile IP (ISAKMP)

-        Mobile VPN

-        Securing Route Optimization

-        Securing Registration and Binding Updates

SIP Security

Introduction to SIP

User Identity in SIP

Media Security (SRTP, Key Exchange)

Denial of Service Attacks on VoIP and IMS Services


Roaming in 802.11 WLANs

-        Primer on the 802.11 Standard

-        Introduction to 802.11 Roaming

IEEE 802.11 security issues

- Authentication, Confidentiality, Integrity, Access Control

802.11i Security

-        WEP’s Limitation

-        802.11 Cipher

-        Pre-authentication

User Authentication in 802.11

-        802.1X Port level Authentication

-        The Extensible Authentication Protocol

-        Other 802.11 Authentication Methodologies

-        Network Access Control

Secure Roaming in 802.11

-         Pre-authentication in 802.11

-         Proprietary solutions for roaming in 802.11 networks

Fast Secure Roaming

-         Overview of the 802.11r Standards

-         Overview of 802.11k standards

Roaming between 802.11 and other wireless Technologies

-        Vertical vs. Horizontal Roaming

4.8. IEEE 802.21 Standards

-        Media Independent Handover Function

-        Media Independent Information Service

-        Media Independent Event Service

-        Media Independent Command Service

EPS Security Architecture

EPS Authentication and Key Agreement

Security Mechanisms for Voice over LTE

Interworking Security between EPS and other systems

-        3GPP’s Service Oriented-based

Security Architecture

Systems evaluation

  1. Results from experimental models

- Media independent pre-authentication framework

- Intra-technology handoff

-        Inter-technology handoff

-        Simultaneous Mobility

- Cross layer trigger assisted pre-authentication

- Mobile initiated handover with 802.21 triggers

-  Network initiated handover with 802.21 triggers

-  Handover preparation time

  1. Security optimization in IP multimedia subsystem

-  Non-optimized handoff mode

-  Optimization with reactive context transfer

-  Optimization with proactive security context transfer

-  Performance results

. Scheduling handoff operations

-    Sequential scheduling

-    Concurrent scheduling

-     Proactive scheduling

  1. Mobility modeling for multi-interface mobility

-   Multi-homing scenario

-   Break-before-make scenario

-   Make-before-break scenario

  1. Deadlocks in handoff scheduling

-  Handoff schedules with deadlocks

-   Deadlock prevention and avoidance in handoff schedule

  1. Analysis of level of concurrency and resources

-  Trade-off analysis for proactive handoff

Course Goals


Research papers, 3GPP, IEEE, IETF, 802, ETSI specifications and prescribed text books on 5G technologies.

Relevant 5G specific chapters will be shared with the students

Suggested Text Books, References  and Standards (I will share the pdf document of relevant book chapters)

• Mobile IP Design Principles and Practices by Charles E. Perkins
• LTE Security by Forsberg, Horn, Moeller and Niemi
• SIP Security by Sisalem, Floroiu, Kuthan, Abend, Schulzrinne
• Linux Networking, A Practical Guide to TCP/IP by Pat Eyler
• IEEE 802 Wireless Systems – Walke, Mangold, Berlemann
• Voice over LTE (Miikka Poikelka et al.)
• Computer Networking, Kurose and Ross
• Mobility Protocols and Handover Optimization by Dutta and Schulzrinne
• A Comprehensive Guide to 5G Security, Liyange, Ahmad, ABRO, Gurtov, Ylianttila

Student Coursework Requirements

Grading Procedure:

Quizzes – 20%  ( 2 to 3 Quizzes)

Mid-Term – 35% (Open Book)

Final – 35% (Open Book)

Homework – 10%

Grading Policy

EP uses a +/- grading system (see “Grading System”, Graduate Programs catalog, p. 10).

Score RangeLetter Grade
100-98= A+
97-94= A
93-90= A−
89-87= B+
86-83= B
82-80= B−
79-77= C+
76-73= C
72-70= C−
69-67= D+
66-63= D
<63= F

Academic Policies

Deadlines for Adding, Dropping and Withdrawing from Courses

Students may add a course up to one week after the start of the term for that particular course. Students may drop courses according to the drop deadlines outlined in the EP academic calendar (https://ep.jhu.edu/student-services/academic-calendar/). Between the 6th week of the class and prior to the final withdrawal deadline, a student may withdraw from a course with a W on their academic record. A record of the course will remain on the academic record with a W appearing in the grade column to indicate that the student registered and withdrew from the course.

Academic Misconduct Policy

All students are required to read, know, and comply with the Johns Hopkins University Krieger School of Arts and Sciences (KSAS) / Whiting School of Engineering (WSE) Procedures for Handling Allegations of Misconduct by Full-Time and Part-Time Graduate Students.

This policy prohibits academic misconduct, including but not limited to the following: cheating or facilitating cheating; plagiarism; reuse of assignments; unauthorized collaboration; alteration of graded assignments; and unfair competition. Course materials (old assignments, texts, or examinations, etc.) should not be shared unless authorized by the course instructor. Any questions related to this policy should be directed to EP’s academic integrity officer at ep-academic-integrity@jhu.edu.

Students with Disabilities - Accommodations and Accessibility

Johns Hopkins University values diversity and inclusion. We are committed to providing welcoming, equitable, and accessible educational experiences for all students. Students with disabilities (including those with psychological conditions, medical conditions and temporary disabilities) can request accommodations for this course by providing an Accommodation Letter issued by Student Disability Services (SDS). Please request accommodations for this course as early as possible to provide time for effective communication and arrangements.

For further information or to start the process of requesting accommodations, please contact Student Disability Services at Engineering for Professionals, ep-disability-svcs@jhu.edu.

Student Conduct Code

The fundamental purpose of the JHU regulation of student conduct is to promote and to protect the health, safety, welfare, property, and rights of all members of the University community as well as to promote the orderly operation of the University and to safeguard its property and facilities. As members of the University community, students accept certain responsibilities which support the educational mission and create an environment in which all students are afforded the same opportunity to succeed academically. 

For a full description of the code please visit the following website: https://studentaffairs.jhu.edu/policies-guidelines/student-code/

Classroom Climate

JHU is committed to creating a classroom environment that values the diversity of experiences and perspectives that all students bring. Everyone has the right to be treated with dignity and respect. Fostering an inclusive climate is important. Research and experience show that students who interact with peers who are different from themselves learn new things and experience tangible educational outcomes. At no time in this learning process should someone be singled out or treated unequally on the basis of any seen or unseen part of their identity. 
If you have concerns in this course about harassment, discrimination, or any unequal treatment, or if you seek accommodations or resources, please reach out to the course instructor directly. Reporting will never impact your course grade. You may also share concerns with your program chair, the Assistant Dean for Diversity and Inclusion, or the Office of Institutional Equity. In handling reports, people will protect your privacy as much as possible, but faculty and staff are required to officially report information for some cases (e.g. sexual harassment).

Course Auditing

When a student enrolls in an EP course with “audit” status, the student must reach an understanding with the instructor as to what is required to earn the “audit.” If the student does not meet those expectations, the instructor must notify the EP Registration Team [EP-Registration@exchange.johnshopkins.edu] in order for the student to be retroactively dropped or withdrawn from the course (depending on when the "audit" was requested and in accordance with EP registration deadlines). All lecture content will remain accessible to auditing students, but access to all other course material is left to the discretion of the instructor.