Skip to main content
Fig. 12 | EURASIP Journal on Information Security

Fig. 12

From: Towards 5G cellular network forensics

Fig. 12

LI adaptations for the Rel. 15 network slicing architecture. For the LEA to be able to distinguish and correlate CIoT traffic (signaling and both IP and non-IP traffic), a triplet of IDs including the communication service identifier, the NSI identifier, and the NSSI identifier is proposed

Back to article page