Scigazette Monthly Read February issue of Scigazette magazine | Page 15

On the other hand, it is clear that it is not sufficient just to
New IT technologies, like virtualization and Software
provide the same security features as in the legacy systems
Defined Network( SDN)/ Network Functions Virtualization
because there may be new security requirements and
( NFV), are seen as a way to make 5G networks more
challenges. 5G systems are going to be service-oriented.
nimble and efficient, yet less costly. While CT are happy to
This implies there will be a special emphasis on security
see IT injecting new vigor into their networks, new security
and privacy requirements that stem from the angle of
concerns are emerging.
services.
Security cannot be built for 5G services unless the network
Traditional Security Practice
infrastructure is robust. In legacy networks, security of
Mobile communications systems have evolved through
function network elements( NEs) relies largely on how well
wireless technology innovation into 2G, 3G, and then 4G to
their physical entities could be isolated from each other.
keep pace with ever increasing voice and data traffic.
However, in 5G, the isolation will work differently as virtual
Tougher security mechanisms are in place to safeguard
NEs on cloud-based infrastructure. It’ s likely that time is
today’ s mobile communication systems. For instance, oneway
right to take 5G infrastructure security into consideration.
authentication in 2G has been elevated to mutual
SDN is proved to be of help in improving transmission
authentication in 3G & 4G; key length and algorithms are
efficiency and resource configuration. On the other hand, it
becoming more robust; as mobility management is
is important to consider in the 5G security design that it
improving, a forward key separation in handovers has been
could be managed in terms of the isolation for network
added in 4G; also more effective privacy protection is
nodes such as control nodes and forwarding nodes, and
considered.
the secure and correct enforcement of the SDN flow table.
Traditional security architectures focus on protection of
Based on network virtualization technology, a network
voice and data, and they all have the following security
could build different virtual network slices. Each virtual
features in common:
network slice could accommodate a particular service
Ÿ User identity management based on( U) SIM
requirement and thereby may require differentiated
Ÿ Mutual authentication between networks and users
security capabilities. 5G security design may need to
Ÿ Securing the path between communicating parties hopvirtual by-hop
network slices securely. consider issues of how to isolate, deploy, and manage
Security Challenges Ahead of 5G
Heterogeneous Access
New Business Models
In traditional mobile communications networks, the primary goal is to enrich people ' s life through communication. Users may communicate by text messages, voice calls, and video calls, or surf Internet or access app services using smart phones. However, 5G is no longer confined to individual customers. It ' s not simply about having a faster mobile network or richer functions in smart phones. 5G will also serve vertical industries, from which a diversity of new services are going to stem.
In the context of vertical industry, security demands could vary significantly among services. For instance, mobile
Internet of Things( IoT) devices require lightweight security while high-speed mobile services demand high efficient mobile security. The network based hop-by-hop security approach may not be efficient enough to build differentiated end-to-end( E2E) security for different services. As IoT is gaining momentum, more people will be able to remotely operate or " talk " to networked devices, for instance, instructing facilities at a smart home to get up. Therefore, there is a need of a more stringent authentication method to prevent unauthorized access to
Heterogeneous will be one of the network features of next-generation access networks. The heterogeneous nature comes not only from the use of different access technologies( WiFi and LTE), but also from multi-network environment, which might imply that the access network architecture from different networks are different. So a consideration for security designers is building security architecture suitable for different access technologies.
IoT devices have many choices in the way they access networks. For instance, they may connect to networks directly, or via a gateway, or in the D2D or Relay fashion.
Comparing to mobile handset, security management of IOT device in 5G may be efficient and lightweight in order to establish trust relationships between devices and networks.
Privacy Protection
With the advances of mobile Internet, more and more vertical industries, including health care, smart home, and smart transport, will resort to 5G networks. As open network platforms, 5G networks raise serious concerns on privacy leakage. In many cases, privacy leakage can cause serious consequences.
IoT devices. For example, biometric identification could be
As primary method for network accessing, mobile
part of the authentication in smart homes.
networks carries data and signaling that contains many
IT-Driven Network Architecture
personal privacy information( for instance, identity,
Scigazette | 15 | February, 2017