On the other hand, it is clear that it is not sufficient just to |
New IT technologies, like virtualization and Software |
provide the same security features as in the legacy systems |
Defined Network( SDN)/ Network Functions Virtualization |
because there may be new security requirements and |
( NFV), are seen as a way to make 5G networks more |
challenges. 5G systems are going to be service-oriented. |
nimble and efficient, yet less costly. While CT are happy to |
This implies there will be a special emphasis on security |
see IT injecting new vigor into their networks, new security |
and privacy requirements that stem from the angle of |
concerns are emerging. |
services. |
Security cannot be built for 5G services unless the network |
Traditional Security Practice |
infrastructure is robust. In legacy networks, security of |
Mobile communications systems have evolved through |
function network elements( NEs) relies largely on how well |
wireless technology innovation into 2G, 3G, and then 4G to |
their physical entities could be isolated from each other. |
keep pace with ever increasing voice and data traffic. |
However, in 5G, the isolation will work differently as virtual |
Tougher security mechanisms are in place to safeguard |
NEs on cloud-based infrastructure. It’ s likely that time is |
today’ s mobile communication systems. For instance, oneway |
right to take 5G infrastructure security into consideration. |
authentication in 2G has been elevated to mutual |
SDN is proved to be of help in improving transmission |
authentication in 3G & 4G; key length and algorithms are |
efficiency and resource configuration. On the other hand, it |
becoming more robust; as mobility management is |
is important to consider in the 5G security design that it |
improving, a forward key separation in handovers has been |
could be managed in terms of the isolation for network |
added in 4G; also more effective privacy protection is |
nodes such as control nodes and forwarding nodes, and |
considered. |
the secure and correct enforcement of the SDN flow table. |
Traditional security architectures focus on protection of |
Based on network virtualization technology, a network |
voice and data, and they all have the following security |
could build different virtual network slices. Each virtual |
features in common: |
network slice could accommodate a particular service |
Ÿ User identity management based on( U) SIM |
requirement and thereby may require differentiated |
Ÿ Mutual authentication between networks and users |
security capabilities. 5G security design may need to |
Ÿ Securing the path between communicating parties hopvirtual by-hop |
network slices securely. consider issues of how to isolate, deploy, and manage |
Security Challenges Ahead of 5G |
Heterogeneous Access |
New Business Models
In traditional mobile communications networks, the primary goal is to enrich people ' s life through communication. Users may communicate by text messages, voice calls, and video calls, or surf Internet or access app services using smart phones. However, 5G is no longer confined to individual customers. It ' s not simply about having a faster mobile network or richer functions in smart phones. 5G will also serve vertical industries, from which a diversity of new services are going to stem.
In the context of vertical industry, security demands could vary significantly among services. For instance, mobile
Internet of Things( IoT) devices require lightweight security while high-speed mobile services demand high efficient mobile security. The network based hop-by-hop security approach may not be efficient enough to build differentiated end-to-end( E2E) security for different services. As IoT is gaining momentum, more people will be able to remotely operate or " talk " to networked devices, for instance, instructing facilities at a smart home to get up. Therefore, there is a need of a more stringent authentication method to prevent unauthorized access to
|
Heterogeneous will be one of the network features of next-generation access networks. The heterogeneous nature comes not only from the use of different access technologies( WiFi and LTE), but also from multi-network environment, which might imply that the access network architecture from different networks are different. So a consideration for security designers is building security architecture suitable for different access technologies.
IoT devices have many choices in the way they access networks. For instance, they may connect to networks directly, or via a gateway, or in the D2D or Relay fashion.
Comparing to mobile handset, security management of IOT device in 5G may be efficient and lightweight in order to establish trust relationships between devices and networks.
Privacy Protection
With the advances of mobile Internet, more and more vertical industries, including health care, smart home, and smart transport, will resort to 5G networks. As open network platforms, 5G networks raise serious concerns on privacy leakage. In many cases, privacy leakage can cause serious consequences.
|
IoT devices. For example, biometric identification could be |
As primary method for network accessing, mobile |
part of the authentication in smart homes. |
networks carries data and signaling that contains many |
IT-Driven Network Architecture |
personal privacy information( for instance, identity, |