Scigazette Monthly Read February issue of Scigazette magazine | Page 16

position , and private content ). In order to offer
Ÿ Identity management Both software and hardware
differentiated quality of service , networks may need to
infrastructures run in multi-vendor environment . In
sense what type of service a user is using . The service type
order to mitigate unauthorized access to network
sensing may involve user privacy . Add all this together ,
resources , stringent identity management is a possible
privacy protection in 5G is more challenging .
need .
5G Security Blueprint
Ÿ Data protection Integrity and confidentiality protection
5G Security Goals
are provided throughout data transmission to prevent
As the 5G era is drawing near , the volume of data traffic
data from being intercepted or re-routed to
and variety of services will increase to unseen-before
unauthorized destinations .
levels . IoT service is just one of the many . When it comes
5G Security Perspectives
to 5G , it is not simply about being a medium for
New Trust Model and Identity Management
communication . It can be seen as a catalyst for minimizing
In legacy mobile communications networks , Telecom
the boundary between the digital world and physical
networks are responsible for authenticating user for
world . 5G security design is an all-encompassing one that
network access only . A trust model with two elements ,
provides security protection for the everything-connected
between users and networks , is formed . The
world .
authentication between user and services are not covered
E2E Security for Vertical Industries
by the networks . However , in 5G networks , a trust model
Ÿ Differentiated security protection
with an additional element , the vertical service provider , is
E2E security design caters to different vertical
favored possible design . Networks may cooperate with
industries . In that case , the design of security
service providers to carry out an even secure and more
protection needs to consider how to fulfils various
efficient identity management .
security requirements .
Ÿ Flexibility
Hybrid Authentication Management
5G networks are open platforms with a plethora of
In order to provide better support and rapid response
services . Smart transport , smart grid , industrial IoT are
to the vertical industry requirement , it is nice that E2E
security capabilities could be rapidly aligned with
business changes . In that case . it would request flexible
and high efficient E2E security deployment and
adaptation .
Ÿ Privacy protection
5G will see APP services thriving vigorously . Along with
this thriving , personal privacy data is growing massively
also , including device identifiers , user IDs , and user
preference . Considering that , privacy protection could
some of them . Both networks and service providers face
be built end to end , leaving no part of the security
challenges in making access & service authentication
chain vulnerable to privacy leaks .
simpler and less costly . Three authentication models would
Ÿ Security as service
possibly co-exist in 5G to address needs of different
In face of convergence of IT and CT , telecom industry is
businesses .
seeking to boost their strength and better serve vertical
Ÿ Authentication by networks only Service authentication
industries . Tele communications systems have done
incurs significant amount of costs to service providers .
well in protecting user privacy , and users have built
Service providers can pay networks for service
relatively good level of trust with security strength of
authentication so users will be able to access multiple
the communication systems . 5G could continue to
services once they complete a single authentication .
extend the user trust by opening up security
This frees users from the cumbersome task of getting
capabilities as a service to individual users and vertical
service grant repeatedly when accessing different
industries .
Secure Infrastructure
Ÿ Diversified system level protection of IT-aware
services .
Ÿ Authentication by service providers only On the other hand , networks may rely on the proven authentication
infrastructure after IT technologies ( e . g . NFV and SDN )
capabilities from vertical industries and exempt devices
are put into use , a vast array of system-level protections
from radio network access authentication , which can
is in place to defend against distributed denial of
help the networks lower down operating cost .
service ( DDoS ) and other active attacks that may
Ÿ Authentication by both networks and service providers
increase .
For some of the services , a legacy model might be
Scigazette | 16 | February , 2017