position , and private content ). In order to offer |
Ÿ Identity management Both software and hardware |
differentiated quality of service , networks may need to |
infrastructures run in multi-vendor environment . In |
sense what type of service a user is using . The service type |
order to mitigate unauthorized access to network |
sensing may involve user privacy . Add all this together , |
resources , stringent identity management is a possible |
privacy protection in 5G is more challenging . |
need . |
5G Security Blueprint |
Ÿ Data protection Integrity and confidentiality protection |
5G Security Goals |
are provided throughout data transmission to prevent |
As the 5G era is drawing near , the volume of data traffic |
data from being intercepted or re-routed to |
and variety of services will increase to unseen-before |
unauthorized destinations . |
levels . IoT service is just one of the many . When it comes |
5G Security Perspectives |
to 5G , it is not simply about being a medium for |
New Trust Model and Identity Management |
communication . It can be seen as a catalyst for minimizing |
In legacy mobile communications networks , Telecom |
the boundary between the digital world and physical |
networks are responsible for authenticating user for |
world . 5G security design is an all-encompassing one that |
network access only . A trust model with two elements , |
provides security protection for the everything-connected |
between users and networks , is formed . The |
world . |
authentication between user and services are not covered |
E2E Security for Vertical Industries |
by the networks . However , in 5G networks , a trust model |
Ÿ Differentiated security protection |
with an additional element , the vertical service provider , is |
E2E security design caters to different vertical |
favored possible design . Networks may cooperate with |
industries . In that case , the design of security |
service providers to carry out an even secure and more |
protection needs to consider how to fulfils various |
efficient identity management . |
security requirements .
Ÿ Flexibility
|
Hybrid Authentication Management
5G networks are open platforms with a plethora of
|
In order to provide better support and rapid response |
services . Smart transport , smart grid , industrial IoT are |
to the vertical industry requirement , it is nice that E2E | |
security capabilities could be rapidly aligned with | |
business changes . In that case . it would request flexible | |
and high efficient E2E security deployment and | |
adaptation . | |
Ÿ Privacy protection | |
5G will see APP services thriving vigorously . Along with | |
this thriving , personal privacy data is growing massively | |
also , including device identifiers , user IDs , and user | |
preference . Considering that , privacy protection could |
some of them . Both networks and service providers face |
be built end to end , leaving no part of the security |
challenges in making access & service authentication |
chain vulnerable to privacy leaks . |
simpler and less costly . Three authentication models would |
Ÿ Security as service |
possibly co-exist in 5G to address needs of different |
In face of convergence of IT and CT , telecom industry is |
businesses . |
seeking to boost their strength and better serve vertical |
Ÿ Authentication by networks only Service authentication |
industries . Tele communications systems have done |
incurs significant amount of costs to service providers . |
well in protecting user privacy , and users have built |
Service providers can pay networks for service |
relatively good level of trust with security strength of |
authentication so users will be able to access multiple |
the communication systems . 5G could continue to |
services once they complete a single authentication . |
extend the user trust by opening up security |
This frees users from the cumbersome task of getting |
capabilities as a service to individual users and vertical |
service grant repeatedly when accessing different |
industries .
Secure Infrastructure
Ÿ Diversified system level protection of IT-aware
|
services .
Ÿ Authentication by service providers only On the other hand , networks may rely on the proven authentication
|
infrastructure after IT technologies ( e . g . NFV and SDN ) |
capabilities from vertical industries and exempt devices |
are put into use , a vast array of system-level protections |
from radio network access authentication , which can |
is in place to defend against distributed denial of |
help the networks lower down operating cost . |
service ( DDoS ) and other active attacks that may |
Ÿ Authentication by both networks and service providers |
increase . |
For some of the services , a legacy model might be |