adopted. Networks take care of network access, and |
security issues. For the services and users, building an E2E |
service providers deal with service access. |
data security chain could be a way to reduce the reliance |
Diversified Identity Management
Ÿ Legacy cellular networks rely on( U) SIM cards to
|
on individual link security and simplifies security management. |
manage user identities and keys. In 5G, equipments |
Open Up Security Capabilities, and provide security as a |
such as sensors, wearable devices, and smart home |
Service |
devices are possibly either too small or too cheap to |
Security management, for instance, managing identities, |
accommodate( U) SIM. Now the time has come to find a |
performing authentication, defending against denial of |
new way of managing device identities, for instance, |
service( DoS) attacks, and protecting confidentiality and |
produce, assign, and apply lifecycle management on | |
device identities. | |
Ÿ Combination of device identity and service identity | |
In the new identity management framework, an | |
identity consists of a device identity and a service | |
identity. Each device identity( also called physical | |
identity) is globally unique and may be assigned to a | |
device at the manufacturing phase. Service identities | |
are assigned by service providers or networks. A physical identity may correspond to one or more service identities. |
integrity of service traffic, is a general request to vertical industries. However, perhaps not all industry players have the capabilities to build security management on their |
Ÿ From device-based management to user-based |
own, either due to economic burdens or technical |
management |
challenges, etc. Utilizing security service could be a good |
It leaves to users to decide which of their devices is |
choice to these players. |
allowed to access the network and which service is allowed to use. As an example, devices of a same user may share bandwidth quotas with each other in either online or offline manner. |
On the other hand, Telecom networks have relatively nice work in the security capabilities( i. e. authentication, identity & key management) and are trusted by users after years of commitment in services. It is a good opportunity |
Service-oriented Security |
for networks to provide their security capabilities as a |
Ÿ Build E2E Security |
service to vertical industries. For instance, networks could |
Differentiated security for different services |
authenticate service access and return the authentication |
5G systems are going to be service-oriented. This implies |
result to vertical industries. |
that there will be a special emphasis on security |
It is the network ' s choice either to deploy the security |
requirements that stem from the angle of services. For |
service on a cloud platform or simply built it into a virtual |
instance, remote health care requires resilient security |
network slice of the vertical industry who has bought the |
while IoT requires lightweight security. It is quite |
security service from networks. Security capabilities can be |
reasonable to offer differentiated security to different |
seamlessly built into business flows of vertical industries. |
services. |
• Isolate Virtual Network Slices |
Flexible security architecture to support security |
For virtual network slices, each of which handles a different |
attributes for different network slices |
type of application service to facilitate flexible resource |
If differentiated security is offered, then flexible security |
orchestration and scheduling, there is a need to isolate |
architecture is needed to support E2E protection for |
slices from each other to prevent their resources from |
different service, based on network slicing architecture. |
being accessed by network nodes in other slices. For |
Network manages different E2E security capabilities, |
instance, patients in a health care slice desire to allow only |
including strength of security algorithms, ways to derive |
doctors access their health data, and they are reluctant to |
and negotiate secret keys, and mechanisms for protecting |
see their data accessed by someone in other slices. |
confidentiality and integrity. Within a virtual network slice, |
The isolation statement is also applicable to virtual network |
security capabilities could further be distributed. |
slices with the same type of application service. For |
A Uniformed security management framework for multifrom |
instance, enterprise A may hope to block other enterprises |
vendor environment |
using its resources, although these enterprises are |
In cloud environment, software and equipments of |
served by a same type of virtual network slices. |
network infrastructure come from more than one |
The isolation effect for service and data in the virtual |
equipment vendors, which relatively complicate the |
network slices could approach to the user experience in |