Scigazette Monthly Read February issue of Scigazette magazine | Page 17

adopted. Networks take care of network access, and
security issues. For the services and users, building an E2E
service providers deal with service access.
data security chain could be a way to reduce the reliance
Diversified Identity Management
Ÿ Legacy cellular networks rely on( U) SIM cards to
on individual link security and simplifies security management.
manage user identities and keys. In 5G, equipments
Open Up Security Capabilities, and provide security as a
such as sensors, wearable devices, and smart home
Service
devices are possibly either too small or too cheap to
Security management, for instance, managing identities,
accommodate( U) SIM. Now the time has come to find a
performing authentication, defending against denial of
new way of managing device identities, for instance,
service( DoS) attacks, and protecting confidentiality and
produce, assign, and apply lifecycle management on
device identities.
Ÿ Combination of device identity and service identity
In the new identity management framework, an
identity consists of a device identity and a service
identity. Each device identity( also called physical
identity) is globally unique and may be assigned to a
device at the manufacturing phase. Service identities
are assigned by service providers or networks. A physical identity may correspond to one or more service identities.
integrity of service traffic, is a general request to vertical industries. However, perhaps not all industry players have the capabilities to build security management on their
Ÿ From device-based management to user-based
own, either due to economic burdens or technical
management
challenges, etc. Utilizing security service could be a good
It leaves to users to decide which of their devices is
choice to these players.
allowed to access the network and which service is allowed to use. As an example, devices of a same user may share bandwidth quotas with each other in either online or offline manner.
On the other hand, Telecom networks have relatively nice work in the security capabilities( i. e. authentication, identity & key management) and are trusted by users after years of commitment in services. It is a good opportunity
Service-oriented Security
for networks to provide their security capabilities as a
Ÿ Build E2E Security
service to vertical industries. For instance, networks could
Differentiated security for different services
authenticate service access and return the authentication
5G systems are going to be service-oriented. This implies
result to vertical industries.
that there will be a special emphasis on security
It is the network ' s choice either to deploy the security
requirements that stem from the angle of services. For
service on a cloud platform or simply built it into a virtual
instance, remote health care requires resilient security
network slice of the vertical industry who has bought the
while IoT requires lightweight security. It is quite
security service from networks. Security capabilities can be
reasonable to offer differentiated security to different
seamlessly built into business flows of vertical industries.
services.
• Isolate Virtual Network Slices
Flexible security architecture to support security
For virtual network slices, each of which handles a different
attributes for different network slices
type of application service to facilitate flexible resource
If differentiated security is offered, then flexible security
orchestration and scheduling, there is a need to isolate
architecture is needed to support E2E protection for
slices from each other to prevent their resources from
different service, based on network slicing architecture.
being accessed by network nodes in other slices. For
Network manages different E2E security capabilities,
instance, patients in a health care slice desire to allow only
including strength of security algorithms, ways to derive
doctors access their health data, and they are reluctant to
and negotiate secret keys, and mechanisms for protecting
see their data accessed by someone in other slices.
confidentiality and integrity. Within a virtual network slice,
The isolation statement is also applicable to virtual network
security capabilities could further be distributed.
slices with the same type of application service. For
A Uniformed security management framework for multifrom
instance, enterprise A may hope to block other enterprises
vendor environment
using its resources, although these enterprises are
In cloud environment, software and equipments of
served by a same type of virtual network slices.
network infrastructure come from more than one
The isolation effect for service and data in the virtual
equipment vendors, which relatively complicate the
network slices could approach to the user experience in
Scigazette | 17 | February, 2017