Scigazette Monthly Read February issue of Scigazette magazine | Page 17

adopted . Networks take care of network access , and
security issues . For the services and users , building an E2E
service providers deal with service access .
data security chain could be a way to reduce the reliance
Diversified Identity Management
Ÿ Legacy cellular networks rely on ( U ) SIM cards to
on individual link security and simplifies security management .
manage user identities and keys . In 5G , equipments
Open Up Security Capabilities , and provide security as a
such as sensors , wearable devices , and smart home
Service
devices are possibly either too small or too cheap to
Security management , for instance , managing identities ,
accommodate ( U ) SIM . Now the time has come to find a
performing authentication , defending against denial of
new way of managing device identities , for instance ,
service ( DoS ) attacks , and protecting confidentiality and
produce , assign , and apply lifecycle management on
device identities .
Ÿ Combination of device identity and service identity
In the new identity management framework , an
identity consists of a device identity and a service
identity . Each device identity ( also called physical
identity ) is globally unique and may be assigned to a
device at the manufacturing phase . Service identities
are assigned by service providers or networks . A physical identity may correspond to one or more service identities .
integrity of service traffic , is a general request to vertical industries . However , perhaps not all industry players have the capabilities to build security management on their
Ÿ From device-based management to user-based
own , either due to economic burdens or technical
management
challenges , etc . Utilizing security service could be a good
It leaves to users to decide which of their devices is
choice to these players .
allowed to access the network and which service is allowed to use . As an example , devices of a same user may share bandwidth quotas with each other in either online or offline manner .
On the other hand , Telecom networks have relatively nice work in the security capabilities ( i . e . authentication , identity & key management ) and are trusted by users after years of commitment in services . It is a good opportunity
Service-oriented Security
for networks to provide their security capabilities as a
Ÿ Build E2E Security
service to vertical industries . For instance , networks could
Differentiated security for different services
authenticate service access and return the authentication
5G systems are going to be service-oriented . This implies
result to vertical industries .
that there will be a special emphasis on security
It is the network ' s choice either to deploy the security
requirements that stem from the angle of services . For
service on a cloud platform or simply built it into a virtual
instance , remote health care requires resilient security
network slice of the vertical industry who has bought the
while IoT requires lightweight security . It is quite
security service from networks . Security capabilities can be
reasonable to offer differentiated security to different
seamlessly built into business flows of vertical industries .
services .
• Isolate Virtual Network Slices
Flexible security architecture to support security
For virtual network slices , each of which handles a different
attributes for different network slices
type of application service to facilitate flexible resource
If differentiated security is offered , then flexible security
orchestration and scheduling , there is a need to isolate
architecture is needed to support E2E protection for
slices from each other to prevent their resources from
different service , based on network slicing architecture .
being accessed by network nodes in other slices . For
Network manages different E2E security capabilities ,
instance , patients in a health care slice desire to allow only
including strength of security algorithms , ways to derive
doctors access their health data , and they are reluctant to
and negotiate secret keys , and mechanisms for protecting
see their data accessed by someone in other slices .
confidentiality and integrity . Within a virtual network slice ,
The isolation statement is also applicable to virtual network
security capabilities could further be distributed .
slices with the same type of application service . For
A Uniformed security management framework for multifrom
instance , enterprise A may hope to block other enterprises
vendor environment
using its resources , although these enterprises are
In cloud environment , software and equipments of
served by a same type of virtual network slices .
network infrastructure come from more than one
The isolation effect for service and data in the virtual
equipment vendors , which relatively complicate the
network slices could approach to the user experience in
Scigazette | 17 | February , 2017