traditional private network , only in this way the users are |
vehicle collision and surgical operation errors . Further , with |
willing to store the private data on cloud , and then they |
the deployment of ultra-dense deployment technologies in |
could freely access their private data without concern |
the 5G network , when a vehicle is on the move , mobility |
about the security risk on the data . |
management procedure can occur frequently . Considering |
Security Assessment |
the delay requirement , the mobility management-specific |
5G needs an open platform to support a vast array of |
functional entities and processes need to be optimized . |
services from vertical industries , for instance , remote |
To address these new challenges , mobility security may be |
health care , Internet of Vehicle ( IoV ), and IoT . The platform |
redesigned and optimized for the 5G network to build an |
can be further divided into units based on the functions . |
efficient , lightweight , and compatible mobility |
Different software or hardware vendors can contribute |
management mechanism to meet the more stringent delay |
their own strength in the development of the units . In this |
requirements . |
way , the service deployment can be more rapid and the |
User Privacy Protection |
operating cost can be reduced . |
As 5G networks will serve a large number of vertical |
To build an open software & hardware ecosystem , it is |
industries . This indicates that a great amount of user |
essential that network function units from different |
privacy information will be carried over the 5G network |
vendors are interoperable via standard interfaces . All |
also . Any information leak may lead to severe |
network function units may need to attest to each other |
consequences . With advancements in data mining |
that they are secure , so that when they are integrated into |
technologies , retrieval of user privacy information has been |
a platform , a high level of platform security could be |
made easier . Therefore , user privacy information must be |
achieved . A traditional way to assess their security strength |
securely protected in the 5G network so that users and |
is that vendors sign a trust agreement and then test |
vertical industries can use the network without worrying |
security performance of each other . However , the testing |
about information leakage . |
model is expensive and impedes the growth of the open |
Ÿ Usage management of privacy information in 5G |
software & hardware ecosystem . Therefore , a well-received |
network |
assessment procedure and tools are seemed to be possible |
The 5G network provides customized network services |
approaching , by which all vendors could follow a standard |
( including slice customization or selection ) for users by |
procedure to test their network function units . |
sensing their service features . However , privacy |
Security assessment is feasible only if specific and |
information , such as user health information and |
measurable security metrics are figured out for each |
location , may be utilized in the service type sensing |
network function unit . For instance , the metrics could be |
process . To protect user privacy , a service sensing rule |
the password length and its complexity . An important point |
must be clearly defined for the 5G network to address |
to note is that the way for defining and 5 G 5G Security : |
users ' concerns about privacy . The method must |
Forward Thinking measuring these security metrics . |
stipulate how the privacy information is used and how |
Security metrics that are standardized and well received |
it is handled after being used . |
could help in the case that even third-party test bodies can |
Ÿ More rigorous privacy protection scheme in 5G |
effectively assess network function units . |
network |
To support dynamic service deployment as well as |
In a heterogeneous network where multiple access |
automatic service rollout , deployment , and management , |
technologies are used , the protection for user privacy |
network units that pass the security assessment can be |
information varies depending on the access technology . |
granted a certificate and an electric signature for automatic |
In addition , the 5G network is one that runs over |
verification upon integration . To keep track of security |
multiple types of network . User data may traverse |
risks , it is nice that security management maintenance be |
various access networks and network functional entities |
performed on a regular basis during business operations |
supplied by different vendors . As a result , it ’ s possible |
that security measures can be taken on a timely manner in |
that user privacy information could exist in any corner |
the event of an incident . |
of the networks . With data mining technologies , a 3rdparty |
Low-Delay Mobility Security
Emerging of delay-sensitive applications such as vehicles
|
may be able to derive detailed user privacy information through analysis on the disperse user |
network and remote surgery have communication |
privacy data . Therefore , it ’ s time to have privacy |
scenarios characterized by low-delay and high-security . In |
information exposure risks thoroughly considered in the |
these scenarios , the 5G network may need to support high |
5G network . |
reliability while providing QoS guarantee with a delay not | |
more than 1 millisecond , so as to prevent accidents such as |