Scigazette Monthly Read February issue of Scigazette magazine | Page 18

traditional private network , only in this way the users are
vehicle collision and surgical operation errors . Further , with
willing to store the private data on cloud , and then they
the deployment of ultra-dense deployment technologies in
could freely access their private data without concern
the 5G network , when a vehicle is on the move , mobility
about the security risk on the data .
management procedure can occur frequently . Considering
Security Assessment
the delay requirement , the mobility management-specific
5G needs an open platform to support a vast array of
functional entities and processes need to be optimized .
services from vertical industries , for instance , remote
To address these new challenges , mobility security may be
health care , Internet of Vehicle ( IoV ), and IoT . The platform
redesigned and optimized for the 5G network to build an
can be further divided into units based on the functions .
efficient , lightweight , and compatible mobility
Different software or hardware vendors can contribute
management mechanism to meet the more stringent delay
their own strength in the development of the units . In this
requirements .
way , the service deployment can be more rapid and the
User Privacy Protection
operating cost can be reduced .
As 5G networks will serve a large number of vertical
To build an open software & hardware ecosystem , it is
industries . This indicates that a great amount of user
essential that network function units from different
privacy information will be carried over the 5G network
vendors are interoperable via standard interfaces . All
also . Any information leak may lead to severe
network function units may need to attest to each other
consequences . With advancements in data mining
that they are secure , so that when they are integrated into
technologies , retrieval of user privacy information has been
a platform , a high level of platform security could be
made easier . Therefore , user privacy information must be
achieved . A traditional way to assess their security strength
securely protected in the 5G network so that users and
is that vendors sign a trust agreement and then test
vertical industries can use the network without worrying
security performance of each other . However , the testing
about information leakage .
model is expensive and impedes the growth of the open
Ÿ Usage management of privacy information in 5G
software & hardware ecosystem . Therefore , a well-received
network
assessment procedure and tools are seemed to be possible
The 5G network provides customized network services
approaching , by which all vendors could follow a standard
( including slice customization or selection ) for users by
procedure to test their network function units .
sensing their service features . However , privacy
Security assessment is feasible only if specific and
information , such as user health information and
measurable security metrics are figured out for each
location , may be utilized in the service type sensing
network function unit . For instance , the metrics could be
process . To protect user privacy , a service sensing rule
the password length and its complexity . An important point
must be clearly defined for the 5G network to address
to note is that the way for defining and 5 G 5G Security :
users ' concerns about privacy . The method must
Forward Thinking measuring these security metrics .
stipulate how the privacy information is used and how
Security metrics that are standardized and well received
it is handled after being used .
could help in the case that even third-party test bodies can
Ÿ More rigorous privacy protection scheme in 5G
effectively assess network function units .
network
To support dynamic service deployment as well as
In a heterogeneous network where multiple access
automatic service rollout , deployment , and management ,
technologies are used , the protection for user privacy
network units that pass the security assessment can be
information varies depending on the access technology .
granted a certificate and an electric signature for automatic
In addition , the 5G network is one that runs over
verification upon integration . To keep track of security
multiple types of network . User data may traverse
risks , it is nice that security management maintenance be
various access networks and network functional entities
performed on a regular basis during business operations
supplied by different vendors . As a result , it ’ s possible
that security measures can be taken on a timely manner in
that user privacy information could exist in any corner
the event of an incident .
of the networks . With data mining technologies , a 3rdparty
Low-Delay Mobility Security
Emerging of delay-sensitive applications such as vehicles
may be able to derive detailed user privacy information through analysis on the disperse user
network and remote surgery have communication
privacy data . Therefore , it ’ s time to have privacy
scenarios characterized by low-delay and high-security . In
information exposure risks thoroughly considered in the
these scenarios , the 5G network may need to support high
5G network .
reliability while providing QoS guarantee with a delay not
more than 1 millisecond , so as to prevent accidents such as
Scigazette | 18 | February , 2017