Scigazette Monthly Read February issue of Scigazette magazine | Page 18

traditional private network, only in this way the users are
vehicle collision and surgical operation errors. Further, with
willing to store the private data on cloud, and then they
the deployment of ultra-dense deployment technologies in
could freely access their private data without concern
the 5G network, when a vehicle is on the move, mobility
about the security risk on the data.
management procedure can occur frequently. Considering
Security Assessment
the delay requirement, the mobility management-specific
5G needs an open platform to support a vast array of
functional entities and processes need to be optimized.
services from vertical industries, for instance, remote
To address these new challenges, mobility security may be
health care, Internet of Vehicle( IoV), and IoT. The platform
redesigned and optimized for the 5G network to build an
can be further divided into units based on the functions.
efficient, lightweight, and compatible mobility
Different software or hardware vendors can contribute
management mechanism to meet the more stringent delay
their own strength in the development of the units. In this
requirements.
way, the service deployment can be more rapid and the
User Privacy Protection
operating cost can be reduced.
As 5G networks will serve a large number of vertical
To build an open software & hardware ecosystem, it is
industries. This indicates that a great amount of user
essential that network function units from different
privacy information will be carried over the 5G network
vendors are interoperable via standard interfaces. All
also. Any information leak may lead to severe
network function units may need to attest to each other
consequences. With advancements in data mining
that they are secure, so that when they are integrated into
technologies, retrieval of user privacy information has been
a platform, a high level of platform security could be
made easier. Therefore, user privacy information must be
achieved. A traditional way to assess their security strength
securely protected in the 5G network so that users and
is that vendors sign a trust agreement and then test
vertical industries can use the network without worrying
security performance of each other. However, the testing
about information leakage.
model is expensive and impedes the growth of the open
Ÿ Usage management of privacy information in 5G
software & hardware ecosystem. Therefore, a well-received
network
assessment procedure and tools are seemed to be possible
The 5G network provides customized network services
approaching, by which all vendors could follow a standard
( including slice customization or selection) for users by
procedure to test their network function units.
sensing their service features. However, privacy
Security assessment is feasible only if specific and
information, such as user health information and
measurable security metrics are figured out for each
location, may be utilized in the service type sensing
network function unit. For instance, the metrics could be
process. To protect user privacy, a service sensing rule
the password length and its complexity. An important point
must be clearly defined for the 5G network to address
to note is that the way for defining and 5 G 5G Security:
users ' concerns about privacy. The method must
Forward Thinking measuring these security metrics.
stipulate how the privacy information is used and how
Security metrics that are standardized and well received
it is handled after being used.
could help in the case that even third-party test bodies can
Ÿ More rigorous privacy protection scheme in 5G
effectively assess network function units.
network
To support dynamic service deployment as well as
In a heterogeneous network where multiple access
automatic service rollout, deployment, and management,
technologies are used, the protection for user privacy
network units that pass the security assessment can be
information varies depending on the access technology.
granted a certificate and an electric signature for automatic
In addition, the 5G network is one that runs over
verification upon integration. To keep track of security
multiple types of network. User data may traverse
risks, it is nice that security management maintenance be
various access networks and network functional entities
performed on a regular basis during business operations
supplied by different vendors. As a result, it’ s possible
that security measures can be taken on a timely manner in
that user privacy information could exist in any corner
the event of an incident.
of the networks. With data mining technologies, a 3rdparty
Low-Delay Mobility Security
Emerging of delay-sensitive applications such as vehicles
may be able to derive detailed user privacy information through analysis on the disperse user
network and remote surgery have communication
privacy data. Therefore, it’ s time to have privacy
scenarios characterized by low-delay and high-security. In
information exposure risks thoroughly considered in the
these scenarios, the 5G network may need to support high
5G network.
reliability while providing QoS guarantee with a delay not
more than 1 millisecond, so as to prevent accidents such as
Scigazette | 18 | February, 2017