traditional private network, only in this way the users are |
vehicle collision and surgical operation errors. Further, with |
willing to store the private data on cloud, and then they |
the deployment of ultra-dense deployment technologies in |
could freely access their private data without concern |
the 5G network, when a vehicle is on the move, mobility |
about the security risk on the data. |
management procedure can occur frequently. Considering |
Security Assessment |
the delay requirement, the mobility management-specific |
5G needs an open platform to support a vast array of |
functional entities and processes need to be optimized. |
services from vertical industries, for instance, remote |
To address these new challenges, mobility security may be |
health care, Internet of Vehicle( IoV), and IoT. The platform |
redesigned and optimized for the 5G network to build an |
can be further divided into units based on the functions. |
efficient, lightweight, and compatible mobility |
Different software or hardware vendors can contribute |
management mechanism to meet the more stringent delay |
their own strength in the development of the units. In this |
requirements. |
way, the service deployment can be more rapid and the |
User Privacy Protection |
operating cost can be reduced. |
As 5G networks will serve a large number of vertical |
To build an open software & hardware ecosystem, it is |
industries. This indicates that a great amount of user |
essential that network function units from different |
privacy information will be carried over the 5G network |
vendors are interoperable via standard interfaces. All |
also. Any information leak may lead to severe |
network function units may need to attest to each other |
consequences. With advancements in data mining |
that they are secure, so that when they are integrated into |
technologies, retrieval of user privacy information has been |
a platform, a high level of platform security could be |
made easier. Therefore, user privacy information must be |
achieved. A traditional way to assess their security strength |
securely protected in the 5G network so that users and |
is that vendors sign a trust agreement and then test |
vertical industries can use the network without worrying |
security performance of each other. However, the testing |
about information leakage. |
model is expensive and impedes the growth of the open |
Ÿ Usage management of privacy information in 5G |
software & hardware ecosystem. Therefore, a well-received |
network |
assessment procedure and tools are seemed to be possible |
The 5G network provides customized network services |
approaching, by which all vendors could follow a standard |
( including slice customization or selection) for users by |
procedure to test their network function units. |
sensing their service features. However, privacy |
Security assessment is feasible only if specific and |
information, such as user health information and |
measurable security metrics are figured out for each |
location, may be utilized in the service type sensing |
network function unit. For instance, the metrics could be |
process. To protect user privacy, a service sensing rule |
the password length and its complexity. An important point |
must be clearly defined for the 5G network to address |
to note is that the way for defining and 5 G 5G Security: |
users ' concerns about privacy. The method must |
Forward Thinking measuring these security metrics. |
stipulate how the privacy information is used and how |
Security metrics that are standardized and well received |
it is handled after being used. |
could help in the case that even third-party test bodies can |
Ÿ More rigorous privacy protection scheme in 5G |
effectively assess network function units. |
network |
To support dynamic service deployment as well as |
In a heterogeneous network where multiple access |
automatic service rollout, deployment, and management, |
technologies are used, the protection for user privacy |
network units that pass the security assessment can be |
information varies depending on the access technology. |
granted a certificate and an electric signature for automatic |
In addition, the 5G network is one that runs over |
verification upon integration. To keep track of security |
multiple types of network. User data may traverse |
risks, it is nice that security management maintenance be |
various access networks and network functional entities |
performed on a regular basis during business operations |
supplied by different vendors. As a result, it’ s possible |
that security measures can be taken on a timely manner in |
that user privacy information could exist in any corner |
the event of an incident. |
of the networks. With data mining technologies, a 3rdparty |
Low-Delay Mobility Security
Emerging of delay-sensitive applications such as vehicles
|
may be able to derive detailed user privacy information through analysis on the disperse user |
network and remote surgery have communication |
privacy data. Therefore, it’ s time to have privacy |
scenarios characterized by low-delay and high-security. In |
information exposure risks thoroughly considered in the |
these scenarios, the 5G network may need to support high |
5G network. |
reliability while providing QoS guarantee with a delay not | |
more than 1 millisecond, so as to prevent accidents such as |