AI Business is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

Sponsored By

5G Core

5G success requires security by design

by Blogs & Opinions
Article Image The brave new world of 5G ecosystems

5G is much more than just a new technology that offers more bandwidth. With 5G comes an entire new world of ecosystems, such as:

Smart Cities: Cities where information technology and the Internet of Things (IoT) are used to improve the control and management of the city. The goal here is to increase quality of life by organizing the city more efficiently and lowering the barrier between civilians and the government.

Smart Homes: Integrating different techniques such as home automation, sensors, WiFi and smartphones into a household, to improve the quality and efficiency of tasks at home.

Smart Health: Healthcare applications are endless and can be divided into different categories such as prevention, monitoring, first aid and hospitals. For example, wearables and insulin pumps make sure our most valuable health issues are being monitored and that the blood sugar levels of diabetes patients are kept stable, for example. At the same time, there will be sensors and digital filing systems that support and ease the working life of doctors and nurses.

Smart Workplace: The digital workplace in 2020 has no limits. Applications and information must be available from any place, via any device, at any time. Information should be easily exchangeable between departments so people can work more efficiently and quickly.

Continuous rise of users and connections
There are currently almost 5.2 billion unique mobile users, which is expected to grow to 5.8 billion users by 2025, according to the GSMA. When it comes to IoT, there currently are 9.3 billion connections and that is expected to grow to 25 billion connections by 2025.

This means that with the introduction of 5G, the total amount of connections, users and the number of innovative applications will increase dramatically. More attention to the security of this growing landscape is thus required. "Security by design" and its implications for 5G security is a hot topic 5G connectivity will be of major importance for several sectors, such as transport, healthcare, energy, industry and many more. For most of these applications, we will make use of network slicing and virtualization. It will be a big challenge to maintain a high level of security when at the same time the chances of being confronted with a cyber-attack are increasing.

That's why "Security by design" will have to be applied for success in 5G deployments. From deployment onward, people will have to think about how security measures should work for each domain. At the same time, the first virtualized networks are now live, but not to the same extent as they will be with 5G. Security by design allows us to control the security of these networks before they are used on a larger scale and complexity increases.

5G interoperability with LTE and 3G
As with the roll out of 4G, national 5G coverage will take a few years to become a reality. This means that we face a major challenge: to ensure that the handover between related technologies runs smoothly without impacting the services provided.

Think of a 5G-ready self-driving car: when leaving the city, it could lose its 5G connection when it switches to 4G. This could lead to serious and dangerous situations. For this reason, all scenarios must be considered, and the necessary infrastructure must be deployed to ensure the continuous and seamless communication between technologies.

Protection wherever you may roam...
5G services should not only be offered to the home network but must also be available when a customer or device leaves the home network. In this case, an operator must primarily consider the security of the roaming interfaces. In the 5G Core architecture, the emphasis is on security, such as the compulsory use of TLS as a transport layer. But we cannot ignore the fact that the use of an Internet-based HTTP protocol in the 5G Core presents a threat. The HTTP protocol is widely used online and has been for decades. Hackers know the bits and bytes of this protocol. This means they can and will organize to perform advanced attacks.

Most telecom networks are 'closed' networks. They've been built on trust between operators and are therefore probably not equipped to handle advanced attacks from outside of the network. It is extremely important for operators to protect the edge of their network as soon as they want to activate roaming for their customers.

Security and superior service from day one
The challenges in 5G are comparable to those in 4G, but security for 5G use cases is more critical than ever before. Operators must ensure that the signaling function, such as SCP and SEPP, protects their 5G core. This will help them build a future-proof 5G network, provide customers with optimized services and above all: safety.

— Ditri Trio, Mobile Solutions Director, Infradata

Photo by Tim van der Kuip on Unsplash

5G Newsletter Sign Up


Sign Up