5G is the next generation telecommunication standard that is expected to be officially deployed in 2020, but South Korea has already demonstrated it in the 2018 Winter Olympics. It is the fifth generation wireless broadband technology based on the IEEE 802.11ac standard. The premise of 5G is to blur the differences between wireless and wired networking to facilitate the growing mobility of network users.

5G will provide broadband access everywhere, entertain higher user mobility and enable connectivity of massive number of devices such as Internet of Things (IoT) devices in a reliable and affordable way. Technology enablers such as cloud computing, Network Function Virtualization (NFV) and Software Defined Networking (SDN) are maturing in their use of 5G.

But in a 5G business environment, the rise of new business, new architecture, and innovative technologies will present new challenges to security and privacy protection where security is a necessary enabler for continuity of the business.

Security challenge ahead of 5G

  • New business models – Compared to traditional communication network which is limited to improving individual communication, 5G network is about serving vertical industries from which a diverse set of services will emerge.

The security demands are also going to vary among the services. Consider the mobile IoT devices that need lightweight security while high speed mobile services demand efficient mobile security. Therefore, there is a need for more stringent authentication methods to prevent unauthorized access to IoT devices. For example, biometric identification could be part of the authentication in smart homes.

  • IT driven Network Architecture – New IT technologies like virtualization, Software Defined Network (SDN) and Network Functions Virtualization (NFV) are projected as a way to make 5G networks agile and efficient but less costly.

Implementing 5G network and infrastructure security will be different as isolation of the virtual network elements (NEs) in the cloud-based infrastructure should also be considered. Based on the network virtualization technology, a network could be built on different virtual network slices, with each slice handling a particular service requirement. 5G security design may need to consider issues like how to isolate, deploy, and manage virtual network slices securely.

  • Heterogenous access – Given the various technologies by which networks can be accessed (directly, Wi-Fi, LTE, via a gateway ) security designers need to build security architecture that’s suitable for different access technologies.
  • Privacy Protection – With the advances of mobile Internet, more and more vertical industries, including health care, smart home, and smart transport, will resort to 5G networks. The data that is being sent over the network include personal information that can be obtained to hack into the personal lives of the users. As a differentiator, networks may need to sense what type of service a user is using. The service type sensing may involve user privacy. Add all this together and privacy protection in 5G is more challenging.

Are you geared up for 5G technology and security?

Most probably not yet. However, major network organizations are already on their way for deploying 5G by 2020. In principle, 5G technology is secure, but the main issue in terms of privacy and security is at the application level where the apps are dealing with data collection and transferring your data.

The arrival of 5G will enable many sectors, including automotive and healthcare, to leverage the Internet of Things to deliver product and service innovations. As 5G systems are going to be service-oriented, it is not sufficient for the legacy systems to be upgraded to accommodate the 5G security constraints. This requires a complete overhaul of the security architecture with emphasis on privacy, data/network security from the angle of services. It has to be implemented at the design level of the security architecture.

GAVS Technologies offer advisory services with respect to network security and infrastructure changes needed to be future ready for 5G technologies as part of your business strategies. The inclusion of multiple cloud based IT environments and edge computing makes for a decentralized network that allow operators to deliver services closer to the customers, thus reducing network congestion and improving the performance of applications.

GAVS will help businesses to answer questions like

  • Whether 5G security and privacy solutions will cover the service layer in addition to the access layer
  • Whether to extend the role of end-to-end protection mechanisms from those of earlier generations
  • Whether to aim for extended protection of identity and location privacy against active attackers

There will be a fast growing need for secure infrastructure, including stringent identity management and data protection as well as a vast array of system level protections in place to defend against distributed denial of service (DDoS) and other network or cyberattacks.

GAVS’ is positioned to address the security requirements of its clients with a wide range of solutions to protect every aspect of their businesses as 5G technology becomes available. Know the feasibility of 5G adoption for your organization with a chat with our security experts here: https://www.gavstech.com/reaching-us/