Nuts and Bolts of 5G Security: Technologies, Architectures, Use-cases, Standards & Policies
Blog: NASSCOM Official Blog
With recent 5G enabled flagship phone launches, everyone believes that we have moved one step closer to the wide adoption of this technology. While the current 4G technology can handle voice, video stream, web browsing, and text quite well, our connectivity needs have changed over time.
The users are now adopting many connected features – home automation and connected cars, that has essentially changed the way we have been interacting with our phones. Thus, the need for new development around higher speed and lower latency. Experts believe that 5G technology will be 20 times faster and will have 120 times less latency than the current 4G technology.
Experts have been categorizing the application areas of 5G under 3 categories – Community perspective, Industry perspective, and overall experience perspective. Some of the examples under each of the header are as follows:
- Community perspective: Connected cars, efficient services, smart power grids, etc.
- Industry perspective: Logistics, Healthcare, Agriculture sectors will reap the benefits of the technology
- End-user perspective: AR/VR, sensory experience, and reliable connectivity are some of the examples.
With higher speed and lower latency comes the cybersecurity challenges. Some of the most anticipated security concerns in 5G are over-strain on security monitoring, given the increased bandwidth of the network, multiple entry points and hence increase in attack surface. IoT and connected devices will increase the volume of network traffic further.
Given the slow pace of development of protocols and standards in IoT devices, the security concerns arising from 5G cannot be ignored. Organizations such as 3GPP, ETSI, and IETF have already begun their work on securing the 5G space across 3 layers:
- Enhanced Authentication framework in 5G
- Improved subscriber privacy features
- Higher protocol layer security mechanism that will secure service-based interfaces
At the upcoming Annual Information Security Summit 2020 (AISS 2020), DSCI will be hosting a session on understanding the technologies, architecture, use-cases, standards, and policies around securing 5G.
The session is most relevant for technologies and security enthusiast from Telecom sector, Wireless and network security and Hardware security domains, officials from Government, CISOs, CIOs and CTOs from the industry.