Blog Posts Business Management

Nuts and Bolts of 5G Security: Technologies, Architectures, Use-cases, Standards & Policies

Blog: NASSCOM Official Blog

With recent 5G enabled flagship phone launches, everyone believes that we have moved one step closer to the wide adoption of this technology.  While the current 4G technology can handle voice, video stream, web browsing, and text quite well, our connectivity needs have changed over time.

The users are now adopting many connected features – home automation and connected cars, that has essentially changed the way we have been interacting with our phones. Thus, the need for new development around higher speed and lower latency. Experts believe that 5G technology will be 20 times faster and will have 120 times less latency than the current 4G technology.

Experts have been categorizing the application areas of 5G under 3 categories – Community perspective, Industry perspective, and overall experience perspective. Some of the examples under each of the header are as follows:

With higher speed and lower latency comes the cybersecurity challenges. Some of the most anticipated security concerns in 5G are over-strain on security monitoring, given the increased bandwidth of the network, multiple entry points and hence increase in attack surface. IoT and connected devices will increase the volume of network traffic further.

Given the slow pace of development of protocols and standards in IoT devices, the security concerns arising from 5G cannot be ignored. Organizations such as 3GPP, ETSI, and IETF have already begun their work on securing the 5G space across 3 layers:

At the upcoming Annual Information Security Summit 2020 (AISS 2020), DSCI will be hosting a session on understanding the technologies, architecture, use-cases, standards, and policies around securing 5G.

The session is most relevant for technologies and security enthusiast from Telecom sector, Wireless and network security and Hardware security domains, officials from Government, CISOs, CIOs and CTOs from the industry.

Visit AISS2020 page to know more about AISS overview, key sessions, highlights, who should attend & register for freehttps://www.dsci.in/events/aiss-2020/

The post Nuts and Bolts of 5G Security: Technologies, Architectures, Use-cases, Standards & Policies appeared first on NASSCOM Community |The Official Community of Indian IT Industry.

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/nuts-and-bolts-of-5g-security-technologies-architectures-use-cases-standards-policies/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×