Invest in Russia — invest in Russian regions!
All analytics

5G Security: Forward Thinking. Huawei White Paper

Research
26 August 2019
Безопасность связи 5G: взгляд в будущее. «Белая книга» Huawei
Source
Release date
01/18/2016
Open PDF

In this report, the authors assert that 5G security design must be an all-encompassing one to provide adequate security protection for the everything-connected world. One of the main features of the 5G technology is that it will not be confined to individual customers, as with 2G, 3G and 4G. It is not simply about having a faster mobile network or richer functions in smartphones. 5G will also serve vertical industries, from which a great diversity of new services will stem. As vertical industries are thriving — the Internet of Things (IoT), connected vehicles, augmented and virtual reality, to name but a few — they will all demand fast, ubiquitous network access. The rise of new business, new architecture and new technologies through 5G will present significant challenges for security and privacy protection.

In the context of vertical industries, security demands could vary greatly among services. For instance, mobile IoT devices only require lightweight security, while high-speed mobile services demand highly-efficient mobile security. As IoT gains momentum, more people will be able to remotely operate or «talk» to networked devices, for instance in instructing facilities in smart homes. There is a need, therefore, for a more stringent authentication method, e.g. biometrics, to prevent unauthorised access to IoT devices.

Security and privacy features for such a vast, global system as 5G must be built into the system design right from the start. Security and privacy requirements are often seen as obstacles or burdens in the system design, but ignoring them in the beginning is not cost-efficient in the long run. Adding features afterwards is less effective and often more costly than including proper mechanisms from the beginning.

The time is right to take the security of 5G infrastructures into consideration, as «virtual» new technologies, such as Software Defined Networking (SDN) and Network Functions Virtualisation (NFV), take over. Another consideration for security designers is building security architecture suitable for different access technologies. IoT devices have many choices in the way they access networks. For instance, they may connect to networks directly, or via a gateway, or in Device-to-Device (D2D) or relay fashion. Networks will also have to be able to sense what type of service a user is using, but sensing the service type may involve user privacy. With all these factors added together, privacy protection in 5G also becomes more challenging.

Anlytics on the topic

All analytics
Research
17 August 2018
5G in Russia: Prospects, strategies for developing the standard and the networks

This report by PwC covers multiple aspects of developing 5G in Russia, such as the impact of new generation telecommunications on innovative digital services, the impact of the characteristics of the new standard and the services on development strategies used by mobile network operators, and the effect of implementing 5G on the economy as a whole and on capital investments in the industry.

Research
13 June 2022
Tech Trends 2022

In this year’s Tech Trends report, Deloitte examines how enterprises are automating, abstracting, and outsourcing their business processes to tech tools in order to raise efficiency and tackle innovative projects.

Research
29 May 2019
Report on the digital economy development in Russia. Competition in the digital age: strategic challenges for Russia

The report was prepared by the International Bank for Reconstruction and Development with the participation of the World Bank and presents an assay of the best international practices related to the digital transformation which covers a broad range of issues arising in the digital transformation process in the public and private sectors and approaches of the said sectors development planning strategies in the development strategies for these sectors as a part of the digitizing.

Research
14 February 2019
The State of Industrial Cybersecurity 2018

This report published by Kaspersky Lab covers a range of issues related to factors that influence industrial cybersecurity.