• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
5G Security Standards Improve on Their Predecessors

5G Security Standards Improve on Their Predecessors

June 14, 2022
Uganda: Cabinet approves Kiswahili as official language, to be compulsory taught in primary and secondary schools

Uganda: Cabinet approves Kiswahili as official language, to be compulsory taught in primary and secondary schools

July 5, 2022
Uganda’s Prof Ouma Named Head of Neurosciences at Top South African University

Uganda’s Prof Ouma Named Head of Neurosciences at Top South African University

July 5, 2022
Monkeypox cases top 5,000 – WHO

Monkeypox cases top 5,000 – WHO

July 5, 2022
Raychelle Omamo Joins Race to Head IFAD in Rome

Raychelle Omamo Joins Race to Head IFAD in Rome

July 5, 2022
Russia warns West about fate of weapons sent to Ukraine

Russia warns West about fate of weapons sent to Ukraine

July 5, 2022
Over 650 new Congolese refugees cross to Uganda as fighting intensifies – The Informer UG

Another 713 Congolese refugees cross to Uganda after heavy bombing near Bunagana border – The Informer UG

July 5, 2022

First time filmmakers to bag Sh74m from the iKon awards – Kampala Sun

July 5, 2022

Companion Robot Responds to User’s Emotional Cues, Health Needs

July 5, 2022
Museveni lauds cooperative societies for transforming communities 

Museveni lauds cooperative societies for transforming communities 

July 5, 2022
Man Arrested for Extorting Ugx 600,000 from 7 Prisoners Held for Being Part of a Muslim Extremist Group

Man Arrested for Extorting Ugx 600,000 from 7 Prisoners Held for Being Part of a Muslim Extremist Group

July 5, 2022
Widow arrested over murder of  Kayunga intelligence officer

Police arrest man for murder of neighbour’s child for ritual purposes

July 5, 2022

Dispense Justice with Utmost Fairness – CJ Dollo Tells New Judicial Officers

July 5, 2022
ADVERTISEMENT
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Tuesday, July 5, 2022
  • Login
UGNEWS24
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • News
    • All
    • Business

    A beginner’s guide to the legendary Tim Tam biscuit, now available in America

    You can now play Bill Gates’ first PC game and run over donkeys on your iPhone, Apple Watch

    Indonesia’s largest fleet of taxis teams up to beat ride-hailing apps

    Instagram is testing photo albums, because nothing is sacred anymore

    7 February games you should get excited about

    Make yourself feel better by laughing at January’s best news bloopers

    Trump-May special relationship gets special treatment in the streets of London

    GoPro’s Karma drone is back on sale after design flaw made them fall out of the sky

    Of course this novelty ‘Final Fantasy’ fork is an oversized sword replica

    House Republicans Vote to End Rule Stopping Coal Mining Debris From Being Dumped in Streams

    Trending Tags

    • Donald Trump
    • Future of News
    • Climate Change
    • Market Stories
    • Election Results
    • Flat Earth
  • Tech

    Trending Tags

    • Flat Earth
    • Sillicon Valley
    • Mr. Robot
    • MotoGP 2017
    • Golden Globes
    • Future of News
  • Entertainment
  • Lifestyle
    • All
    • Food
    • Recipes
    • Travel

    Rap group call out publication for using their image in place of ‘gang’

    Meet the woman who’s making consumer boycotts great again

    New campaign wants you to raise funds for abuse victims by ditching the razor

    Betterment moves beyond robo-advising with human financial planners

    Trump’s H-1B Visa Bill spooks India’s IT companies

    Magical fish basically has the power to conjure its own Patronus

    Getting There is Half the FUN!

    Goa Tourism Appealing Visitors From Across the Globe

    Fontainebleau A Forgotten Treasure

    I know it hurts to say goodbye, but it is time for me to fly

    Trending Tags

    • Golden Globes
    • Mr. Robot
    • MotoGP 2017
    • Climate Change
    • Flat Earth
No Result
View All Result
UGNEWS24
No Result
View All Result
Home Politics

5G Security Standards Improve on Their Predecessors

by admin
June 14, 2022
in Politics
0
5G Security Standards Improve on Their Predecessors
492
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

5G Security Architecture Inherits 4G Security Architecture

Currently, 3GPP SA3 has developed 5G R16 security standards and is developing 5G R17 security standards. To ensure that 5G standards move ahead consistently at all technical levels, the 3GPP is developing security standards at the same pace as that of architecture and wireless standards. 5G R15 standards have defined security architectures and security standards for eMBB scenarios, covering Standalone (SA) and Non-Standalone (NSA) architectures. Based on the 5G R15 security architecture, 5G R16 and R17 standards will cover security optimization for mMTC and URLLC scenarios, and provide further enhancements to the security infrastructure.
The security architecture of mobile networks is hierarchical and classified by domain in design. The 5G security architecture contains the following security domains: network access security, network domain security, user domain security, application domain security, SBA security, and visibility and configurability of security, where SBA security is a new security domain in 5G. SBA security is the set of security features that enable network functions of the SBA architecture to securely communicate within the serving network domain and with other network domains. These features include network function registration, discovery, and authorization security aspects, as well as protection for service-based interfaces. An SBA forms the basis of the 5G core network. To ensure security between UEs in the SBA, security mechanisms such as Transport Layer Security (TLS) and Open Authorization (OAuth) are needed.
The 5G network inherits the 4G network security framework, but provides enhanced security features. The 5G access and core networks have clear boundaries. Even though some 5G core network functions (such as the User Plane Function [UPF]) are moving closer to applications, they are still part of the 5G core network and therefore comply with its traffic distribution policy. The access and core networks interconnect through standard protocols, support inter-vendor interoperability, and have standards-based security protection mechanisms.
 

                            </a>

Security Hardening of 5G Standards over 4G Standards

The 5G SA network supports more security features to tackle potential security challenges in the future 5G lifecycle. 5G NSA and 4G networks share the same security mechanisms and work in standard and practice consistently to keep improving their security levels. R15 defined the following 5G security hardening features: 

Stronger air interface security: In addition to user data encryption on 2G, 3G, and 4G networks, the 5G SA architecture provides user data integrity protection to prevent user data from being tampered with. 

Enhanced user privacy protection: In 2G, 3G, and 4G networks, users’ permanent IDs (international mobile subscriber identities — IMSIs), are transmitted in plain text over the air interface. Attackers can exploit this vulnerability using IMSI catcher attacks to track users. In 5G networks, users’ permanent IDs (in this case, subscription permanent identifiers [SUPIs]) are transmitted in ciphertext to defend against such attacks.

Better roaming security: Operators usually need to set up connections via third-party operators. Attackers can forge legitimate core network nodes to initiate Signaling System 7 and other attacks by manipulating third-party operators’ devices. 5G SBA defines Security Edge Protection Proxy (SEPP) to implement security protection for inter-operator signaling at the transport and application strata. This prevents third- party operators’ devices from tampering with sensitive data (e.g. key, user ID, and SMS) exchanged between core networks. 

Enhanced cryptographic algorithms: 5G R15 standards currently define security mechanisms such as 256-bit key transmission. Future 5G standards will support 256-bit cryptographic algorithms to ensure that such algorithms used on 5G networks are sufficiently resistant to attacks by quantum computers. 

In R16 and R17, the existing security infrastructure was further optimized by enhancing SBA security, providing user-plane integrity protection for 5G NSA and 4G networks, and other means. 

Enhanced SBA security: The new SBA architecture of the 5G core network provides network functions as services. The relevant standard defines service security mechanisms for the architecture, including finer-grained authorization between network functions (NFs) and stronger protection for user-plane data transmission between operators, which ensures the security of data transmission on the signaling and user planes of the core network. 

User-plane integrity protection for 5G NSA and 4G networks: The user-plane integrity protection mechanism of 5G SA networks is introduced to 5G NSA and 4G networks to enhance air interface security.

Figure: 5G security hardening features
As standards evolve, 5G cyber security features continue to be expanded and enhanced to tackle potential security challenges and enhance security throughout the 5G lifecycle.

Vertical Industries Empowered by 5G Standards Security

Based on R15’s basic security architecture, R16 and R17 provided diversified and customized security features for vertical industries, for example, security of small data transmission on IoT devices, security of redundant session transmission in URLLC, authentication and authorization for slices, and flexible authentication for multiple forms of private networks, to meet diversified security requirements of different industries and open up 3GPP security capabilities to third parties. 

Cellular Internet of Things (CIoT) data transmission security: Defined secure transmission and simplified mobility protection mechanisms for small data transmission to meet requirements for user data protection on IoT devices in unique small-scale data transmission scenarios. Redundant session transmission security: Defined equivalent user-plane security policies of the redundant session transmission mechanism to implement the same level of security protection for two user sessions during redundant transmission in high-reliability and low-latency scenarios. 

Slice access security: Defined the authentication and authorization process for slice access from UEs to meet vertical industries’ requirements for controllable user access and authorization when using 5G networks.

Private network authentication security: Defined authentication modes in different enterprise private network forms to flexibly meet different industries’ authentication requirements. In the public network integrated non-public network (PNI-NPN), for example, in scenarios where a slice provided by the operator is used to access a private network, slice authentication can be used to authenticate and authorize access from vertical industry users. When the data network provided by the operator is used to access a private network, enterprises authenticate and authorize vertical industry users. For independent private networks, initial authentication modes (EAP framework) other than symmetric authentication are introduced for UEs. 

Security capability openness: Used the basic key provided on operators’ networks to protect the data transmission of third-party applications, and provided a security capability openness framework for third-party services to use operators’ networks. 5G networks provide mobile network services for more and more vertical industries. The security of 5G networks addresses potential security challenges to services.

5G Security Assessment Becoming Standardized

Cyber security assessment mechanisms shall follow globally accepted uniform standards to ensure that their operations are cost-effective and sustainable for the ecosystem. NESAS jointly defined by the GSMA and 3GPP has been used to assess the security of mobile network equipment.
It provides an industry-wide security assurance framework to improve security across the mobile industry. NESAS defines the security requirements and assessment framework for security product development and lifecycle processes, and uses security test cases in the Security Assurance Specifications (SCAS) defined by 3GPP to assess the security of network equipment. Currently, 3GPP has initiated security evaluation of multiple 5G network equipment, and major equipment vendors and operators are actively participating in the NESAS standard formulation. NESAS promotes security cooperation and mutual trust in the global mobile communications industry, and enables operators, equipment vendors, and other stakeholders to jointly promote 5G security construction. It provides customized, authoritative, efficient, unified, open, and constantly evolving cyber security assessment standards for the communications industry, and is a good reference for stakeholders such as operators, equipment vendors, and government regulators.
Huawei R&D focuses heavily on security throughout product development, adhering to the principle of security by design and security in process.
Cyber security activities built into the process are performed in strict compliance throughout the entire product lifecycle, so that security requirements can be implemented in each phase. Huawei R&D provides the Integrated Product Development (IPD) process to guide end to end (E2E) product development. Since 2010, Huawei has started to build cyber security activities into the IPD process according to industry security practices and standards such as OWASP’s Open Software Assurance Maturity Model (OpenSAMM), Building Security In Maturity Model (BSIMM), Microsoft Security Development Lifecycle (SDL), and NIST CSF as well as cyber security requirements of customers and governments. Such activities include security requirement analysis, security design, security development, security test, secure release, and vulnerability management. Check points are used in the process to ensure that security activities are effectively implemented in product and solution development.
This practice improves the robustness of products and solutions, enhances privacy protection, and ensures Huawei provides customers with secure products and solutions.
Report is from Huawei Uganda CSPO Mr. Kevin.
 

Do you have a story in your community or an opinion to share with us: Email us at editorial@watchdoguganda.com

Share this:

  • Twitter
  • More
  • Facebook

Like this:

Like Loading...
Tags: a kagoma bobi winebbc news bobi wine ugandabobi winebobi wine academic papersbobi wine agebobi wine and besigyebobi wine and familybobi wine and his familybobi wine and kenzobobi wine and musevenibobi wine arua newsbobi wine at cbsbobi wine bikwase kyagulanyibobi wine biographybobi wine bobi wangebobi wine breaking newsbobi wine breaking news todaybobi wine brothers and sistersbobi wine bukedde newsbobi wine bus duniabobi wine by farbobi wine byekwaasobobi wine byekwasobobi wine cbobi wine calorinalbobi wine campaignbobi wine carsbobi wine childrenbobi wine concertbobi wine concert 2020bobi wine contactsbobi wine credentialsbobi wine educationbobi wine housebobi wine in jinjabobi wine net worthbobi wine newsbobi wine news aljazeerabobi wine news bbcbobi wine news latestbobi wine news nowbobi wine news now livebobi wine news now todaybobi wine news todaybobi wine news today in ugandabobi wine news today videobobi wine news today youtubebobi wine news ugandabobi wine news updatesbobi wine news updates todaybobi wine news yesterdaybobi wine nonstopbobi wine online concertbobi wine songsbobi wine todaythe watchdog news ugandawatchdog latest news about hhwatchdog news appwatchdog news latestwatchdog news networkwatchdog news powaiwatchdog news south africawatchdog news sri lankawatchdog news ugandawatchdog news.orgwatchdog newspaperwatchdog newspaper imo statezambian watchdog news all today
Share197Tweet123Share49
admin

admin

  • Trending
  • Comments
  • Latest
FRED LUMBUYE LATEST VIDEO AS HE TALKS ABOUT POLITICAL SITUATION IN UGANDA

FRED LUMBUYE LATEST VIDEO AS HE TALKS ABOUT POLITICAL SITUATION IN UGANDA

February 14, 2021
Saucy MUBS student Paula leaks nude video while pleasing herself

Saucy MUBS student Paula leaks nude video while pleasing herself

June 13, 2021
BAMBI! Rema ali mu kutya, obufumbo bwolekedde okusanawo, bigaanye

BAMBI! Rema ali mu kutya, obufumbo bwolekedde okusanawo, bigaanye

March 28, 2021
MP Nsereko's look alike accuses Pr Yiga of misleading him | Live Wire

MP Nsereko's look alike accuses Pr Yiga of misleading him | Live Wire

50
Jacob Omutuuze slams Kasuku, Sendi over tribalism sentiments

Jacob Omutuuze slams Kasuku, Sendi over tribalism sentiments

50
Big Eye says Eddy Kenzo made a wrong move attacking Bobi Wine

Big Eye says Eddy Kenzo made a wrong move attacking Bobi Wine

49
Uganda: Cabinet approves Kiswahili as official language, to be compulsory taught in primary and secondary schools

Uganda: Cabinet approves Kiswahili as official language, to be compulsory taught in primary and secondary schools

July 5, 2022
Uganda’s Prof Ouma Named Head of Neurosciences at Top South African University

Uganda’s Prof Ouma Named Head of Neurosciences at Top South African University

July 5, 2022
Monkeypox cases top 5,000 – WHO

Monkeypox cases top 5,000 – WHO

July 5, 2022
UGNEWS24

Copyright © 2017 JNews.

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • Politics
    • Business
    • World
    • Science
  • Entertainment
    • Gaming
    • Music
    • Movie
    • Sports
  • Tech
    • Apps
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Food
    • Fashion
    • Health
    • Travel

Copyright © 2017 JNews.

Welcome Back!

Sign In with Facebook
OR

Login to your account below

Forgotten Password?

Create New Account!

Sign Up with Facebook
OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
%d bloggers like this: