7Security
Peter Schneider
Nokia, Munich, Germany
7.1 Drivers, Requirements and High‐Level Security Vision
7.1.1 5G Security Drivers
There is broad consensus that a Fifth Generation (5G) network must be secure, in the sense that it protects the privacy of its users and the confidentiality and integrity of the traffic it transports, but also in the sense that it is protected against any kind of cyberattack that may affect the availability and integrity of the network or the confidentiality of the data it stores. This chapter outlines the 5G security drivers and requirements, and presents a 5G security vision as well as an architecture, building on material from [1]. It gives a description of the 5G security features specified by Third Generation Partnership Project (3GPP) for the 5G System, with a focus on showing the differences to Evolved Packet System (EPS). Finally, it provides a closer look at security issues that are currently not very much in the focus of 3GPP, but highly relevant for 5G networks: Secure Software Defined Networking (SDN), building on material from [29], and secure Network Function Virtualization (NFV).
Inherently, wireless communication is vulnerable and needs specific protection against interception and tampering. Consequently, since the second generation of mobile networks, Global System for Mobile communication (GSM), encryption is used on the radio interface to secure the user communication. In the next two generations of mobile networks, Universal Mobile ...
Get 5G for the Connected World now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.