business opportunities and security with 5th generation wwrf/meetings/past... · sdn nfv promoting...
TRANSCRIPT
1 © NEC Corporation 2018
Business Opportunities and Security with 5th Generation
WWRF#41; October 29 – November 1, 2018; Herning, Denmark
Dr. Anand R. Prasad, NEC Corporation
Chief Advanced Technologist, Fellow IET and IETE Chairman 3GPP SA3
Disclaimer: This presentation gives views of the author and not necessarily that of NEC or 3GPP
3 © NEC Corporation 2018
4 © NEC Corporation 2018
NEC Vision - Role of the ICT infrastructure in 5G erasocial value creation towards social solution business
5 © NEC Corporation 2018
NEC’s concept for 5G era
6 © NEC Corporation 2018
“5G. A Future Beyond Imagination.” that realizes three changes
Social Transformation
5G. A Future Beyond Imagination.
Operation Transformation
NetworkTransformation
Build/provide information infrastructure by using ICT technology of 5G era, and
advance and accelerate digital transformation (DX) of society and industry through
collaborative creation with partners.
AI
Automation
Security
E2EO
Remote operations
Advanced security
Auto driving
Transport
NW
5G Base
SDN NFV
Promoting the digitalization of society and industry, and
transforming user life and work style.
Advancing the automation of business
management, networks/IT and service
operations
Building secure networks optimized for diverse
requirements (ultra-high speed, ultra-low latency, multiple
simultaneous connections)
7 © NEC Corporation 2018
Optimization leading towards new value creation
8 © NEC Corporation 2018
Blurring of conventional business relation & arrival of
partnership business era
9 © NEC Corporation 2018
Dem
ocra
tization
User
Space
Need of “flexible architecture”
10 © NEC Corporation 2018
Enhanced Mobile Broadband (eMBB)
massive Machine Type Communication
(mMTC)
Ultra Reliable Low Latency
Communication (URLLC)
Phase 1
Phase 2
3GPP phase based 5G specification
11 © NEC Corporation 2018
(NSA) (SA)
12 © NEC Corporation 2018
User Plane
Central Unit
(Base-Station)
Control Plane(Service Based Architecture;
SBA)
DataNetwork / Service Provider
(other)
Other operator
UE
5G system – a flexible architecture
DU
13 © NEC Corporation 2018
Service based architecture UE NG-RAN UPF
AMF SMFAUSF
N3 N6
N1 N2 N4
NEFNSSF NRF PCF UDM AF
Nnssf Nnef Nnrf Npcf Nudm Naf
Nausf Namf Nsmf
SEPP
DN(Data Network)
Application
User DataManagement
PolicyControl
NetworkRepository
NetworkExxposure
NetworkSlice
Selection
AuthenticationServer
Access & Mob. Mgt.
Session Mgt.
User Plane
Security EdgeProtection Proxy
3rd Party
F1
DU CU
Central UnitDistributed Unit
ng-eNB gNB
UPF
SMF
PCF
N3IWFNon-3GPP
AccessNon-3GPP
Interworking
Slicing
Other operator
E1
DU
CU-CP
F1-C F1-U
gNB
CU-UP
DU
14 © NEC Corporation 2018
NetworkOpen-source, off-the-shelf, edge, virtualization, cloud
End-device
Spectrum
ServicesSponsored data, public safety
BusinessOpen API
Radio Access Technology User space
Slicing, accommodaterange of technologies(5G, LTE…)
Partners
IoT related, edge
Security credentialseSIM
Huge variation (IoT, smart devices)
new types & storage
Millennials to ICT first timers
Range of data-rates& mobility
Cognitive, aggregation, unlicensed
15 © NEC Corporation 2018
Increase in threat surface
Increase in threat research available in open literature 3GPP Coordinated Vulnerability Disclosure
http://www.3gpp.org/coordinated-vulnerability-disclosure-cvd
16 © NEC Corporation 2018
Regulation
Specification
Migration & Interworking
Design
Implementa-tion
Platform
Usage
Business
Deployment
Operations & Management
Holistic security from first step
Privacy
Lawful Interception
17 © NEC Corporation 2018
3GPP Release 14
3GPP Release 15
3GPP Release 15
3GPP Release 16
StudyTR 33.899
Closed
Option-3TS 33.401,
December 2017
Phase 1TS 33.501, March 2018
Phase 2 June 2019
18 © NEC Corporation 2018
ME
UDM
ARPFAUSFSEAFAMFCUDUUSIM ME
Onion Ring Trust Model
19 © NEC Corporation 2018
Primary auth.
Home control
Second-ary auth.
Inter-operator
Privacy
Service based arch.
CU-DU interface
Steering of
Roaming
Mobility
Enhanced security with 5G!evolution from 4G
20 © NEC Corporation 2018
Dynamic Policies
Inherent & enhanced security services
through 5G
Monitor-ing
AnalysisControl
21 © NEC Corporation 2018
• Long-term key update• 256 bits keys usage• Security Assurance• KDF negotiation• Network slicing security• Location services security• Security for 5G URLLC• SECAM and SCAS for 3GPP
virtualized network products• Security for Vertical and LAN
Services
More to come in 5G Phase 2
Enhanced Mobile Broadband (eMBB)
massive Machine Type Communication
(mMTC)
Ultra Reliable Low Latency
Communication (URLLC)
Phase 1
Phase 2
22 © NEC Corporation 2018
TS 33.501 Security architecture and procedures for 5G system
“Journal of ICT Standardization” special issue on 3GPP 5G Specifications https://www.riverpublishers.com/journal.php?j=JICTS/6/2/jart
Summary of 3GPP 5G Securityhttp://www.3gpp.org/news-events/3gpp-news/1975-sec_5g
Articles in blog: “Opinion Pieces on Cyber Security” http://pop.riverpublishers.com/index.php
NEC whitepaper: “Making 5G a Reality”https://www.nec.com/en/press/201802/global_20180222_03.html
LinkedIn: Regular posts and articles on 5G and securityhttps://jp.linkedin.com/in/arprasad
Thank You
Dr. Anand R. Prasad
https://jp.linkedin.com/in/arprasad
@AnandRPrasad2