Inspiration

The motivation for the decision on optional use in the standard is to allow flexible deployment options. For example, typically a service provider has ownership and control of the transport network, and the service provider’s security policy and network architecture may enable security to be achieved by other means than using above mentioned mechanisms. This means that the standard supports a certain security solution, but the service provider can decide on another and still achieve a secure result.

What it does

tandardization forms the backbone for mobile network security – standards are open and globally agreed upon and ensure interoperability and transparency.

How we built it

Additional security requirements are being discussed in many countries, due to the critical role of 5G.

Challenges we ran into

Accomplishments that we're proud of

What we learned

The main standardization organization for mobile networks is 3GPP, and the security for 3G through 5G has been defined in the security group SA3. The security architecture, as defined by 3GPP SA3, in turn, comprises security solutions from several different standardization organizations. See the figure below.

What's next for 5G

The mobile networks are serving more than eight billion subscriptions worldwide, and in many countries, these networks are considered part of the national critical infrastructure. Scale and the critical role of the networks drive the demand for enhanced security, along with an increased focus on transparency, both in terms of the design and implementation of security solutions and compliance with regulatory and service provider-specific demands.

Mobile networks are traditionally based on open and globally agreed standards. The main motivation for standardization in the mobile industry has been and continues to be interoperability (among vendors, service providers, and device manufacturers) to enable a global market for mobile networks and devices. Another important aspect is security, with the possibility to verify properties such as interface definitions, security protocols, key lengths, and the strength of cryptographic algorithms. The basic idea of standardizing security is to use commonly agreed, tested, verified, and updated solutions according to best common practice. Open standards, in turn, are available for anybody to review and therefore, add transparency and give more confidence that the security features as specified in the standards are sound.

Built With

Share this project:

Updates