5G network brings new security requirements

[Guide] 5G security needs to consider the security of 5G infrastructure, thus ensuring that 5G services can operate safely under NFV technology environment.

The virtualization features of 5G networks have changed the protection of functional network elements in traditional networks. The protection of physical devices is largely dependent on the security isolation of physical devices. The physical environment that was originally considered to be secure has become insecure. Controllable security requirements are an important part of 5G security. For example, security authentication functions may also be placed in physical security. Therefore, 5G security needs to consider the security of the 5G infrastructure, thus ensuring that 5G services can operate safely under the NFV technology environment.

Faced with the development trend of 5G networks, especially 5G new services, new architectures, and new technologies, new challenges will be placed on user security and user privacy protection. In addition to meeting basic communication security, the 5G security mechanism needs to provide differentiated security services for different service scenarios, adapt to multiple network access methods and new network architectures, protect user privacy, and support open security capabilities.

5G network brings new security requirements

Compared with the traditional mobile Internet scenario, the 5G eMBB scenario mainly provides users with high-speed network speed and high-density capacity, so a large number of small stations (smallcells, femtocells) will appear. The deployment mode, deployment conditions and functions of the small stations are flexible and diverse. The traditional 4G security mechanism does not consider the security threats in such a dense networking scenario. Therefore, in addition to the security threats of the traditional mobile Internet, there may be a security threat of small station access in such a dense networking scenario.

For large-scale IoT scenarios, it is estimated that by 2015, there will be 50 billion connected devices. The terminal includes an Internet of Things terminal, an RFID tag, a short-range wireless communication terminal, a mobile communication terminal, a camera, and a sensor network gateway. Because most IoT terminals have the characteristics of limited resources, dynamic topology changes, complex network environment, data-centric and closely related applications, they are more vulnerable to threats and attacks than traditional wireless networks. In this case, in order to ensure the accurate validity of the information, it is necessary to introduce a security mechanism in the machine communication. If each message of each device needs to be separately authenticated, the verification of the network side security signaling needs to consume a lot of resources. In the traditional 4G network authentication mechanism, the problem of massive authentication signaling is not taken into consideration. Once the network receives the terminal signaling request that exceeds the processing capability of the network signaling resources, a signaling storm will be triggered, resulting in the emergence of network services. The problem is that the entire mobile communication system fails and collapses.

In the low-latency and high-reliability scenarios, especially for delay-sensitive applications such as car networking and remote real-time medical, low-latency and high-security requirements are proposed. In these scenarios, in order to avoid accidents such as vehicle collisions and surgical misoperations, 5G networks are required to provide delay QoS guarantees as low as 1 ms while ensuring high reliability. Traditional security protocols such as the authentication process and the encryption and decryption process are not designed with ultra-reliable and low-latency communication scenarios. This may result in delays caused by traditional complex security protocols/algorithms that cannot meet the requirements of ultra-low latency. At the same time, the application of 5G ultra-dense deployment technology makes the coverage of a single access node very small. When the terminal such as a vehicle moves quickly, the mobility management process of the network will be very frequent. For the purpose of low latency, the security context mobility Management related functional units and processes need to be optimized.

In addition, due to the virtualization characteristics of 5G networks, the protection of functional network elements in traditional networks is largely dependent on the status of security isolation of physical devices. The physical environment that was originally considered to be secure has become insecure and virtualized. The manageable security requirements of the platform are an important part of 5G security. For example, the security authentication function may also be placed in the physical environment security. Therefore, 5G security needs to consider the security of the 5G infrastructure, thus ensuring that 5G services can operate safely under the NFV technology environment.

In addition, the introduction of SDN technology in the 5G network improves the data transmission efficiency of the network and achieves better resource allocation, but also brings new security requirements, that is, the virtual SDN technology control network element needs to be considered in the 5G environment. Security isolation and management with forwarding nodes, and secure deployment and proper execution of SDN technology flow tables.

Pneumatic Liquid Level Measuring Device

Pneumatic liquid level measuring device,Pneumatic liquid level measuring device price,Pneumatic liquid level measuring device product

Taizhou Jiabo Instrument Technology Co., Ltd. , https://www.taizhoujbcbyq.com