
Submitted by s.parker on October 6, 2016
On 5 October 2016, Ericsson hosted its annual Security Day for employees working in the area. The event also featured a 5G-ENSURE poster and discussions on the project. Ericsson also took the opportunity to share insights into collaborative research on 5G security, and the new approaches it requires.
Elena Dubrova, Professor dept. of electronics, Royal Institute of Technology (KTH), Stockholm, Sweden. Guest researcher, Ericsson Research offered her expert views in an Ericsson Research blog.
- 5G systems will need to provide capabilities not only for voice and data communication as we know it today, but also for new use cases and new industries. The new wave of smart, connected devices and applications will bring with them as-yet-unknown security issues.
- Research will play a crucial role in making 5G secure.
The goal of the collaborative work between Ericsson and KTH is to produce high-quality research that will help meet the growing demands of end-users, businesses and society in general for trustworthy mobile communication networks – in which security and privacy of data and information is assured.
Many previous design approaches are still valid so there is no need to reinvent the wheel. A good example of this is the 3GPP approaches to 3G and 4G, which brought the industry highly secure radio and core network protocols, subscriber authentication and more. However, there must also be new considerations for 5G security design to meet growing demands for security and privacy.
Progress to date?
12 peer-reviewed articles with applications to selected security challenges, relevant for 5G have been published. In addition, a white paper on 5G security provides a more general introduction to the overall 5G security landscape. This includes new security requirements arising out of new service delivery models, an evolved threat landscape, and an increased focus on privacy – not to mention new trust models.
The White Paper discusses new security requirements associated with the 5G network and how they should be approached.
Ericsson Research blog: https://www.ericsson.com/research-blog/security/5g-security-unlike-anyth...

