Topics In Demand
Notification
New

No notification found.

Blog
Nuts and Bolts of 5G Security: Technologies, Architectures, Use-cases, Standards & Policies

November 10, 2020

722

0

With recent 5G enabled flagship phone launches, everyone believes that we have moved one step closer to the wide adoption of this technology.  While the current 4G technology can handle voice, video stream, web browsing, and text quite well, our connectivity needs have changed over time.

The users are now adopting many connected features – home automation and connected cars, that has essentially changed the way we have been interacting with our phones. Thus, the need for new development around higher speed and lower latency. Experts believe that 5G technology will be 20 times faster and will have 120 times less latency than the current 4G technology.

Experts have been categorizing the application areas of 5G under 3 categories – Community perspective, Industry perspective, and overall experience perspective. Some of the examples under each of the header are as follows:

  • Community perspective: Connected cars, efficient services, smart power grids, etc.
  • Industry perspective: Logistics, Healthcare, Agriculture sectors will reap the benefits of the technology
  • End-user perspective: AR/VR, sensory experience, and reliable connectivity are some of the examples.

With higher speed and lower latency comes the cybersecurity challenges. Some of the most anticipated security concerns in 5G are over-strain on security monitoring, given the increased bandwidth of the network, multiple entry points and hence increase in attack surface. IoT and connected devices will increase the volume of network traffic further.

Given the slow pace of development of protocols and standards in IoT devices, the security concerns arising from 5G cannot be ignored. Organizations such as 3GPP, ETSI, and IETF have already begun their work on securing the 5G space across 3 layers:

  • Enhanced Authentication framework in 5G
  • Improved subscriber privacy features
  • Higher protocol layer security mechanism that will secure service-based interfaces

At the upcoming Annual Information Security Summit 2020 (AISS 2020), DSCI will be hosting a session on understanding the technologies, architecture, use-cases, standards, and policies around securing 5G.

The session is most relevant for technologies and security enthusiast from Telecom sector, Wireless and network security and Hardware security domains, officials from Government, CISOs, CIOs and CTOs from the industry.

Visit AISS2020 page to know more about AISS overview, key sessions, highlights, who should attend & register for freehttps://www.dsci.in/events/aiss-2020/


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


MediaDSCI

© Copyright nasscom. All Rights Reserved.