Blog

Securing 5G: What Are the Six 5G Network Security Checkpoints?

Nov 26. 2020
  • Sunil Kumar

    System Architect of Core SW R&D, Networks Business at Samsung Electronics


Mobile network security in all generations—starting from 2G to 3G, 4G, and now 5G—has always been one of the most important aspects of network management and operations. Network operators continue to focus on adopting and implementing robust security measures not only to protect their subscribers’ data privacy but also to ensure their networks stay safe against various security threats. 

 

Now, we are entering into the next phase of the 5G era, where networks are in the midst of a transformational shift enabling a plethora of new devices, services, and business applications. However, this fast technology advancement also tends to demand a more complex security framework.Here are the four key drivers that led to the redesign of the 5G security framework:

 

Here are the four key drivers that led to the redesign of the 5G security framework:

Diversified Services: 5G is not only for individual mobile users but also for enterprises, industries and the broader society. With the new services that 5G brings, operators will require a flexible security mechanism for each type of service.

 

Architectural Transformation: The overall network architecture has been redesigned using the Service-Based Architecture (SBA) and other new technologies such as the cloud (NFV/SDN), micro-services, and containerization. The architectural changes also create new security challenges for the operators in authentication, access control and data security.

 

Deployment Options: 5G enables various deployment options including cloud-based, public and private networks. Since cloud-based networks involve multiple stakeholders such as RAN providers, core providers, cloud infrastructure providers, platform providers, and application providers, operators would need to build a trusted and secured network, where all stakeholders maintain trouble-free interaction and collective responsibility.

 

Multi-layered Security: 5G also introduces a multi-layered network protection approach where networks must implement security functions at the network layer as well as the transport and application layers.

 

With 5G Standalone (SA), we are expecting a fundamental change in the security landscape. Samsung will work closely with the operators to explore and define the best options for 5G security and take a proactive approach in protecting their networks against potential security threats. 

 

To explore this topic further, Samsung sponsored a white paper alongside other industry leaders including ETSI, where we explore the six 5G network security checkpoints, which are of utmost importance in ensuring the overall security of a 5G network. 

1. Network Access Security

 

2. NF to NF Communications Security

 

3. Identity Authentication and Authorization

 

4. Network Slice Security

 

5. Inter-PLMN (Public Land Mobile Networks) Communication Security

 

6. Network Exposure API Security

Authored by HardenStance, the paper also provides guidance on the key 3GPP security features, providing critical business and security context on them.

 

To read further, please see here for the white paper: 5G SA Networks Trigger a New Era in 5G Security.