Securing the 5G world

17:22 | 05/03/2020
5G is set to revolutionise the mobile communications industry – offering high data rates, low-latency, and ubiquitous connectivity with levels of reliability not previously seen. This will enable new services and use cases that go far beyond communication between individuals. Satish Dhanasekaran, SVP and president, Communications Solutions Group, Keysight Technologies, delves into the rapid progression of 5G deployments that has huge potential for connecting economies at scale, while simultaneously exposing potential vulnerabilities that must be addressed.
securing the 5g world
Satish Dhanasekaran, SVP and president, Communications Solutions Group, Keysight Technologies

Shift to software-centric, virtualised networks changing the communications landscape

To deliver higher performance and lower cost, 5G networks are leveraging technologies that are software-centric and virtualised, moving from custom hardware to software components running on commercial off-the-shelf (COTS) hardware.

This increase in software content across 5G deployments continues to fuel an exciting, faster development pace. But with this comes some challenges since these 5G technology innovations are also expanding the attack surface of the system.

While 5G core network functions are making use of new and different software architecture, common technologies like HTTP and REST APIs that are well known are replacing proprietary interfaces of the past. All of these things increase the potential for cybersecurity attacks and vulnerabilities.

Network Function Virtualisation (NFV) will deliver far more scalability than traditional platform approaches. NFV relies on a software stack and infrastructure where network functions execute.

While virtualisation has significant advantages in terms of scalability and efficiency of the underlying hardware resources, moving to a software platform that is made up of many different components from many different vendors, often including open-source, increases the risk of a vulnerability being exploited that could compromise the entire system.

Additionally, with 5G network slicing, which makes extensive use of virtualisation techniques, guaranteeing slice isolation and preventing data leakage between slices are key for the security of 5G networks.

Another core assumption with 5G is related to the proliferation of connected devices that will become an essential part of our daily lives.

5G will enable new use cases, where an agreed-upon quality of service is required to support the reliability, throughput, or latency requirements associated with critical infrastructures and real-time systems.

While there are standards available (or being developed) to mandate and evaluate security across different sectors like automotive, health, utilities, among others, there is a lack of standardisation for general IoT devices. The effect of poorly secured devices, proliferated across the network, can easily disrupt essential and non-essential services enabled by 5G.

5G networks are incredibly complex and the deployment of infrastructure elements at the edge makes them more difficult to secure. Network operators faced with the complexity of these systems may rely on a third-party for the configuration and management of their networks, giving administration privileges to potential adversarial actors. Poorly configured systems may compromise the networks, independent of the definition and use of security functions defined in the standard.

Delivering on the promise of 5G will require security diligence

The global technology ecosystem is taking steps to ensure we have a hardened infrastructure and has made significant progress. Governments are carefully analysing the security risks of 5G networks and systems.

In the EU, the NIS Co-operation group completed a co-ordinated risk assessment of the cybersecurity of 5G networks, followed by a threat landscape for 5G by ENISA (European Agency for Cybersecurity).

Similar studies and activities are taking place in other regions. At the same time, the mobile communications industry has developed a Network Equipment Security Assurance Scheme (NESAS), jointly defined by 3GPP and GSMA, to facilitate improvements in security levels across the mobile industry. NESAS uses a comprehensive approach to assess the product development life cycle, as well as security test cases defined by 3GPP SA3 for network equipment.

However, given the increase in the attack surface, the level of emphasis on the security must be intensified, especially compared with previously deployed generations of mobile communications systems.

The security industry offers many categories of security assessment tools, including endpoint, penetration test, vulnerability scanning, fuzzing, and identity and access management solutions. All of these should be collectively used to validate all aspects of the communications infrastructure.

Keysight has undertaken security research for the last 15 years through our Application and Threat Intelligence Research Center (ATI). ATI combined with our comprehensive communication design and test portfolio, uniquely positions Keysight to offer security solutions for 5G.

Comprehensive security testing will become paramount

In summary, even though 5G standards will improve the security mechanisms over previous generations, there will still be areas that require further work to achieve and maintain secured 5G systems.

The complexity of 5G networks require proper configuration and management of the security aspects, as well as tighter security for third parties managing the networks, ultimately making for stricter control of the supply chain.

The increase in software content of 5G networks and the massive increase of IoT devices will drive a need for enhanced security controls. This must be a key area of focus for the industry as 5G scales.

Security standards and best practices guides are becoming available for different sectors, covering all software development stages, from architecture and design to coding, testing, and release.

With the evolving landscape of vulnerabilities and threats, companies will need to carefully consider and adopt continuous security testing using automated tools that are regularly updated to the latest threats.

Keysight Technologies, Inc. (NYSE: KEYS) is a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world. Keysight's solutions optimise networks and bring electronic products to market faster and at a lower cost with offerings from design simulation to prototype validation, to manufacturing test, to optimisation in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defence, automotive, energy, semiconductor, and general electronics end markets. Keysight generated revenues of $4.3 billion in the 2019 fiscal year.

By Bich Thuy

What the stars mean:

★ Poor ★ ★ Promising ★★★ Good ★★★★ Very good ★★★★★ Exceptional

Latest News ⁄ Corporate ⁄ CEO Talk

Based on MasterCMS Ultimate Edition Ver 2.9 2020