Page 1
1 © NEC Corporation 2018
Business Opportunities and Security with 5th Generation
WWRF#41; October 29 – November 1, 2018; Herning, Denmark
Dr. Anand R. Prasad, NEC Corporation
Chief Advanced Technologist, Fellow IET and IETE Chairman 3GPP SA3
Disclaimer: This presentation gives views of the author and not necessarily that of NEC or 3GPP
Page 3
3 © NEC Corporation 2018
Page 4
4 © NEC Corporation 2018
NEC Vision - Role of the ICT infrastructure in 5G erasocial value creation towards social solution business
Page 5
5 © NEC Corporation 2018
NEC’s concept for 5G era
Page 6
6 © NEC Corporation 2018
“5G. A Future Beyond Imagination.” that realizes three changes
Social Transformation
5G. A Future Beyond Imagination.
Operation Transformation
NetworkTransformation
Build/provide information infrastructure by using ICT technology of 5G era, and
advance and accelerate digital transformation (DX) of society and industry through
collaborative creation with partners.
AI
Automation
Security
E2EO
Remote operations
Advanced security
Auto driving
Transport
NW
5G Base
SDN NFV
Promoting the digitalization of society and industry, and
transforming user life and work style.
Advancing the automation of business
management, networks/IT and service
operations
Building secure networks optimized for diverse
requirements (ultra-high speed, ultra-low latency, multiple
simultaneous connections)
Page 7
7 © NEC Corporation 2018
Optimization leading towards new value creation
Page 8
8 © NEC Corporation 2018
Blurring of conventional business relation & arrival of
partnership business era
Page 9
9 © NEC Corporation 2018
Dem
ocra
tization
User
Space
Need of “flexible architecture”
Page 10
10 © NEC Corporation 2018
Enhanced Mobile Broadband (eMBB)
massive Machine Type Communication
(mMTC)
Ultra Reliable Low Latency
Communication (URLLC)
Phase 1
Phase 2
3GPP phase based 5G specification
Page 11
11 © NEC Corporation 2018
(NSA) (SA)
Page 12
12 © NEC Corporation 2018
User Plane
Central Unit
(Base-Station)
Control Plane(Service Based Architecture;
SBA)
DataNetwork / Service Provider
(other)
Other operator
UE
5G system – a flexible architecture
DU
Page 13
13 © NEC Corporation 2018
Service based architecture UE NG-RAN UPF
AMF SMFAUSF
N3 N6
N1 N2 N4
NEFNSSF NRF PCF UDM AF
Nnssf Nnef Nnrf Npcf Nudm Naf
Nausf Namf Nsmf
SEPP
DN(Data Network)
Application
User DataManagement
PolicyControl
NetworkRepository
NetworkExxposure
NetworkSlice
Selection
AuthenticationServer
Access & Mob. Mgt.
Session Mgt.
User Plane
Security EdgeProtection Proxy
3rd Party
F1
DU CU
Central UnitDistributed Unit
ng-eNB gNB
UPF
SMF
PCF
N3IWFNon-3GPP
AccessNon-3GPP
Interworking
Slicing
Other operator
E1
DU
CU-CP
F1-C F1-U
gNB
CU-UP
DU
Page 14
14 © NEC Corporation 2018
NetworkOpen-source, off-the-shelf, edge, virtualization, cloud
End-device
Spectrum
ServicesSponsored data, public safety
BusinessOpen API
Radio Access Technology User space
Slicing, accommodaterange of technologies(5G, LTE…)
Partners
IoT related, edge
Security credentialseSIM
Huge variation (IoT, smart devices)
new types & storage
Millennials to ICT first timers
Range of data-rates& mobility
Cognitive, aggregation, unlicensed
Page 15
15 © NEC Corporation 2018
Increase in threat surface
Increase in threat research available in open literature 3GPP Coordinated Vulnerability Disclosure
http://www.3gpp.org/coordinated-vulnerability-disclosure-cvd
Page 16
16 © NEC Corporation 2018
Regulation
Specification
Migration & Interworking
Design
Implementa-tion
Platform
Usage
Business
Deployment
Operations & Management
Holistic security from first step
Privacy
Lawful Interception
Page 17
17 © NEC Corporation 2018
3GPP Release 14
3GPP Release 15
3GPP Release 15
3GPP Release 16
StudyTR 33.899
Closed
Option-3TS 33.401,
December 2017
Phase 1TS 33.501, March 2018
Phase 2 June 2019
Page 18
18 © NEC Corporation 2018
ME
UDM
ARPFAUSFSEAFAMFCUDUUSIM ME
Onion Ring Trust Model
Page 19
19 © NEC Corporation 2018
Primary auth.
Home control
Second-ary auth.
Inter-operator
Privacy
Service based arch.
CU-DU interface
Steering of
Roaming
Mobility
Enhanced security with 5G!evolution from 4G
Page 20
20 © NEC Corporation 2018
Dynamic Policies
Inherent & enhanced security services
through 5G
Monitor-ing
AnalysisControl
Page 21
21 © NEC Corporation 2018
• Long-term key update• 256 bits keys usage• Security Assurance• KDF negotiation• Network slicing security• Location services security• Security for 5G URLLC• SECAM and SCAS for 3GPP
virtualized network products• Security for Vertical and LAN
Services
More to come in 5G Phase 2
Enhanced Mobile Broadband (eMBB)
massive Machine Type Communication
(mMTC)
Ultra Reliable Low Latency
Communication (URLLC)
Phase 1
Phase 2
Page 22
22 © NEC Corporation 2018
TS 33.501 Security architecture and procedures for 5G system
“Journal of ICT Standardization” special issue on 3GPP 5G Specifications https://www.riverpublishers.com/journal.php?j=JICTS/6/2/jart
Summary of 3GPP 5G Securityhttp://www.3gpp.org/news-events/3gpp-news/1975-sec_5g
Articles in blog: “Opinion Pieces on Cyber Security” http://pop.riverpublishers.com/index.php
NEC whitepaper: “Making 5G a Reality”https://www.nec.com/en/press/201802/global_20180222_03.html
LinkedIn: Regular posts and articles on 5G and securityhttps://jp.linkedin.com/in/arprasad
Page 23
Thank You
Dr. Anand R. Prasad
[email protected]
https://jp.linkedin.com/in/arprasad
@AnandRPrasad2