Mobile Security Industry Calls for Forthcoming 5G Standard to Provide Robust Security Appropriate to Use Case
19 October, 2016 – SIMalliance has published a new technical white paper, which analyses functional and security requirements, together with proposed solutions, across five market segments for 5G – massive IoT, critical communications, enhanced mobile broadband, vehicle to X (V2X) and network operations.
The paper, entitled ‘5G Security – Making the Right Choice to Match your Needs’, determines that appropriate security, relevant to a wide range of use cases and their requirements, should be built into 5G from the outset, to prevent the need to retrofit the right level of security later. The paper also asserts that while many devices using the 5G network will be simple and low cost, particularly across the IoT segment, security decisions must take into account the value of data being stored or transferred and not just the device cost. 5G security measures must protect subscribers, devices and their communications and also the integrity of the network itself.
The technical paper examines a range of use cases in each of the five segments. It explains how 5G will result in a wide variety of functional requirements, such as greater throughput, lower latencies, higher connectivity density and better coverage. The paper demonstrates how these functional requirements interrelate with security requirements in the 5G environment. It then maps security requirements to different aspects of the 5G ecosystem – network, services, applications, devices and users – and calls for, and makes recommendations for, security at all levels of the value chain.
Finally it compares three potential solutions that have been mooted for 5G security: the eUICC, Trusted Execution Environment (TEE) based SIM and SoftSIM. It highlights that service providers should consider confidentiality,privacy and integrity requirements of data being transmitted before arriving at which secure storage solution is appropriate for their use case.
It also presents these findings in an executive summary for the non-technical reader.
The paper expands on SIMalliance’s marketing paper, ‘An Analysis of the Security Needs of the 5G Market’, published in early 2016. This earlier document concluded that while requirements will differ across each market segment, the need for security and privacy in 5G networks will be fundamental across all of them.
Commenting on the release of the paper, Hervé Pierre, Chairman of SIMalliance said: “5G will realise a huge variety of use cases and an equally large range of security threats and risks. SIMalliance believes that at every stage of the 5G standardisation process, across every segment, security and privacy remain fundamental requirements. Appropriate security, relevant to the broadest range of use cases, is therefore in the interests of all actors in 5G and it is vital to build security into 5G from the outset, for what is not built in from the beginning cannot easily be added later on.
“This new SIMalliance paper explores various security solutions for 5G and analyses them based on their ability to meet functional and security requirements across key market segments. The result is a comparison accompanied by a recommendation on security solution viability for different use cases. While I’d urge interested parties to read the paper for detailed conclusions, SIMalliance’s position overall is to encourage actors to apply end-to-end security techniques based upon the value of the data in transit, , as the wrong decision about security today will prove a false economy in the future,” he concluded.
SIMalliance is the global, non-profit industry association which simplifies aspects of hardware-based device security to drive the creation, deployment and management of secure mobile services. The organisation promotes the essential role of a dedicated tamper resistant hardware module in delivering secure mobile applications and services across all devices that can access wireless networks. By identifying and addressing related technical issues, and both clarifying and recommending existing technical standards relevant to the implementation of hardware security, the SIMalliance aims to facilitate and accelerate delivery of secure mobile applications globally.
SIMalliance members represent 88% of the global SIM card market. As such, the SIMalliance’s membership is responsible for delivering the most widely distributed secure application delivery platform in the world (UICC/SIM/USIM).
SIMalliance members are Card Centric Solutions, Eastcompeace, Gemalto, Giesecke & Devrient, Incard, Kona I, Oasis Smart SIM, Oberthur Technologies, Safran Identity & Security, VALID, Watchdata, Wuhan Tianyu and XH Smartcard (Zhuhai) Co. Ltd. SIMalliance Strategic Partners are Comprion, Linxens and Movenda.
This License Agreement (Agreement) is a legal agreement between you and SIMalliance. (Licensor), which is the owner of the specification (Specification) you will be downloading when you complete this Agreement. As used in this Agreement, "you" means the company, entity or individual that is acquiring a license under this Agreement.
By clicking on the "ACCEPT" button below, you are agreeing that you will be bound by and are becoming a party to this Agreement. If you are an entity, and an individual is entering into this Agreement on your behalf, then you will be bound by this Agreement when that individual clicks on the "ACCEPT" button. When they do so, it will also constitute a representation by the individual that s/he is authorized to bind you as a party to this Agreement. If you do not agree to all of the terms of this Agreement, click the "DO NOT ACCEPT" button at the end of this Agreement.
1. License Grant.
Licensor hereby grants you the right, without charge, on a perpetual, non- exclusive and worldwide basis, the right to utilize the Specification for the purpose of developing, making, having made, using, marketing, importing, offering to sell or license, and selling or licensing, and to otherwise distribute, products complying with the Specification, in all cases subject to the conditions set forth in this Agreement and any relevant patent and other intellectual property rights of third parties (which may include members of Licensor). This license grant does not include the right to sublicense, modify or create derivative works based upon the Specification. For the avoidance of doubt, products implementing this Specification are not deemed to be derivative works of the Specification.
2. NO WARRANTIES.
THE SPECIFICATION IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, COMPLETENESS AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL LICENSOR, ITS MEMBERS OR ITS CONTRIBUTORS BE LIABLE FOR ANY CLAIM, OR ANY DIRECT, SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THE SPECIFICATION.
3. THIRD PARTY RIGHTS.
Without limiting the generality of Section 2 above, LICENSOR ASSUMES NO RESPONSIBILITY TO COMPILE, CONFIRM, UPDATE OR MAKE PUBLIC ANY THIRD PARTY ASSERTIONS OF PATENT OR OTHER INTELLECTUAL PROPERTY RIGHTS THAT MIGHT NOW OR IN THE FUTURE BE INFRINGED BY AN IMPLEMENTATION OF THE SPECIFICATION IN ITS CURRENT, OR IN ANY FUTURE FORM. IF ANY SUCH RIGHTS ARE DESCRIBED ON THE SPECIFICATION, LICENSOR TAKES NO POSITION AS TO THE VALIDITY OR INVALIDITY OF SUCH ASSERTIONS, OR THAT ALL SUCH ASSERTIONS THAT HAVE OR MAY BE MADE ARE SO LISTED.
4. TERMINATION OF LICENSE.
In the event of a breach of this Agreement by you or any of your employees or members, Licensor shall give you written notice and an opportunity to cure. If the breach is not cured within thirty (30) days after written notice, or if the breach is of a nature that cannot be cured, then Licensor may immediately or thereafter terminate the licenses granted in this Agreement.
All notices required under this Agreement shall be in writing, and shall be deemed effective five days from deposit in the mails. Notices and correspondence to either party shall be sent to its address as it appears below. This Agreement shall be construed and interpreted under the internal laws of the United Kingdom, without giving effect to its principles of conflict of law.