New Mobile Security Industry Paper Analyses 5G Security Requirements
Paper calls for security to be built into 5G from the outset, to address varying requirements across market segments
18 February 2016 – SIMalliance has published a new white paper, which analyses security needs across four market segments for 5G – Massive IoT, Critical Communications, Enhanced Mobile Broadband and Network Operations. The paper, titled ‘An Analysis of the Security Needs of the 5G Market’ [insert link], concludes that while requirements will differ across each market segment, the need for security and privacy in 5G networks will be fundamental across them all. As a result, the paper calls for security to be built into the yet-to-be-determined 5G standard from the very outset.
When compared to 4G, 5G networks are expected to provide greater throughput, higher connectivity density with low latency, better coverage, greater reliability, efficient handover between heterogenous RATs and a higher mobility range with much greater service differentiation than previous network technologies. These features will be provided by different network layers. Security, privacy, trust and identity must therefore be delivered within a highly diverse technical and functional environment.
The paper finds that security needs and threats will vary by market segment and use case, because service specific technologies will themselves vary in terms of complexity, speed and attractiveness as attack targets. For example, at one end of the spectrum, there are low cost sensors in IoT that will require extended lifespans but may only need to be polled once a day or even less frequently, exchanging very small amounts of data. At the other end, there are emergency services within the Critical Communications segments, with corresponding high speed, low latency requirements in order to have access to information in real-time to save lives.
The paper, which is aimed at non-technical readers, identifies threats that, amongst others, may come from attack agents using IoT devices to access the network, to cloned equipment impacting network quality of service, to man in the middle attacks interrupting remote surgery or first responder services, or simply phishing attacks.
Commenting on the release of the paper, Hervé Pierre, Chairman of SIMalliance says: “It is early days for 5G. While the industry has a clear vision of services that it hopes 5G will facilitate, much remains to be determined on the technical front with standardisation activities just beginning.
“The aim of this paper is to provide a preliminary, much needed analysis of security requirements across the different 5G segments, to help inform the standardisation process. From our analysis, it is clear that each of these segments has different business, technical and security requirements, which may necessitate different solutions. Yet one thing is clear; security and privacy will remain absolutely fundamental requirements in 5G, as they have always been for mobile applications and services across devices that access wireless networks, if not more so. This is especially so, as the changes foreseen for 5G are likely to broaden the range of attractive attacks targets and elevate vulnerabilities. For this reason, the paper strongly concludes that it is crucial that security is considered and built into the 5G standard right from the very beginning.
“SIMalliance invites engagement with interested industry participants in the emerging 5G ecosystem, in order that tamper-resistant hardware-based device security can be explored as an option, and fine–tuned as necessary, to protect 5G networks and the many new services which will be deployed across the various market segments.”
SIMalliance is the global, non-profit industry association which simplifies aspects of hardware-based device security to drive the creation, deployment and management of secure mobile services. The organisation promotes the essential role of a dedicated tamper resistant hardware module in delivering secure mobile applications and services across all devices that can access wireless networks. By identifying and addressing related technical issues, and both clarifying and recommending existing technical standards relevant to the implementation of hardware security, the SIMalliance aims to facilitate and accelerate delivery of secure mobile applications globally.
SIMalliance members represent 90% of the global SIM card market. As such, the SIMalliance’s membership is responsible for delivering the most widely distributed secure application delivery platform in the world (UICC/SIM/USIM).
SIMalliance members are Card Centric Solutions, Eastcompeace, Gemalto, Giesecke & Devrient, Incard, Kona I, Morpho, Oasis Smart SIM, Oberthur Technologies, VALID, Watchdata, Wuhan Tianyu and XH Smartcard (Zhuhai) Co. Ltd.
SIMalliance Strategic Partners are Comprion, Linxens and Movenda.
This License Agreement (Agreement) is a legal agreement between you and SIMalliance. (Licensor), which is the owner of the specification (Specification) you will be downloading when you complete this Agreement. As used in this Agreement, "you" means the company, entity or individual that is acquiring a license under this Agreement.
By clicking on the "ACCEPT" button below, you are agreeing that you will be bound by and are becoming a party to this Agreement. If you are an entity, and an individual is entering into this Agreement on your behalf, then you will be bound by this Agreement when that individual clicks on the "ACCEPT" button. When they do so, it will also constitute a representation by the individual that s/he is authorized to bind you as a party to this Agreement. If you do not agree to all of the terms of this Agreement, click the "DO NOT ACCEPT" button at the end of this Agreement.
1. License Grant.
Licensor hereby grants you the right, without charge, on a perpetual, non- exclusive and worldwide basis, the right to utilize the Specification for the purpose of developing, making, having made, using, marketing, importing, offering to sell or license, and selling or licensing, and to otherwise distribute, products complying with the Specification, in all cases subject to the conditions set forth in this Agreement and any relevant patent and other intellectual property rights of third parties (which may include members of Licensor). This license grant does not include the right to sublicense, modify or create derivative works based upon the Specification. For the avoidance of doubt, products implementing this Specification are not deemed to be derivative works of the Specification.
2. NO WARRANTIES.
THE SPECIFICATION IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, COMPLETENESS AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL LICENSOR, ITS MEMBERS OR ITS CONTRIBUTORS BE LIABLE FOR ANY CLAIM, OR ANY DIRECT, SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THE SPECIFICATION.
3. THIRD PARTY RIGHTS.
Without limiting the generality of Section 2 above, LICENSOR ASSUMES NO RESPONSIBILITY TO COMPILE, CONFIRM, UPDATE OR MAKE PUBLIC ANY THIRD PARTY ASSERTIONS OF PATENT OR OTHER INTELLECTUAL PROPERTY RIGHTS THAT MIGHT NOW OR IN THE FUTURE BE INFRINGED BY AN IMPLEMENTATION OF THE SPECIFICATION IN ITS CURRENT, OR IN ANY FUTURE FORM. IF ANY SUCH RIGHTS ARE DESCRIBED ON THE SPECIFICATION, LICENSOR TAKES NO POSITION AS TO THE VALIDITY OR INVALIDITY OF SUCH ASSERTIONS, OR THAT ALL SUCH ASSERTIONS THAT HAVE OR MAY BE MADE ARE SO LISTED.
4. TERMINATION OF LICENSE.
In the event of a breach of this Agreement by you or any of your employees or members, Licensor shall give you written notice and an opportunity to cure. If the breach is not cured within thirty (30) days after written notice, or if the breach is of a nature that cannot be cured, then Licensor may immediately or thereafter terminate the licenses granted in this Agreement.
All notices required under this Agreement shall be in writing, and shall be deemed effective five days from deposit in the mails. Notices and correspondence to either party shall be sent to its address as it appears below. This Agreement shall be construed and interpreted under the internal laws of the United Kingdom, without giving effect to its principles of conflict of law.