5G Security from a Network Operator s Point of View
|
|
- Lindsey Cooper
- 6 years ago
- Views:
Transcription
1 5G Security from a Network Operator s Point of View China Mobile ITU Workshop on 5G Security 1
2 Outline 1 Evolution of trust model from 2G to 5G 2 Major 5G security issues 3 Activities related to 5G security in SG17 and a proposed work plan 4 Some strategic thoughts of 5G security 2
3 Evolution of Trust Model Trust Closed Network Specialized Protocol Mutual Trust Closed Network Specialized Protocol Trust User A MNO A MNO B User B MNO/ 3 rd Party Services User A Distrust Closed Network Specialized Protocol Closed Network Specialized Protocol Distrust Mutual MNO A Trust MNO B User B MNO: Mobile Network Operator 3
4 Evolution of Trust Model MNO/ 3 rd Party Services/Applications User A Distrust IP-based Protocols In Doubt? MNO A MNO B User B IP-based Protocols Distrust 4
5 Evolution of Trust Model Verticals Distrust MEC Ext. DN Network Slicing IT-based networks Internet Network Capability Exposure Distrust Slice Tenents Network Slicing IT-based networks MEC Distrust User A/ Device A MNO A Common HW Platform MNO B User B/ Device B 5
6 Evolution of Trust Model Evolution of trust model has a great influence on the security design of 5G, eg. 5G AKA (previously called EPS-AKA*) is designed to mitigate the distrust between MNOs, enhancing the control of home network when the user is roaming. Security isolation between network slices is vital for the success of the new 5G network architecture, and it is also a major concern for the verticals because they are supposed to be the mainstream of slice tenants. It is still in doubt whether the common HW(Hardware) platform could provide the same security as the traditional blackbox equipments, especially with the report on the recently disclosed CPU vulnerabilities (Meltdown and Spectre). So it is necessary to impose a security baseline for the network infrastructure, such as NFV SCAS (SeCurity ASsurance). 6
7 Outline 1 Evolution of trust model from 2G to 5G 2 Major 5G security issues 3 Activities related to 5G security in SG17 and a proposed work plan 4 Some strategic thoughts of 5G security 7
8 UE Security of User Equipment Major 5G Security Issues Network Capability Exposure Securely expose network capabilities Expose security capabilities Service Security of traditional and vertical services MEC Network Slicing Decentralized authentication Security of 3 rd party apps RAN (CU/DU) Split Termination point of UP security F1 interface security Multi Access Technologies Unified authentication framework Air interface privacy Legacy USIM access to 5G Fake base stations Cloud Computing Security isolation of slices Slice authentication and access control Privacy preservation for slice users Service Based Architecture NF authorizaion and access control Security of interface protocols NFV SDN Security enables & security management Security of cloud computing Trutsted computing 8 Security of NFV Security of SDN Security by SDN
9 International SDOs related to 5G Security 1986~ 1988~ 1995~ 1998~ 2006~ ipsecme IP Security Maintenance and Extensions tls SCP Smart Card Platform SAGE Security Algorithm Group of Experts FASG Fraud and Security Group SIM Subscriber Identity Module SA3 Security SCT Security Competence Team Transport Layer Security 9
10 Outline 1 Evolution of trust model from 2G to 5G 2 Major 5G security issues 3 Activities related to 5G security in SG17 and a proposed work plan 4 Some strategic thoughts of 5G security 10
11 Activities related to 5G Security in SG17 Q2/17 (Security architecture and framework) network aspects including SDN for 5G security.1038,.sdnsec-3,.ssc,.srnv, etc Q6/17 (Security aspects of telecommunication services, networks and IoT) mobile and infrastructure aspects for 5G security ,.sdnsec-1, etc Q7/17 (Secure application services) application/service aspects for 5G security.srfb, etc Q8/17 (Cloud Computing Security) Cloud computing and big data infrastracture for 5G security.sgtbd, etc Q11/17 (Generic technologies to support secure applications) cryptographic profiles for 5G security.509, etc 11
12 A proposed work plan on 5G security in SG17 SG17 s opportunity in the 5G end-to-end security picture at least resides in: Generic Security Enabler: Q4, Q9, Q10, Q11, etc. Service/Application security: Q2, Q5, Q8, etc. Cloud, Big Data and SDN/NFV security: Q2, Q3, Q6, Q7, Q13, etc. And here are some initial proposals for specific 5G security issues which SG17 may work on: 5G security in Quantum Computing era 5G IDM 5G trust management, feasibility study on a global PKI to support 5G security, optimization of PKI for IoT and ITS/V2, etc. 5G network infrastructure security, including SDN/NFV security, Cloud Computing security, Big Data security, etc. China Mobile brings some new work item proposals in this area: Security Guideline for 5G Network in the Quantum Computing Era(C242) Guideline on Software-defined Security in SDN/NFV Network (C249) 12
13 Outline 1 Evolution of trust model from 2G to 5G 2 Major 5G security issues 3 Activities related to 5G security in SG17 and a proposed work plan 4 Some strategic thoughts of 5G security 13
14 Some Strategic Thoughts of 5G Security 5G proposes a vision of Communications change the society. It puts great emphasis on the mutual trust and cooperation between telecom operators and the verticals. It is an opppotunity of industry confusion, cross- border exploitation and ecosystem reconstruction. 5G is the integration of various new radio, network and IT technologies. And it is an important turning point for telecom network reconstruction. Evolution of 5G security technologies are driven by two wheels: The ever-lasiting and upgrading battles around vulnerabilites and amends Great variety of use cases, and evolving new technologies 5G security design should be based on 3 important assumptions: Upgrading of computing power Change of trust model Evolution of network architecture The lifetime of 5G is still long. The whole 5G ecosystem shoud be prepared to confront up-springing new risks. 14
15 Thank you Merci Cпасибо 谢谢 شكرا Gracias ありがとう감사합니다 15
ITU Workshop on 5G Security
All Sessions Outcome ITU Workshop on 5G Security Geneva, Switzerland, 19 March 2018 Session 1: Understanding threats and security requirements of 5G 1. Identified 5G security topics, such as threats, requirements,
More informationBuilding firmware update: The devil is in the details
Building firmware update: The devil is in the details Atsushi Haruta, IoT Services Group, Arm Arm Tech Symposia Japan 2017 Arm Mbed: Secure device management Application Cloud Mbed Cloud Secure, scalable,
More information5G security activities and future plan in ITU-T SG17
5G security activities and future plan in ITU-T SG17 Heung Youl Youm, PhD Chairman, ITU-T SG17 Professor, Soonchunhyang University, Korea(Rep. of) Content Strategic Vision for ITU-T SG17 Overview of 5G
More informationAccelerating intelligence at the edge for embedded and IoT applications
Accelerating intelligence at the edge for embedded and IoT applications Arm Tech Symposia 2017 Agenda The emergence of intelligence at the edge Requirements for intelligent edge computing IP and technologies
More information5G Network Slicing and Convergence. Maria Cuevas, Head of core network and services research BT plc
5G Network Slicing and Convergence Maria Cuevas, Head of core network and services research BT plc Contents 1 2 5G drivers Network slicing a b c d e Key drivers Key requirements / technical challenges
More informationThird annual ITU IMT-2020/5G Workshop and Demo Day 2018
All Sessions Outcome Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 Geneva, Switzerland, 18 July 2018 Session 1: IMT-2020/5G standardization (part 1): activities and future plan in ITU-T SGs 1.
More informationIMT2020/ 5G Standardization In ITU-T Study Group 13. Hans (Hyungsoo) KIM Vice-chairman ITU-T SG13
IMT2020/ 5G Standardization In ITU-T Study Group 13 Hans (Hyungsoo) KIM Vice-chairman ITU-T SG13 ITU-T SG13 & IMT2020/ 5G Lead study group on future networks such as IMT-2020 networks (non-radio related
More informationWAVE ONE MAINFRAME WAVE THREE INTERNET WAVE FOUR MOBILE & CLOUD WAVE TWO PERSONAL COMPUTING & SOFTWARE Arm Limited
WAVE ONE MAINFRAME WAVE THREE INTERNET WAVE FOUR MOBILE & CLOUD WAVE TWO PERSONAL COMPUTING & SOFTWARE Artificial Intelligence Fifth wave Data-driven computing era IoT Generating data 5G 5G Transporting
More informationBusiness model-driven 5G deployment
EUCNC 2018 18-21 June 2018, Ljubliana, Slovenia Business model-driven 5G deployment Michele Zarri, Technical Director, GSMA We are GSMA Connecting everyone and everything to a better future Industry Purpose
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationCreating the Future on the Shoulders of a Giant ZTE Flagship Tbit Optical Platform
Creating the Future on the Shoulders of a Giant ------ZTE Flagship Tbit Optical Platform Led by the rapid development of emerging services including HD (high definition) video, VR (virtual reality) and
More informationThe Changing Face of Edge Compute
The Changing Face of Edge Compute 2018 Arm Limited Alvin Yang Nov 2018 Market trends acceleration of technology deployment 26 years 4 years 100 billion chips shipped 100 billion chips shipped 1 Trillion
More informationMulti-tenancy of network operators and edge cloud services using small cells
Multi-tenancy of network operators and edge cloud services using small cells Emmanouil Kafetzakis, Ph.D. ORION Innovations P.C. mkafetz@orioninnovations.gr Infocom World 2017, 25-10-2017 Athens, Greece
More informationWhat do you see as GSMA s
GSMA: Connecting everyone and everything to a better future Mats Granryd, Director General of GSMA, shares his thoughts on the development of 5G, the Internet of Things, and why mobile is so important
More information5G Initiative 5G Roadmap Working Group Proposal for Contribution
5G Initiative 5G Roadmap Working Group Proposal for Contribution Cagatay Buyukkoc, AT&T Meryem Simsek, ICSI IEEE 5G Initiative Roadmap Mission statement Based on horizon scanning, interviews and expert
More informationSK Telecom proprietary
0 2016 SK Telecom proprietary Mobile network evolution 5G will require an All-IT infra to support services such as VR and mission-critical IoT services 1G 2G 3G 4G 5G Tech Digital Packet LTE All-IP New
More information6 KEY SECURITY REQUIREMENTS
KEY SECURITY REQUIREMENTS for Next Generation Mobile Networks A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems
More informationR&D Status of IMT-2020 (5G) Promotion Group. WANG Zhiqin May 24, 2017
R&D Status of IMT-2020 (5G) Promotion Group WANG Zhiqin May 24, 2017 Table of Contents General Aspects of IMT-2020 PG 5G R&D Progress of IMT-2020 PG Technology & Standards Network & Security Technology
More informationETSI TC INT (Core Network and Interoperability Testing) Vision towards emerging networks and 5G. TC INT chairman: Giulio Maggiore
ETSI TC INT (Core Network and Interoperability Testing) Vision towards emerging networks and 5G TC INT chairman: Giulio Maggiore Agenda TC INT Main Competence TC INT Main Deliverables TC INT Vision towards
More informationSlicing and Orchestration in Service-Oriented 5G Networks
Slicing and Orchestration in Service-Oriented 5G Networks Navid Nikaein Associate Professor - Eurecom Coordinator of Mosaic-5G Initiative Keynotes at IEEE CAMAD 17-19 September, 2018, Barcelona, Spain.
More informationHow Smart Networks are changing the Corporate WAN
How Smart Networks are changing the Corporate WAN Mark Bennett Head of Global Fixed Connectivity Vodafone Group Enterprise September 12017 About Vodafone Enterprise Unified Comms Cloud & Hosting Internet
More informationSecurity and networks
Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,
More informationIEEE NetSoft 2016 Keynote. June 7, 2016
IEEE NetSoft 2016 Keynote June 7, 2016 0 Contents Introduction - Network Evolution & Operator Challenges Re-architecting the RAN SDRAN: Software-defined RAN - Overview & Enabling Features SDRAN Opportunities
More informationNew Approaches to Connected Device Security
New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the
More informationVMWARE HORIZON CLOUD SERVICE HOSTED INFRASTRUCTURE ONBOARDING SERVICE SILVER
DATASHEET VMWARE HORIZON CLOUD SERVICE HOSTED INFRASTRUCTURE ONBOARDING SERVICE SILVER AT A GLANCE The VMware Horizon Cloud Service Hosted Infrastructure Onboarding Service Silver provides basic assistance
More informationPROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS
PROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS Ioannis Giannoulakis, Ph.D. National Centre for Scientific Research Demokritos giannoul@iit.demokritos.gr Emmanouil Kafetzakis,
More informationConnect your IoT device: Bluetooth 5, , NB-IoT
Connect your IoT device: Bluetooth 5, 802.15.4, NB-IoT Prithi Ramakrishnan Arm TechTalk 2017 IoT connectivity technologies Multiple standards, different applications Throughput Unlicensed >100Mbps Wi-Fi
More informationAn Architecture. What the MEC? for 5G
An Architecture What the MEC? for 5G What the MEC? An architecture for 5G As we stated in the first e-book in this series, the evolution from LTE to 5G will be the most profound transformation on the wireless
More informationSecure Interworking Between Networks in 5G Service Based Architecture
Secure Interworking Between Networks in 5G Service Based Architecture Silke Holtmanns Nokia 1 Nokia 2016 Nokia Future Attacks and Mitigation Research that
More informationAltice Labs 5G activities
Altice Labs 5G activities IEEE 5G Summit Portugal, Lisbon, ISCTE Luis Miguel Silva 19 January 2017 Altice labs is an Information and Communications Technology company belonging to the Altice Group, a multinational
More informationPartners: NFV/MEC INTRODUCTION. Presented by Dhruv Dhody, Sr System Architect, Huawei India. All rights reserved
Partners: NFV/MEC INTRODUCTION Presented by Dhruv Dhody, Sr System Architect, Huawei India All rights reserved Content Introduction to NFV Introduction to MEC A few snippets of Huawei s Efforts! Open Standards,
More information5G Infinite Acceleration Cisco Knowledge Network. Humberto J. La Roche, PhD, Principal Engineer October 25, 2016
5G Infinite Acceleration Cisco Knowledge Network Humberto J. La Roche, PhD, Principal Engineer October 25, 2016 Our Big Bang the Internet! 2 Internet Is Constantly Growing By year 2020: 82% of the world
More informationCurrent Challenges on SDN Research
Software Defined Networks ISCTE, April 04 2018 Current Challenges on SDN Research Rui L. Aguiar ruilaa@ua.pt Universidade de Aveiro Instituto de Telecomunicações 2005, it - instituto de telecomunicações.
More information2017 Arm Limited. How to design an IoT SoC and get Arm CPU IP for no upfront license fee
2017 Arm Limited How to design an IoT SoC and get Arm CPU IP for no upfront license fee An enhanced Arm DesignStart Building on a strong foundation Successfully used by 1000s of designers, researchers
More informationQoS/QoE in future IoT/5G Networks: A Telco transformation infrastructure perspective.
TIM BRASIL Rio de Janeiro, 29 de Novembro de 2017 QoS/QoE in future IoT/5G Networks: A Telco transformation infrastructure perspective. AGENDA THE CONTEXT: UNDERSTANDING THE SCENARIOS TECHNOLOGIES, ARCHITECTURES
More informationITU-T SG 17 Q10/17. Trust Elevation Frameworks
ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents
More informationImplementing debug. and trace access. through functional I/O. Alvin Yang Staff FAE. Arm Tech Symposia Arm Limited
Implementing debug and trace access through functional I/O Alvin Yang Staff FAE Arm Tech Symposia 2017 Agenda Debug and trace access limitations A new approach Protocol based Bare metal vs mission mode
More informationZTE Intelligent Wireless Network Solution
ZTE Intelligent Wireless Network Solution We are entering a new intelligent era. Under the development of new technologies like AI, cloud computing, big data, 5G and Internet of Things, we will truly realize
More informationInnovation Technology for Future Convergence Network
KRnet 2013 Keynote Speech Innovation Technology for Future Convergence Network Jinsung Choi, Ph.D. EVP, Head of ICT R&D Division, SK Telecom Contents I. Key Trends Driving Network Evolution II. Innovation
More information5G Network Architecture: Standard Progress, and Tranfromation to SBA and Network Slicing. Wei Chen,
5G Network Architecture: Standard Progress, and Tranfromation to SBA and Network Slicing Wei Chen, chenweiyj@chinamobile.com China Mobile Contents 5G Network Architecture Standard Progress 5G Network funtional
More information5G Mobile Network R&D In Japan
Document No: Source: Contact: Agenda Item: GSC- 19_305b 5GMF Prof. Akihiro NAKAO, The University of Tokyo, TTC 5.6 Strategic Topic #3:IMT- 2020/5G 5G Mobile Network R&D In Japan Prof. Akihiro NAKAO, The
More informationKey Trust issues related to NNAI and Services
ITU Workshop on Future Trust and Knowledge Infrastructure, Phase 2 Geneva, Switzerland 1 July 2016 Key Trust issues related to NNAI and Services Sherif Guinena ITU-T SG2 Chairman Dr.Guinena@NTRA.gov.eg
More informationPreface. Structure of the Book
When the first edition of this book was published back in 2008, the scope was anything to do with smart cards and security tokens in the widest sense. The aim was in fact to provide a complete story, looking
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More informationMobile Edge Computing:
Mobile Edge Computing: Accelerating to 5G Era Hannu Flinck January 2016 1 Nokia 2015 Current megatrends Mobile computing, 5G and cloud computing Mobile computing Cloud computing 2 Nokia 2015 Architecture
More informationFigure Potential 5G applications
6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For
More informationNetwork Virtualization Mist to MUST. Ching-Wen Cheng ITRI ICL M
Network Virtualization Mist to MUST Ching-Wen Cheng ITRI ICL M100 2015.03.07 Motivation and background (ITU-T Aspect) Objectives and motivation FNs are recommended to provide services whose functions are
More informationA New Security Platform for High Performance Client SoCs
A New Security Platform for High Performance Client SoCs Udi Maor, Sr. Product manager, Client Line of Business October 2018 udi.maor@arm.com Agenda What are Client devices? Arm s approach to Trusted Execution
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationA Perspective on Multi-Access Edge Computing. Frank Rayal. January San Francisco Singapore Dubai Paris
A Perspective on Multi-Access Edge Computing Frank Rayal January 2017 San Francisco Singapore Dubai Paris Page 2 Overview The convergence of the Internet and telecommunication networks is igniting a debate
More information5G networks use-cases in 4G networks
5G networks use-cases in 4G networks 5G Networks offering superior performance are just around the corner! Wait! Are applications that maximize the benefits of these networks ready? Contents 5G networks
More informationHOT TOPICS LED BY ETSI - 5G AND IOT
HOT TOPICS LED BY ETSI - 5G AND IOT ILNAS workshop Luxembourg 7 July 2017 AGENDA 5G and its building blocks IoT THE THREE HIGH LEVEL 5G USE CASE FAMILIES Enhanced Mobile Broadband Massive Machine Type
More informationGTI Sub-6GHz 5G Core Network
GTI Sub-6GHz 5G Core Network http://www.gtigroup.org 1 GTI Sub-6GHz 5G Core Network White Paper Version: V0.3 Deliverable Type Confidential Level Working Group Procedural Document Working Document Open
More informationITU-T Study Group 13 Overview
4 th SG13 Regional Workshop for Africa on Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data (Accra, Ghana, 14-15 March 2016) ITU-T Study Group 13 Overview Leo Lehmann (Dr.
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationConnect Your IoT Device: Bluetooth 5, , NB-IoT
Connect Your IoT Device: Bluetooth 5, 802.15.4, NB-IoT Craig Tou Business Development Manager, Arm Arm Tech Symposia 2017, Taipei IoT Devices - Everything Connects New classes of connectivity for a new
More informationHuawei SoftCOM Reshaping the future of network architecture
With its basis in SDN and cloud computing, Huawei s SoftCOM strategy helps telcos reduce cost and enhance network utilization & operational efficiency. 3SOFTCOM Huawei Communicate 04 10 Huawei SoftCOM:
More informationIoT Security and Risk Management
SESSION ID: GPS1-R03 IoT Security and Risk Management Tyson Macaulay Chief Security Strategist, Fortinet IoT Security is a BIG STORY! Security as a % of IT Budget 4% 7% 20 Billion+ devices? 2% Source:
More information5G-ENSURE Workshop, ETSI Security Week Sophia Antipolis, 16 June Mike Surridge, University of Southampton IT Innovation Centre
5G-ENSURE (Project Number 671562) A Trust Model for 5G 5G-ENSURE Workshop, ETSI Security Week Sophia Antipolis, 16 June 2017 Mike Surridge, University of Southampton IT Innovation Centre ms _at_ it-innovation.soton.ac.uk
More informationWipro* Real-Time 5G User Experience Analytics Uses Intel Network Edge Virtualization SDK
white paper Communications Service Providers Service Assurance Wipro* Real-Time 5G User Experience Analytics Uses Intel Network Edge Virtualization SDK The need for service level agreements and consistent
More informationSDN and NFV as expressions of a systemic trend «integrating» Cloud, Networks and Terminals
SDN and NFV as expressions of a systemic trend «integrating» Cloud, Networks and Terminals Antonio Manzalini, Chair of the IEEE SDN initiative Bobby Wong, Program Director SDN-NFV Standardization Committee
More informationOpenFog Reference Architecture. Presented by Dr. Maria Gorlatova OpenFog Consortium Communications Working Group Co-chair, Technical Committee Member
OpenFog Reference Architecture Presented by Dr. Maria Gorlatova OpenFog Consortium Communications Working Group Co-chair, Technical Committee Member My background Associate Research Scholar at Princeton
More informationMobile Edge Computing
Mobile Edge Computing A key technology towards 5G 1 Nurit Sprecher (Chair of ETSI MEC ISG) 5G World 2016, London, UK 5G Use Cases and Requirements 5G Use Cases Families and Related Examples Build a virtual
More informationSmart City in the 5G Era
Smart City in the 5G Era Forging Ahead in 2017 RMB 10 bn+ R&D investment 57 application systems for 20+ cities Data sharing in 30+ cites 1,000+ ecosystem partners 52 counties along the Belt and Road 2
More informationWhat can the OnBase Cloud do for you? lbmctech.com
What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationThe Internet of Things
1 The Internet of Things The Internet of Things (IoT) is a new vision of the Internet in which any type of object or thing that generates or consumes data on the network can be connected. It is the evolution
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationTechnology Convergence IMT-2020, Cloud Computing and Big Data including Trust. Gyu Myoung Lee
Fifth SG13 Regional Workshop for Africa on ITU-T Standardization Work on Future Networks: Towards a Better Future for Africa (Cairo, Egypt, 02-03 April 2017) Technology Convergence IMT-2020, Cloud Computing
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationOutcomes of the ITU Regional Workshop on the Internet of Things (IoT) and Future Networks. (19-20 June 2017, Saint Petersburg, Russia)
Outcomes of the ITU Regional Workshop on the Internet of Things (IoT) and Future Networks (19-20 June 2017, Saint Petersburg, Russia) Current situation International standardization of IoT, future networks
More informationIoT privacy risk management in ANASTACIA project
ANASTACIA has received funding from the European Union s Horizon 2020 Research and Innovation Programme under Grant Agreement N 731558 and from the Swiss State Secretariat for Education, Research and Innovation.
More informationDynamIQ Processor Designs Using Cortex-A75 & Cortex-A55 for 5G Networks
DynamIQ Processor Designs Using Cortex-A75 & Cortex-A55 for 5G Networks Jeff Maguire Senior Product Manager Infrastructure IP Product Management Arm 2017 Arm Limited Arm Tech Symposia 2017 Agenda 5G networks
More informationMavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales
Mavenir Keynote Think Smarter Secure communication Innovate Services By Mohamed Issa Regional Head of Africa Sales The New Mavenir: Combining Market Leaders Combing three industry-leading companies to
More informationEvolution of connectivity in the era of cloud
Evolution of connectivity in the era of cloud Phil Harris SVP and GM SP Market Vertical Riverbed Technology 1 2017 Riverbed Technology. All rights reserved. Transformational Services Span The Business
More informationMobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK
Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK 1 ETSI 2013. All rights reserved Trends and market drivers Growth in mobile
More informationETSI Zero touch network and Service Management (ZSM)
ETSI Zero touch network and Service Management (ZSM) Enabling agile service delivery and new business opportunities Presented by: Klaus Martiny, Chair, ETSI ISG ZSM For: NFV SDN World Congress 2018 11.10.2018
More information5G Network Control in ITU-T SG13: perspective and challenges
ITU-T Workshop on "Control plane of IMT-2020 and emerging networks. Current issues and the way forward" Geneva, Switzerland, 15 November 2017 5G Network Control in ITU-T SG13: perspective and challenges
More information5g and standards: managing complexity, ensuring interoperability
5g and standards: managing complexity, ensuring interoperability SHIV K. BAKHSHI, Ph.D., VP, INDUSTY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU-D regional workshop on emerging technologies, algiers, Algeria,
More informationLeo Lehmann (Dr. Leo) Chairman ITU-T SG13
The position of ITU-T Study Group 13 in global IMT2020/ 5G Standardization: Softwarization, Fix Mobile Convergence and Data Aware Networking Leo Lehmann (Dr. Leo) Chairman ITU-T SG13 ITU-T SG13 & IMT2020/
More informationSetting a National Cybersecurity Standard for Telecom Operators
Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Setting a National Cybersecurity
More informationAthens, Greece _ October 25, /26
A Comparative Assessment between Architectural innovations coming from the and the 5G Projects Alexandros Kostopoulos, Ph.D. Research Programs Section, Fixed Research & Development Fixed & Mobile, Technology
More informationWhere is satellite going to move the day after tomorrow? Tomaso de Cola, DLR
DLR.de Chart 1 Where is satellite going to move the day after tomorrow? Tomaso de Cola, DLR Visions for Future Communications Summit 23 rd -24 th October 2017, Lisbon, Portugal DLR.de Chart 2 Background
More informationWhy PartnerDirect. Choice, flexibility, simplicity
Why PartnerDirect Choice, flexibility, simplicity What you will learn today Dell s Channel business PartnerDirect program Journey, success, analysts and beyond Performance Experience Action 2 Why PartnerDirect
More informationSG13: Future networks, with focus on IMT-2020, cloud computing and trusted network infrastructures
SG13: Future networks, with focus on IMT-2020, cloud computing and trusted network infrastructures All about networks Dr. Leo Lehmann Chairman SG13 Presented by: Dr. Rim Belhassine-Cherif Vice Chairman
More informationMobile WiMAX Security
WHITE PAPER WHITE PAPER Makes Mobile WiMAX Simple Mobile WiMAX Security Glossary 3 Abstract 5 Introduction to Security in Wireless Networks 6 Data Link Layer Security 8 Authentication 8 Security Association
More informationSystems Engineering for Software-Defined Network Virtualisation. John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra
Systems Engineering for Software-Defined Network Virtualisation John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra Agenda Motivation Case Studies Opportunities and Challenges
More informationDynamIQ Processor Designs Using Cortex-A75 & Cortex- A55 for 5G Networks
DynamIQ Processor Designs Using Cortex-A75 & Cortex- A55 for 5G Networks 2017 Arm Limited David Koenen Sr. Product Manager, Arm Arm Tech Symposia 2017, Taipei Agenda 5G networks Ecosystem software to support
More informationAgenda. 1. 5G Brasil Structure 2. Scenarios 3. Vertical Markets 4. Technological Trends 5. 5G at Inatel 6. Conclusions
5G for Remote Areas Agenda 1. 5G Brasil Structure 2. Scenarios 3. Vertical Markets 4. Technological Trends 5. 5G at Inatel 6. Conclusions 5G Brazil Project Private autonomous project under Telebrasil
More informationVodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.
How smart networks are changing the corporate WAN Vodafone keynote Peter Terry Brown Director of Connectivity & UC 17 October 2017 About Vodafone Enterprise Connectivity & UC IoT Cloud & Security Our vision:
More informationELASTIC SERVICES PLATFORM
ELASTIC SERVICES PLATFORM SIMPLIFYING SERVICE DELIVERY The telecom industry is at the dawn of a bright new era - one in which new services and technologies, such as 5G, IoT, and smart cities, hold promise
More informationDr. Sergi Figuerola CTIO, M:
Dr. Sergi Figuerola CTIO, i2cat sergi.figuerola@i2cat.net @sfiguerola M: +34.675.780.950 Why Barcelona? The city of Barcelona gathers all the necessary elements to become a reference city and a pioneer
More informationИтоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан)
Итоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан) Фарид Нахли, координатор программ, Региональный офис МСЭ 1 Санкт-Петербург, 19-20 июня 2017
More informationHard Slicing: Elastic OTN and Wavelength Slicing
NETWORK SLICING 5G will enable carriers to expand their service offering to include a complete range of telecoms services to individuals, businesses, enterprises and critical industries. However, each
More informationThe 5G Infrastructure Public-Private Partnership. Phase 2 Pre-structuring Model EC Info Day Athens Dr. Didier Bourse
The 5G Infrastructure Public-Private Partnership Phase 2 Pre-structuring Model EC Info Day - 30.06.16 - Athens Dr. Didier Bourse 1 Outline Model Approach Model Scope & Coverage Model Specificities Model
More informationTransformation Through Innovation
Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today
More informationTransition to IP & IPX Working Group IP/IPX a key pre-requisite to further transformation
Transition to IP & IPX Working Group IP/IPX a key pre-requisite to further transformation Survey in 2016 : migration to IP & IPX is slow IPX is still perceived as a gray area Major obstacles impacting
More informationITU Workshop on Telecommunication Service Quality. Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN
ITU Workshop on Telecommunication Service Quality Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN Evgeny Romanov, Solution Engineer, InfoVista www.infovista.com VistaInsight,
More informationTB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored
the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of
More informationARCHITECTURE MATTERS. Dilbert by Scott Adams
ARCHITECTURE MATTERS Dilbert by Scott Adams 1 TELECOMMUNICATIONS MEET IT, T-Mobile, Josef Trčka and Ondřej Macháček AGENDA 01 Telecommunication standardization 02 Generations of mobile systems 03 Current
More information