5G Revolution & Service security in Korea

Similar documents
USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES

5G a Network Operator s Point of View. Tilemachos Doukoglou, Ph.D. Cosmote / OTE S.A. Labs

Mobile-enabled THe 5G future

A look into the 3GPP future 2012 of 3GPP 5G

5G-ENABLING INDUSTRY AND SOCIETY TRANSFORMATION. Željko Popović, Vanesa Čačković

The 5G Business Potential. Terminsstart Telekom 2017 Monika Byléhn, 5G marketing director


IMT2020/ 5G Standardization In ITU-T Study Group 13. Hans (Hyungsoo) KIM Vice-chairman ITU-T SG13

Virtualization's Role in Realizing the 5G Vision

Figure Potential 5G applications

5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015

5G Network Slicing: Use Cases & Requirements

Mobile Edge Computing

Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK

5G Network Softwarization: Key issues and Gap Analysis. Yachen Wang

5G: from analysis to action

Enhanced EMBB for 5G Services Thales-Alenia Space Focus 5G-Satellite future services KeeTae KIM, Business Development Director / Thales Korea

Une vision d opérateur sur les usages et déploiements de la 5G. Eric Hardouin, Orange Labs 26 September 2017

Network Slicing for verticals and private networks

5G Journey: Path Forward

5G Use Cases & Opportunities

IoT with 5G Technology

What s 5G? Dr Dean Economou Chief Transport Strategist, Telstra

5G is viewed as new ecosystem from end-to-end, harnessing both evolutionary as well as revolutionary technologies to:

From 4G to 5G TDD Paves the Way for Future Mobile Broadband

Bringing 5G into Reality

Hard Slicing: Elastic OTN and Wavelength Slicing

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Leo Lehmann (Dr. Leo) Chairman ITU-T SG13

5G enabling the 4th industrial revolution

4G and 5G Cellular Technologies Enable Intelligent Transportation Use Cases

Takashi Shono, Ph.D. Intel 5G Tokyo Bay Summit 2017

The Programmable World Opportunities and Challenges

E2E Network Slicing - Key 5G technology

Network Vision: Preparing Telefónica for the next generation of services. Enrique Blanco Systems and Network Global Director

Mobile Edge Computing:

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Broadband for Digital Transformation

ABOUT THE WIRELESS BROADBAND ALLIANCE ABOUT NGMN ALLIANCE

The New Open Edge. IOT+Telecom+Cloud+Enterprise

5G from Myth to Reality: The why, when, where, what and how of 5G standards

Importance of 5G (IMT-2020) for High-Speed & High Quality Broadband Development

5G SIM: Maximising MNO Investment in 5G Networks

Status of KT s 5G trial service at PyeongChang Winter Olympic Games

5G Impact: Remote Surgery Enabled via InterDigital s EdgeLink mmw Transport InterDigital, Inc. All Rights Reserved.

5G Techniques for Ultra Reliable Low Latency Communication. Dr. Janne Peisa Principal Researcher, Ericsson Research

Unleashing the potential of 5G. Guillaume Mascot Head of Government Relations APJ

ONAP 5G Blueprint Overview. ONAP Promises to Automate 5G Deployments. ONAP 5G Blueprint Overview 1

Integrating Autonomic Slice Networking in NFV

ITU Workshop on 5G Security

5G networks use-cases in 4G networks

WIND RIVER NETWORKING SOLUTIONS

Driving network transformation DAN RODRIGUEZ VICE PRESIDENT DATA CENTER GROUP GENERAL MANAGER COMMUNICATIONS INFRASTRUCTURE DIVISION

The importance of RAN to Core validation as networks evolve to support 5G

National Institute of Standards and Technology

5G, its Challenges, & how to deal with these challenges

5G and Open Source Networking

DECT and ULE Addressing the requirements of IMT2020

Future X Network. Sanjay Kamat Managing Partner, Bell Labs Consulting Nokia

Since the 1980s, a new generation of

Big Data for Smart Cities Connected Vehicles in the Wireless World

Enabling Smart Energy as a Service via 5G Mobile Network advances

Making 5G Real. Ericsson Internal Guilherme Alves Ericsson

New Testing Paradigm for 5G IoT Ecosystem

ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, Feb. 2017

Four Steps to Help LTE Operators Prepare for 5G

Towards Integration of Slice Networking in NFV

NGMN 5G Vision for Vertical Industries. Philipp Deibert 3 rd November 2016 Managing Rail Mobile Communications Evolution

R&D Status of IMT-2020 (5G) Promotion Group. WANG Zhiqin May 24, 2017

Innovations in Edge Computing and MEC

Towards 5G RAN Virtualization Enabled by Intel and ASTRI*

Third annual ITU IMT-2020/5G Workshop and Demo Day 2018

Wireless Connectivity technologies evolution for Internet of Things and Machine to Machine communication

An Architecture. What the MEC? for 5G

Making 5G a commercial reality

5G How will NRENs Evolve?

IEEE-SA Internet of Things - Security & Standards

5G NR standards in 3GPP

Sanjeev Athalye, Sr. Director, Product Management Qualcomm Technologies, Inc.

4G Americas The Voice of 5G for the Americas

5G in the Automotive Industry A Telecoms Manufacture's view Preben Mogensen, Nokia Networks Fellow & Professor at Aalborg University

Leading the Path to 5G

Dr. Fiona Williams Ericsson

5G PPP From Research to Standardization. 5G PPP WG Pre-Standardization

5G and Licensed/Unlicensed Convergence

Ericsson networked society. 27 th of September 2017, Espoo

5G Enables Enterprise

Standardized M2M Software Development Platform Contents

Strong Security Elements for IoT Manufacturing

Nokia AirGile cloud-native core: shaping networks to every demand

IT & Communications Recommendations for RESERVE ICT

The conclusions a SUMMARY

RANtoCoreTM. Delivering the most realistic test environments

The Internet of Things

5G Network Architecture

IMT-2020 NETWORK HIGH LEVEL REQUIREMENTS, HOW AFRICAN COUNTRIES CAN COPE

Toward Energy Data Platform in Korea

Orange. On the road to. Jean Michel SERRE CEO of Orange Japan-Korea

Hoover 5G Technology Dr. Kirti Gupta Vice President, Technology & Economic Strategy, Qualcomm Inc. January 10, 2019

Cisco Connected Factory Accelerator Bundles

Transcription:

5G Revolution & Service security in Korea 2018.03.19. Jae Hoon Nah

5G Standardization timeline Standards development & deployment Source: IHS 2

Usage scenario for 5G (ITU-R) 3

Potential opportunities of 5G HSN 18 4

One network, multiple industries HSN 18 5

5G Requirements (ITU-R M.2083) HSN 18 6

Korean activities in 5G HSN 18 7

Trial service & commercial service HSN 18 8

5G use cases (I) Enhanced Mobile Broadband Extending cellular coverage into a broader range of structures Improving capacity to handle a significantly greater number of devices using high volumes of data, especially in localized area. Massive Internet of Things Enabling the scale of MIoT Mission Critical Services Supporting applications that require high reliability, ultra-low latency connectivity with strong security and availability Source: IHS 9

5G use cases (II) Enhanced Mobile Broadband (Big Pipe) Enhanced indoor wireless broadband coverage Enhanced outdoor wireless broadband Fixed wireless broadband deployments Enterprise teamwork / collaboration Training / education Augmented and virtual reality (AR/VR) Extending mobile computing Enhanced digital signage Source: IHS 10

5G use cases (III) Massive Internet of Things (Massive Connectivity) Asset tracking Smart agriculture Smart cities Energy / utility monitoring Physical infrastructure Smart homes Remote monitoring Beacons and connected shoppers Source: IHS 11

5G use cases (IV) Mission Critical Services (Zero Latency) Autonomous vehicles Drones Industrial automation Remote patient monitoring / telehealth Smart grid Source: IHS 12

Commercialization - Services HSN 18 13

5G security framework Flexible and scalable security architecture Virtualization and dynamic configuration for 5G promotes new dynamic and flexible security architecture Security for RAN signaling could be located close to the access (e.g., virtualization) with a higher degree of independence to the user plane security, allowing more robust security (key distribution, key isolation, etc.) 5G radio network security Attack resistance of radio networks to threats such as Denial of Service from potentially misbehaving devices Adding mitigation measures to radio protocol design Utilize available trusted computing technologies Virtualization security (ETSI NFV SEC) Network virtualization with high assurance of VNF isolation to simplify the handling of diverse security requirements in common infrastructure Use existing trusted computing tools (TCG) and concepts for Virtualized Platform Integrity root of trust remote attestation device integrity monitoring secure storage Cloud-friendly data encryption (homomorphic encryption, allowing operations on encrypted data). Identity management 5G open identity management architecture Billions of heterogeneous end-devices, sensors, network nodes with variable security capabilities, device attributes, and policies Allow enterprises with an existing IDM solution to reuse it for 5G access. New ways to handle device/subscriber identities with network slicing, enabling different IDM solutions per slice Energy-efficient security Most constrained, and batterydependent devices with a long life time might be separated in specialized energy-efficient lightweight network slice Need to compare energy cost of encrypting one bit vs. transmitting one bit and consider hardware acceleration benefits Security assurance Deployment of heterogeneous hardware and software components creates greater need for security certification System state attestation needs to be communicated between entities to provide assurance in platform integrity Multi-layer security certification scheme is needed to efficiently create and traverse certification records NextGen(5G) Security & platform integrity

Application security aspect for 5G New trust model and Identity management Hybrid authentication management Combination of device identity and service identity From device-based management to user-based management Service-oriented security Build E2E Security Flexible security architecture to support-security attributes for different network slices A uniformed security management framework for multi-vendor environment Open Up security capabilities, and provide security as a service Isolate virtual network slices 5G security: forward thinking Huawei white paper

Thank you