5G technologies will pose new security issues

Networks Asia staff
15 Jun 2016
00:00

Mobile security technologies must evolve in sync with changes to 5G network architecture and diverse application scenarios, according to Dr. Kang Xin, a senior researcher at Huawei's Shield Lab.

Kang gave a keynote speech themed “5G Security: Forward Thinking” during the recent 5G Security Technology Workshop hosted by the Future Forum.

“New 5G technologies will lead to new security issues. In the 5G era, security technologies for networks and devices will be a fundamental concern of operators, service providers, and end users,” noted Kang.

He continued, "The service-driven architecture of 5G network slices will require end-to-end security protection, including virtual security inNFV and SDN. Heterogeneous access networks will need unified authentication architecture to simplify user access.

“To cope with new application scenarios and business models, it's imperative that we introduce new identity management models. As huge amounts of data will be used in the 5G era, encryption and isolation technologies will be needed to protect personal data. To accomplish these goals, all industry players must work together to build secure 5G networks by design."

At the 5G workshop, representatives from academia and industry shared their latest research results. Experts and scholars from Chinese and international mobile operators, manufacturers, scientific research institutions, and universities discussed a range of topics, such as 5G information security, 5G technical verification and testing, 5G spectrums, and the Internet of Vehicles. The event played a critical role in guiding and driving 5G security applications.

Related content

Follow Telecom Asia Sport!
Comments
No Comments Yet! Be the first to share what you think!
This website uses cookies
This provides customers with a personalized experience and increases the efficiency of visiting the site, allowing us to provide the most efficient service. By using the website and accepting the terms of the policy, you consent to the use of cookies in accordance with the terms of this policy.