| 리포트 | 기술문서 | 테크-블로그 | 글로벌 블로그 | 원샷 갤러리 | 통신 방송 통계  | 한국 ICT 기업 총람 |

제품 검색

| 네트워크/통신 뉴스 | 기술자료실 | 자유게시판 |  
 
 
섹션 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/UHD IoT SDN/NFV Wi-Fi Video Streaming KT SK Telecom LG U+ OTT Network Protocol CDN YouTube Data Center
 
스폰서채널 |

 

  스폰서채널 서비스란?
5G Internet of Things
5G Internet of Things
September 09, 2016 | By Anand R. Prasad @ 3GPP/NEC
banner
코멘트 (0)
1
 

3GPP security working group (SA3) 의장이며 NEC에 Chief Advanced Technologist인 Anand R. Prasad님이 보내온 기고글입니다.

Anand R. Prasad 

Chairman of 3GPP security working group (SA3) and Chief Advanced Technologist at NEC

 

This is first part of the article based on several talks I have given on 5G security since last year. In this part I present my views about 5G. On purpose I have avoided discussion on various activities regarding 5G around the globe (3GPP, ITU etc.). 

 

5G is expected to bring several changes in mobile communications system but watch that these changes are not something that will happen couple of years down the road instead they are already happening. First flavor of 5G is expected to be available in 2018 with the complete solution available in the market by 2020. With digitization on its way to touch every part of life, Internet of Things (IOT) will be integral part of 5G from the very beginning; this is unlike 4G where IOT came later.

 

In the following we will go through some of the key changes 5G is expected to bring. In the next article I will discuss security aspects.

 

 

(Core) Network

 

As we move ahead, virtualization technology (network function virtualization or NFV) and software defined network (SDN) for mobile core networks will become mature and actually bring down the cost while achieving the quality requirement. This will lead to the network (core network) being increasingly built of off-the-shelf hardware and open source software, virtualization will become common and cloud based mobile network will become available. It is expected that the network should accommodate multiple radio technologies. 

 

Changes mentioned above (virtualization and cloud) will allow networks to be launched for a specific service, a concept now being termed as network slicing or just slicing - this is what I call as vertical network that fulfill specific requirements in contrast to horizontal networks today that cater for all services. Virtualization and cloud also means that the network will become more open and accessible that will lead to network border going deeper in the network, i.e. instead of network elements as end-point a software module in the server farm will be the end-point and this end-point can migrate to different locations.

 

Radio Access Technology

 

Radio access technology will see several improvements with data-rates available from few bits going up to several gigabits, delays going down to micro- if not nano-seconds (compare it with millisecond range in today’s system). Radio access network will also become partially virtualized and cloud based.

 

Spectrum

 

Spectrum used for 5G will be different, there have been discussions of higher GHz bands, and thus the radio characteristics will be very different as well. The spectrum will have implications on coverage and behavior of radio access technology.

 

With the arrival of 5G, we should also expect wider usage of cognitive radio in mobile networks and aggregation with unlicensed band as well as usage of unlicensed band technologies.

 

Security Credentials

 

Given the variety of scenarios and technologies expected to come in use for 5G, it is worth questioning whether the security credentials should stay the same as today and whether there will be change in technology for storage of credentials. Change in security credentials could have implications on authentication and other security mechanisms.

 

Storage of security credentials can be seen from both network and device side. From the network side the storage is in terms of location, whether the security credentials are stored at the mobile network domain or at partner domain. Implication is the change in authentication end-point and transfer of session related security credentials to appropriate network functions after completion of authentication.

 

With regard to security credential storage in devices one can consider three different forms of storage (1) secure hardware environment as we have today in the form of UICC that is commonly known as SIM card, (2) embedded secure hardware environment, e.g. a UICC or similar device is implemented in a modem, this brings us to something like embedded SIM and (3) some form of software.

 

End Devices

 

End devices will see huge transformation together with technology enhancements that we are seeing around us. Already with the arrival of 4G we have seen increased usage of smartphone and over the top (OTT) services. As we move towards 5G we will see increased number of smart “devices” as well as a whole variety of IOT devices associated to a plethora of services, there will be wearables in common use and also virtual or augmented reality (VR or AR) type devices commonly available. Open source devices are available since a while now; we should expect increased usage of such devices as we move towards 5G.

 

With 5G we should expect mobile devices (all types like smart devices, IOT, VR, AR) to be reachable over Internet Protocol (IP) addresses, i.e. they will be directly connected to the Internet. On the other end of the spectrum there will be devices requiring long battery life (say 10 years) that are expected to work at very low data rates. 

 

Services

 

Services for VR, AR, IOT, smart devices and many more will appear as 5G will provision a platform that can fulfill variety of requirements. These services will be provisioned by the mobile operator or by a third party with or without business relation with the mobile operator.

 

Over the top (OTT) services are already there that have the potential of leading to potential cyber-attacks through malware, phishing etc. Sponsored data should be a source of revenue for mobile operators but misuse here leads to operator making financial loss.

 

Business

 

We are already seeing change in business model of mobile operators. One such change is in the form of APIs being made available for third parties to launch services over the mobile network. 

 

With 5G in picture we will also see operators getting in partnership with other companies to provision the services. This would mean that the partners would own the subscribers while the operator would be responsible for correct usage of the licensed spectrum.

 

User Space

 

5G will have much deeper penetration in the society than any of the technologies to-date. This equates to technology being used by savvy users like millennials and also Information and Communication Technology (ICT) illiterates who will leap-frog directly to the new technology. Thus the technology will go to the deepest part of life; not just human beings but animals (e.g. for vital information) and plants (e.g. for watering) will also get connected with IOT.

 
Thank you for visiting Netmanias! Please leave your comment if you have a question or suggestion.
View All (969)
5G (67) AI (5) ALTO (1) AR (2) ARP (6) AT&T (1) Akamai (5) Authentication (5) BT (1) Backhaul (2) Big Data (2) Bridging (5) C-RAN/Fronthaul (17) CDN (20) CIoT (2) CPRI (6) Carrier Aggregation (5) Charging (2) China Mobile (2) Cisco (6) CoMP (3) Comcast (1) DHCP (6) DNS (15) Data Center (15) EDGE (10) EMM (1) EPS Bearer (7) Ethernet (3) FTTH (8) GSLB (5) Gigabit Internet (17) Google (17) Google Global Cache (8) Google TV (1) HLS (5) HTTP (5) HTTP Adaptive Streaming (7) HTTP Progressive Download (2) Handover (5) Huawei (1) IGMP (3) IP (6) IP Allocation (8) IP Routing (20) IPSec (4) IPTV (25) IoST (2) IoT (44) KT (45) Korea (8) Korea ICT Vendor (1) L3 Switch (5) LG U+ (24) LTE (99) LTE-A (10) LTE-A Pro (1) LTE-M (1) LTE-U (3) LoRa (5) MEC (10) MPLS (3) MWC 2013 (1) MWC 2015 (3) MWC 2016 (2) MWC 2017 (1) Mobile IPTV (1) Multi-Screen (1) Multicast (2) NAT (9) NB-IoT (6) NTT Docomo (1) Netflix (5) Network Protocol (49) Network Slicing (3) OSPF (3) OTT (20) Operator CDN (1) P2P (3) PS-LTE (3) Pooq (2) QoS (5) RCS (1) RRH (1) Request Routing (3) SD-WAN (8) SDN/NFV (34) SK Broadband (1) SK Telecom (38) Samsung (2) Security (8) Self-Driving (3) Shortest Path Tree (2) Small Cell (3) Spectrum Sharing (1) TAU (2) Transparent Caching (9) UHD (7) VLAN (2) VPN (3) VR (3) Video Streaming (22) VoLTE (1) VoWiFi (1) WAN Optimization (1) Wi-Fi (30) WiBro(WiMAX) (2) YouTube (16) eICIC (1) eMBMS (1) ePDG (6) u+ tv G (4) 로컬 5G (1)

 

 

     
         
     

 

     
     

넷매니아즈 회원 가입 하기

2019년 1월 현재 넷매니아즈 회원은 49,000+분입니다.

 

넷매니아즈 회원 가입을 하시면,

► 넷매니아즈 신규 컨텐츠 발행 소식 등의 정보를

   이메일 뉴스레터로 발송해드립니다.

► 넷매니아즈의 모든 컨텐츠를 pdf 파일로 다운로드

   받으실 수 있습니다. 

     
     

 

     
         
     

 

 

비밀번호 확인
코멘트 작성시 등록하신 비밀번호를 입력하여주세요.
비밀번호