Newsletter

 

For a Free Quote...

Latest Blog Posts

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.
5 minutes reading time (1008 words)

5G Security

5G has introduced a number of improvements in security compared to 4G. 5G standards development has adopted 'Secure by Design' principles, using for example Mutual Authentication and acknowledging that all links could be tapped, but making sure that the encrypted information is worthless when intercepted.

Security is a wide topic and has different angles to it, for example, ITU-T has defined eight security dimensions shown in the table below. While these are important factors, this blog focuses more on the 5G network security measures and attempts to bring how to utilize data regardless of regulation and tight security in the summary section. 

Security Dimension Description
Access control Protects against unauthorized use of network resources
AuthenticationConfirms identities and ensures validity of claimed identities
Non-repudiationMeans for associating actions with entities
Data confidentialityData protection from unauthorized disclosure
Communication securityInformation flow only allowed between authorized end points
Data integrityCorrectness and accuracy of data
AvailabilityNo denial of authorized access to network resources or data
PrivacyProtection of information that might be derived from the observation of network activities

The importance of security is increasing continuously as we become more and more dependent on digital services. The number of connections is increasing exponentially with M2M and IoT. Therefore, aspects such as trusted ID, trusted SW, secure configuration, trustworthy data, protected communication, privacy and physical security are gaining more relevance not only in IoT communication, but in telecommunications in general.

Subscriber and Device Protection

5G has several enhancements in subscriber security:

  • Protects the confidentiality of the initial non-access stratum (NAS) messages between the device and the network. It is no longer possible to trace user equipment (UE) using current attack methodologies over the radio interface, protecting against man in the middle (MITM) and fake base station (Stingray/IMSI catcher) attacks.
  • Home control – a mechanism that requires the home network to check the authentication status of the device in the visited network preventing various roaming fraud types.
  • Unified authentication, for example, for WLAN, allowing 5G networks to manage previously unmanaged and unsecured connections.
  • User plane integrity checking, ensuring the user traffic is not modified during transit.
  • Enhanced privacy protection with the use of public/private key pairs to conceal the subscriber's identity.

UE keys are stored in the Universal Subscriber Identity Module (USIM) and the home environment to enable network access security. There are two trust domains, tamper proof universal integrated circuit card on which the USIM resides as a trust anchor and the Mobile Equipment.

Subscription Permanent Identifier (SUPI), equivalent to IMSI in 4G, is encrypted and available as SUCI, Subscriber Concealed Identifier. Naturally, the air interface between UE and gNB is encrypted.

Network protection

RAN is separated into Distributed Units (DU) and Central Units (CU). DU doesn't have any access to customer communications. IPSec is typically used for the connection from gNB to backhaul.

On the core side AMF serves as a termination point for NAS security. AMF is co-located with Security Anchor Function (SEAF) that holds the root key for the visited network. Authentication Credential Repository and Processing Function (ARPF) is co-located with UDM and stores long-term security credentials.

5G also introduces a new network architecture element: the Security Edge Protection Proxy (SEPP). The SEPP protects the home network edge, acting as the security gateway on interconnections between the home network and visited networks. Its main functionality includes:

  • Application layer security and protection against eavesdropping and replay attacks
  • End-to-end authentication, integrity and confidentiality protection via signatures and encryption of all HTTP/2 roaming messages
  • Key management mechanisms for setting the required cryptographic keys and performing the security capability negotiation procedures
  • Message filtering and policing, topology hiding and validation of JSON objects, including cross-layer information checking with address information on the IP layer
  • Enhanced security of the international roaming services to overcome the existing security risks linked to SS7 and Diameter usage.

5GC security

5GC introduces a new set of protocols and processes to secure the core functions. These include:

  • HTTP/2 communication between cloud native functions (CNF) in the core
  • TLS providing encrypted communication between all CNF
  • HTTP/2 over N32, replacing Diameter over the S6a reference point
  • More secure cipher suites

Network domains and security

Telecom networks are often divided into four distinctive parts: Access and core network, transport and interconnect network that connects different core networks with each other.

It is clear that 5G has increased security in many ways compared to previous telecom generations. New features such as network slicing and 5GC bring new ways of having a safe network, but they also carry potential dangers. Kubernetes and container security require new thinking in security management, for example, secure container lifecycle management is a must.

CSPs and security

CSPs are definitely facing a huge challenge with all the security technologies and threats. It is one thing to secure the network properly, but at the same time, the CSP's existence and success depends on how well subscribers are served. Understanding subscriber behaviour is even more important than before.

This creates a bit of a dilemma for the CSPs. How to run a secure network and still have visibility in the subscribers?

Network visibility stays as a cornerstone to understanding what happens in the network. Despite the multi-layer security measures, the data flow and messages need to be decrypted before any actions can be done. The point of decryption allows having legitimate extraction of data, for example, from 5GC or User Plane data after it has run through Security GW.

The increasing number of attacks, regulators' tightened requirements and a massive increase in data volumes demand the CSPs to plan the data extraction points more carefully and, in many cases, even add encapsulated encryption with anonymisation. With careful planning and the right solution, monitoring the data and getting insights into subscribers' behaviour is still possible.

×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

Latency vs. Jitter: Monitoring network performance
Remote network analysis with IOTA
 

Comments

No comments made yet. Be the first to submit a comment
Wednesday, 24 July 2024

Captcha Image

Contact Us

Address:

Telnet Networks Inc.
1324 Andersen Drive
Kingston, ON  K7P 0C6
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.