Several security frameworks may co-exist in the future, and 5G is likely to re-use existing solutions used today for 4G networks and the cloud (SEs, HSM, certification, Over-The-Air provisioning, and KMS).
The standard for strong mutual authentication for 5G networks was finalized in 2018.
The need for 5G security, privacy, and trust will be as strong as for 4G, if not stronger, with the increased impact of IoT services.
Local SEs in devices can secure network access and support secure services such as emergency call management and virtual IoT networks.
5G connectivity promises to break traditional paradigms of data delivery by providing network connectivity almost everywhere.
New business opportunities drive data-in-motion security requirements to include network transparency, low latency, high-level bandwidth, consistency in delivery, and complete interoperability.
To accommodate this new paradigm in data delivery, the build-out of 5G infrastructures is underway.
Older, more traditional data in motion security methods are no longer viable solutions to meet these diverse 5G requirements.
Additionally, these older technologies cannot meet today’s challenges of auditable compliance and the not-so-distant future's quantum threat challenges.
Security, performance, interoperability, and auditable compliance are just a few of the 5G challenges that require immediate attention.
There is a need for a more intelligent data-in-motion security solution that can accommodate the diverse range of 5G use cases.
Posted By :
Annapurna Nigam
(Blogger)
2021-05-06 18:46
See Author's other Published Topics
Peoples
Peoples
Comments...
Write Your Comment