5g iot security - home - ieee 5g · pdf file5g iot security 4th global wireless summit, 28...

20
5G IOT Security 4 th Global Wireless Summit, 28 November, 2016 Dr. Anand R. Prasad, Fellow IET and IETE Chief Advanced Technologist, Executive Specialist NEC Corporation Chairman 3GPP SA3 Disclaimer: This presentation gives view of the author and not necessarily that of NEC

Upload: ngotuyen

Post on 23-Mar-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

5G IOT Security

4th Global Wireless Summit, 28 November, 2016

Dr. Anand R. Prasad, Fellow IET and IETE

Chief Advanced Technologist, Executive Specialist NEC Corporation

Chairman 3GPP SA3

Disclaimer: This presentation gives view of the author and not necessarily that of NEC

Table of Contents

• Third Generation Partnership Project (3GPP)

• Fifth Generation (5G) Internet of things (IoT)

• 5G IOT Security

3GPP

5 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

3GPP Coordination and Specification Groups

3GPP is the mobile communications specification group. These specifications are accepted as standards by SDOs like ETSI, TTC, ARIB etc.

6 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

3GPP Releases

5G Rel. 14

4G

Data-rate increase with each generation and release. 4G meant “only” packet switched!

7 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

3GPP 5G Time-Plan

▌2 phases for the normative work

Phase 1 to be completed by H2 2018 to address a more urgent subset of the commercial needs

Phase 2 to be completed by Dec 2019 for the IMT 2020 submission and to address all identified use-cases & requirements

Rel-14 Rel-15 Rel-16

Sept.’18 Mar.’20

Details of each phase is under discussion

Jun.’17

8 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

4G to 5G

ProSe (D2D) IOTAggregation

IOPS: Isolated E-UTRAN for Public Safety ProSe: Proximity based Services IOT: Internet Of Things

MCPTTIOPS

MCPTT: Mission Critical Push to Talk for LTE D2D: Device to Device

9 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

4G to 5G

V2X: Vehicle to Everything

4G started with higher data-rate and moved to completely new solutions.

This is the starting point for 5G – 5G is more than just increase in data-rate!

V2X

5G IOT

11 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

5G: IMT-2020 Perspective

human-centric use cases for access to multi-media content, services and data

stringent requirements for

capabilities such as throughput, latency

and availability

very large number devices transmitting a relatively low volume of non-delay-sensitive data

Recommendation ITU-R M.2083-0, 09/2015; IMT: International Mobile Telecommunications

12 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

Requirements

Recommendation ITU-R M.2083-0, 09/2015; IMT: International Mobile Telecommunications

13 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

Use-Cases and Requirements

Recommendation ITU-R M.2083-0, 09/2015; IMT: International Mobile Telecommunications

5G IOT and Security

15 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

NetworkOpen-source, off-the-shelf, virtualization, cloud

End-device

Spectrum

ServicesSponsored data, public safety

BusinessOpen API

Radio Access Technology User spaceSlicing, accommodate

range of technologies(5G, LTE…)

Partners

IOT related

Security credentialseSIM

Huge variation (IOT, smart devices)

new types & storage?

Millennials to ICT first timers

Range of data-rates& mobility

Cognitive, aggregation, unlicensed

16 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

• Authentication

• Identity

• Key management

• Crypto algorithm

• Backward compatibility

• Mobility

• Storage

• Life-cycle

• Monitoring

• Network

• Protocol

• Assurance

17 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

Closed Loop SecurityAudit

Assurance

Action

Monitoring

Incidence Response

Forensics

NetworkGuardian

18 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

Secure Network as a ServiceMonitor-

ing

AnalysisControl

Dynamic Policies

Analysis• Error• Database/Signatures• Artificial intelligence• Human resource

Secure network as a service is a new form of profit generation for the complete value chain

19 © NEC Corporation 2016 Dr. Anand R. Prasad https://jp.linkedin.com/in/arprasad

Baseline security

Security is the business driver

New security technology

Dr. Anand R. Prasad

[email protected]

https://jp.linkedin.com/in/arprasad

http://www.prasad.bz/

Thank You