SlideShare a Scribd company logo
1 of 10
Download to read offline
5G Activites of NGMN
Security Competence Team (SCT)
ITU Workshop on 5G Security
Geneva, 19 March 2018
Security Competence Team (SCT) formed in May 2017
• Provide vision and high-level security and privacy requirements
for NGMN, with respect to both digital infrastructure and
verticals
• Interact with standardization and other relevant organizations
• Provide input to other NGMN work groups
• Promote business opportunities and improved user experience
• Take holistic security approach, in addition to communications
security (3GPP) approach
• Promote security and privacy by design and integrated
cybersecurity
Mission
• Network virtualization and slicing together with E2E framework and
massive IoT require a holistic approach to security including software
and hardware security aspects in addition to traditional network
security aspects
• Lawful access needs to be separated from unlawful access; privacy-
sensitive data need to be protected (e.g., IoT data in E2E manner,
possibly at applications or communications layer)
• There is an overlap with non-NGMN security groups, in terms of
security areas and participating companies
• Standardization organizations (e.g., 3GPP SA3) focus on more specific
requirements and concrete solutions
• Consequently, the right balance between high-level NGMN
requirements and more concrete standardization requirements is
needed in order to increase practical impact of NGMN
Challenges
 5G E2E Architecture Framework – Security requirements
 Cellular V2X – Security and privacy aspects
 Network Capabilities Exposure – Security aspects and
requirements
 5G RAN Functional Decomposition – Security of new interfaces
 Update of “5G Security – Package 3: Mobile Edge Computing /
Low Latency / Consistent User Experience” (NGMN, Oct. 2016)
with respect to law enforcement requirements for MEC
 Pre-commercial 5G Network Trials & Testing – Security Tests
SCT Activities (Overview)
 5G E2E Architecture Framework – Security requirements
 E2E architecture framework necessitates a wide range of security
requirements, concerning network layer, business enablement layer,
business application layer, management and orchestration,
endpoint/user equipment, as well as identity management
 White paper (v1.0 and v2.0), with SCT input, published and
distributed with liason statements to 3GPP TSG SA WG3, ETSI SAGE,
ETSI TC CYBER, ISO/IEC JTC1/SC 27, FIDO Alliance, etc.
SCT Activities (1)
 Cellular V2X – Security and privacy aspects
 Comparison of network-layer security in LTE V2X and 802.11p as well
as of application-layer security in IEEE/SAE (with SCMS) and ETSI ITS
 LTE interfaces to be used: LTE PC5 (network-supported or not) and
LTE Uu (with eMBMS)
 Privacy considerations, especially w.r.t. tracking and linkability
 Advantages of LTE V2X over 802.11p pointed out
 White paper, with SCT input, to be published soon
SCT Activities (2)
 Network Capabilities Exposure – Security aspects and
requirements
 Exposure of network access and communications services and
functions, network infrastructure, and their management to 3rd parties
 Security requirements, exposure of security capabilities, scenarios, and
use cases
 White paper to be finalized soon
SCT Activities (3)
 5G RAN Functional Decomposition – Security of new interfaces
 White paper, with SCT input on F1 interface, published; dedicated SCT
security document in preparation
 Update of “5G Security – Package 3: Mobile Edge Computing /
Low Latency / Consistent User Experience” (NGMN, Oct. 2016)
with respect to law enforcement requirements for MEC
 Updated white paper published and distributed
 Pre-commercial 5G Network Trials & Testing – Security tests
 To start soon
SCT Activities (4)
 3GPP: SA3, SA2, SA1, SA5, RAN, etc
 ETSI: TC LI, SAGE, TC CYBER, ISG NFV, ISG MEC, etc
 ISO/IEC: JTC1/SC 27
 5GAA
 GSMA
 FIDO Alliance
 … and many more including ITU
NGMN SCT welcomes the feedback and involvement
from ITU-T SG17
SCT Relationships
Thank you
Merci
Cпасибо
谢谢
‫شكرا‬
Gracias
ありがとう
감사합니다
10

More Related Content

More from ITU

AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 Report
ITU
 

More from ITU (20)

Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of Automotive
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities.
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devices
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learning
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyond
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in Communications
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 Report
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGs
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable cities
 
Implementing SDG11 by connecting sustainability policies and urban planning p...
Implementing SDG11 by connecting sustainability policies and urban planning p...Implementing SDG11 by connecting sustainability policies and urban planning p...
Implementing SDG11 by connecting sustainability policies and urban planning p...
 
Connecting cities and communities with the SDGs
Connecting cities and communities with the SDGsConnecting cities and communities with the SDGs
Connecting cities and communities with the SDGs
 
Synchronization in ITU-T in the New SG15 Study Period (2017-2020)
Synchronization in ITU-T in the New SG15 Study Period (2017-2020)Synchronization in ITU-T in the New SG15 Study Period (2017-2020)
Synchronization in ITU-T in the New SG15 Study Period (2017-2020)
 
Overview of ITU-T SG 15 Q4 xDSL and G.(mg)fast
Overview of ITU-T SG 15 Q4 xDSL and G.(mg)fastOverview of ITU-T SG 15 Q4 xDSL and G.(mg)fast
Overview of ITU-T SG 15 Q4 xDSL and G.(mg)fast
 
Livecare Realtime healthcare Monitoring service
Livecare Realtime healthcare Monitoring serviceLivecare Realtime healthcare Monitoring service
Livecare Realtime healthcare Monitoring service
 
Live Migration of 5G Services between Heterogenous Infrastructure Domains
Live Migration of 5G Services between Heterogenous Infrastructure DomainsLive Migration of 5G Services between Heterogenous Infrastructure Domains
Live Migration of 5G Services between Heterogenous Infrastructure Domains
 
Live Demo Experience Live Software-defined RAN slicing
Live Demo Experience Live Software-defined RAN slicingLive Demo Experience Live Software-defined RAN slicing
Live Demo Experience Live Software-defined RAN slicing
 
Cost efficient and low latency delivery of IP-based services
Cost efficient and low latency delivery of IP-based servicesCost efficient and low latency delivery of IP-based services
Cost efficient and low latency delivery of IP-based services
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

5G Activities of NGMN; Security Competence Team (SCT)

  • 1. 5G Activites of NGMN Security Competence Team (SCT) ITU Workshop on 5G Security Geneva, 19 March 2018
  • 2. Security Competence Team (SCT) formed in May 2017 • Provide vision and high-level security and privacy requirements for NGMN, with respect to both digital infrastructure and verticals • Interact with standardization and other relevant organizations • Provide input to other NGMN work groups • Promote business opportunities and improved user experience • Take holistic security approach, in addition to communications security (3GPP) approach • Promote security and privacy by design and integrated cybersecurity Mission
  • 3. • Network virtualization and slicing together with E2E framework and massive IoT require a holistic approach to security including software and hardware security aspects in addition to traditional network security aspects • Lawful access needs to be separated from unlawful access; privacy- sensitive data need to be protected (e.g., IoT data in E2E manner, possibly at applications or communications layer) • There is an overlap with non-NGMN security groups, in terms of security areas and participating companies • Standardization organizations (e.g., 3GPP SA3) focus on more specific requirements and concrete solutions • Consequently, the right balance between high-level NGMN requirements and more concrete standardization requirements is needed in order to increase practical impact of NGMN Challenges
  • 4.  5G E2E Architecture Framework – Security requirements  Cellular V2X – Security and privacy aspects  Network Capabilities Exposure – Security aspects and requirements  5G RAN Functional Decomposition – Security of new interfaces  Update of “5G Security – Package 3: Mobile Edge Computing / Low Latency / Consistent User Experience” (NGMN, Oct. 2016) with respect to law enforcement requirements for MEC  Pre-commercial 5G Network Trials & Testing – Security Tests SCT Activities (Overview)
  • 5.  5G E2E Architecture Framework – Security requirements  E2E architecture framework necessitates a wide range of security requirements, concerning network layer, business enablement layer, business application layer, management and orchestration, endpoint/user equipment, as well as identity management  White paper (v1.0 and v2.0), with SCT input, published and distributed with liason statements to 3GPP TSG SA WG3, ETSI SAGE, ETSI TC CYBER, ISO/IEC JTC1/SC 27, FIDO Alliance, etc. SCT Activities (1)
  • 6.  Cellular V2X – Security and privacy aspects  Comparison of network-layer security in LTE V2X and 802.11p as well as of application-layer security in IEEE/SAE (with SCMS) and ETSI ITS  LTE interfaces to be used: LTE PC5 (network-supported or not) and LTE Uu (with eMBMS)  Privacy considerations, especially w.r.t. tracking and linkability  Advantages of LTE V2X over 802.11p pointed out  White paper, with SCT input, to be published soon SCT Activities (2)
  • 7.  Network Capabilities Exposure – Security aspects and requirements  Exposure of network access and communications services and functions, network infrastructure, and their management to 3rd parties  Security requirements, exposure of security capabilities, scenarios, and use cases  White paper to be finalized soon SCT Activities (3)
  • 8.  5G RAN Functional Decomposition – Security of new interfaces  White paper, with SCT input on F1 interface, published; dedicated SCT security document in preparation  Update of “5G Security – Package 3: Mobile Edge Computing / Low Latency / Consistent User Experience” (NGMN, Oct. 2016) with respect to law enforcement requirements for MEC  Updated white paper published and distributed  Pre-commercial 5G Network Trials & Testing – Security tests  To start soon SCT Activities (4)
  • 9.  3GPP: SA3, SA2, SA1, SA5, RAN, etc  ETSI: TC LI, SAGE, TC CYBER, ISG NFV, ISG MEC, etc  ISO/IEC: JTC1/SC 27  5GAA  GSMA  FIDO Alliance  … and many more including ITU NGMN SCT welcomes the feedback and involvement from ITU-T SG17 SCT Relationships