Wang Xiaopeng, CTO of China Communications, said that the security challenges in 5G applications mainly come from three aspects

At the “7th Internet Security Conference – 5G Security Forum” held recently, Wang Xiaopeng, chief technology officer of China Communications Services Co., Ltd., said that the security challenges of 5G mainly come from system security, business security, and data security. There are three main lines of defense in 5G security management: first, equipment manufacturers themselves; second, basic operators; and third, industry management.

In Wang Xiaopeng’s view, 5G has both advantages and disadvantages: in terms of advantages, capacity enhancement, access to massive terminals, and low latency; in terms of disadvantages, denser base stations, higher energy consumption costs, and greater investment costs. In general, 5G technology will bring a more colorful world to people, and applications such as VR, AR, Internet of Vehicles, unmanned driving, intelligent manufacturing, and telemedicine will be realized.

“5G will really bring great changes to our world. With the widening and diversification of technology applications, relying on 5G networks will have a very important impact on everyone’s life, society and even the advancement of the entire country. It is precisely because In this way, various countries will attach great importance to the security of 5G networks.” Wang Xiaopeng believes that the security challenges of 5G applications mainly come from the following aspects:

One is system security. The 5G network has introduced many new technologies, such as the introduction of edge computing technology, so that a lot of content and data can be distributed to users at the location of the nearest base station, which will have some relatively high security requirements, such as the self-security protection of edge nodes; At the IT level, cloud computing and virtualization will be introduced into the 5G core network. It is necessary to consider how to protect the 5G core network. In terms of network slicing, it is also important to ensure the security isolation between slices.

The second is business security. 5G has three major application scenarios. In fact, each business scenario has some new risks: if the bandwidth is very large, can the security measures keep up; low power consumption and large connections, how to ensure that the Internet of Things can be connected 24 hours a day, how to ensure Security certification; low latency is also a problem. The network has low latency, but after adding security settings, the latency may be higher, which will also cause problems. Therefore, some low-energy and lightweight network security protocols are needed.

The third is data security. 5G is the era of the Internet of Everything, more detectors, cameras, etc. After the Internet of Everything, the user’s buttons, clothes, and shoes may enter the network, which will involve many user privacy issues, as well as some information content security issues

Wang Xiaopeng believes, “In the face of 5G security issues, we should focus on technology in one hand and safety management in the other. Technology starts from the security of 5G network itself and the security of 5G applications. In terms of technical guarantee, in fact, the 5G network itself has already done the protocol design. There are many in-house security designs; security management is mainly to establish a security guarantee mechanism, and let manufacturers, operators, government departments and the public work together to ensure our 5G security.”

“There are mainly three lines of defense in 5G security management. First, equipment manufacturers themselves, in accordance with the inherent security of 5G, must do a good job in these standards and compliance; second, basic operators should do a good job in real-time risk monitoring and disposal; third, Industry management, do a good job of grasping the security situation of 5G business.” Wang Xiaopeng said that in terms of 5G security assurance system, three systems should be done well: identification and protection system, monitoring and disposal system, disaster recovery and recovery system; in addition, the three synchronizations of network security should be implemented: Simultaneous planning, simultaneous construction, and simultaneous use. 5G network is a very important key infrastructure for the country in the future. During planning and construction, 5G security-related means must be well matched to ensure that these means can be put into operation after passing the acceptance simultaneously; In addition, it is necessary to promote the systematic construction and improvement of 5G security standards.

Wang Xiaopeng also suggested that, from the government level, first, establish regulations and means to strengthen 5G monitoring and supervision, and put some standards into practice; second, there must be some technical means to do some real-time security monitoring and data collection, and do some 5G security work. Monitoring and early warning notification, 5G linkage and disposal work.

It is understood that China Communications Services Co., Ltd. is controlled by three major telecom operators, China Telecom Group Corporation, China Mobile Communications Group Corporation, and China United Network Communications Group Co., Ltd. Equipment manufacturers, dedicated communication networks, government agencies, enterprises and institutions provide network construction, outsourcing services, content applications and other services, and actively expand overseas markets.

According to Wang Xiaopeng, China Comservice currently has a total of 21 provincial-level companies and more than 100 professional companies with an annual income of over 100 billion. At the same time, it will also carry out some external investments and mergers and acquisitions. Currently, it is also actively negotiating network security issues. Work. In terms of 5G security, China Comservice has published nearly ten monographs on 5G security, participated in the release of many 5G white papers in the industry, and applied for dozens of 5G patents. As a leader in 5G network construction, China Comservice has carried out 5G experiments with many provincial operators across the country. At present, Comservice’s network security runs through the entire project construction, from the early stage to the later stage of the entire integrated security service capability, and has complete security services Qualifications, and also provide supporting security guarantees in conjunction with the construction of smart cities. The future of 5G is bright, and China Comservice will also provide a full range of security guards for the bright future of 5G, including security consulting and engineering construction, emergency response, risk assessment, daily inspections, vulnerability reporting and security training, competitions, etc. Wait.

The Links:   PM450CLA120 VS-T70HFL60S05