10
Conception of the IoT Cybersecurity Architecture. Is eSIM a solution to the challenges? Yuri Kargapolov CEO of UNAOC, Consortium http://num.net.ua, [email protected] +380503538629

Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

Conception of the IoTCybersecurity Architecture. Is eSIM a solution to the challenges?

Yuri KargapolovCEO of UNAOC, Consortiumhttp://num.net.ua, [email protected]+380503538629

Page 2: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

Finding meaning and defining new values for NGN

Transformation of technological and maintenance processes

Actual business models

Security challenges

Scalability and data uniformity challenges

Identity management challenges

Challenges of low architecture flexibility

Huge number of digital subjects and applications fields

Diversity of geographical regions, political and economic systems

Huge number of new technological decisions

UNAOC, Consortium

2

Huge number of IDs and protocols

Page 3: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

3

Broadband Internet

Big Data

Personalization of Services

Portability of Services

Mobility of Services

UNAOC, Consortium Background of the transformation appearance

Intelligent Services

Page 4: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

4

UNAOC, Consortium Where does security troubles begin point?

CORE

Application and internal processes management

Operation of access processes in the system

Illegal attempts, unsuccessful access

Legal attemps, successful access

Illegal attempts, successful access

Page 5: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

5

UNAOC, Consortium Overall functional architecture model

ANI Application Network Interface

USN Ubiquitous Sensor Network

UNI User network interface

SNI Service node interface

NNI Network-to-network interface

IdM ID Management

IdM

Recommendation Y.2026 (12) Functional requirements and architecture of the next generation network for support of ubiquitous sensor network applications and services

Page 6: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

UNAOC, Consortium IdM Place in General Architecture

Security architecture begins with authentication, authorization, verification, and validation as subject matter processes of the identification management and the identifiers management

Security Architecture Begins Where IdM Begins

What is an eSIM as an IdM processes object?

Does eSIM have unique new features as an IdMprocesses object?

Does eSIM have unique new features as an IdMprocesses object?

IoT reference model by Recommendation Y.2060 (06/2012) Overview of the Internet of thingsThis is not yet the IoT reference model by Recommendation Y.2060 (06/2012) Overview of the Internet of things

Page 7: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

7

UNAOC, Consortium eSIM – breakthrough in technology or embedded troubles?

SIM – Subscriber Identity Module – storage for identification network subscribers for an ONE E.164 ID

eSIM – storage for identification network subscribers up to FIVE virtual E.164 IDs

eSIM – storage for identification network subscribers up to FIVE virtual E.164 IDs

eSIM and SIM can be used in parallel on one device

eSIM allows to automatically set the previous number on a new device

eSIM allows to automatically set the previous number on a new device

Page 8: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

8

UNAOC, Consortium eSIM – new breakthrough in technology or embedded troubles?

eSIM has unique profile that can’t be changed by simple operation with a SIM-card

eSIM doesn’t allow the use of the roaming feature if there is no appropriate network

eSIM allows you to remotely configure any gadget

eSIM allows to remotely configure any gadget

Page 9: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

9

UNAOC, Consortium Place and role eSIM in the personalization as a services development trend

Service Profile Governance

Identification,Authentication,

and Authorization (AAA)

Device Profile Managing

Geolocation Management

Mobility

Portability Personalization

Differentiated QoS

Connection & Connectivity Management

MNP

IMEI

PSP Personalized Services Portability

Subscriber Profile GovernanceBPS

Behavior Prediction System

Subscriber Profile Managing

Identity Management

Subscriber Profile Managing

== f IdM(eSIM)

Device Profile Managing

== f IdM(eSIM)

Page 10: Conception of the IoT Cybersecurity Architecture. Is eSIM ... · Identity management challenges ... Security Architecture Begins Where IdM Begins ... Does eSIM have unique new features

10

Ukrainian Numbering, Naming and Addressing Operation Center

Thanks!

Questions?

Yuri KargapolovCEOUNAOC, [email protected]://num.net.ua