Upload
trinhcong
View
217
Download
0
Embed Size (px)
Citation preview
1
CRITICAL COMMUNICATIONSIMPLICATIONS FOR 5G
PAUL STEINBERGCHIEF TECHNOLOGY OFFICERMOTOROLA SOLUTIONS
CRITICAL INTELLIGENCECRITICAL COMMUNICATIONS
ANALOG DIGITAL INFORMATION ENABLED
BUSINESS/MISSION CRITICAL INTELLIGENCE
SOLUTION ARCHITECTURECRITICAL INTELLIGENCE
9-1-1
SOCIETAL
NG 9-1-1
DATABASES
SENSORS &
VIDEO
CONNECTED
VEHICLES
CONNECTED RESPONDERS
Applications/Services/AnalyticsMulti-media
Comm. Services
Other
Services
Critical Communications Workflow / Operations
Knowledge Apps
(Orchestration, Analytics)
App Services
(CAD, Messaging)
Real-time
Comm.
Services
Open Infrastructure API
Critical Communications Unified Service Enabler Layer(Group Access, Priority / QoS, Context Awareness, Event Logging, etc.)
Web-based & Native Application
Open Device API
Critical Communications Enabled Clients
Devices/ Accessories / Wearables
Dispatch
Intelligence Analyst
CONTROL CENTER/BACK
OFFICE
PROFESSIONAL STAFF
Management
Field
Integration Open Services API
CITIZENS
CAPTURE DECIDE & ACT MOBILIZE
IANLMR LTE
CR
ITIC
AL
CO
MM
UN
ICA
TIO
NS
5G CRITICAL COMMUNICATIONSCAPACITY / COVERAGE / GOS NEEDS
Media Sharing, Virtual Reality, Telepresence & IoT become force multipliers, driving capacity needs with intense periods of high demand in incident scenes, coupled with a need for continual connectivity for IoT, personal communications & secure apps
Critical communications requires secure, highly reliable & ubiquitous coverage, system resilience and graceful degradation
Deployable systems with mesh, ad-hoc and direct mode network topologies neededto fill capacity & coverage gaps
“Security by Design” – security is part of the design process from the beginning0%
20%
40%
60%
80%
100%
120%
1 361 721 1081 1441 1801 2161 2521 2881
Perc
ent o
f Cha
nnel
Use
d
Time of Day
Major Incidents Minor Incidents PS Background Traffic & Video M2M
11am 12pm 1pm 2pm 3pm 4pm 5pm 6pm 7pm
Cell 55
0%
20%
40%
60%
80%
100%
120%
1 361 721 1081 1441 1801 2161 2521 2881
Perc
ent o
f Cha
nnel
Use
d
Time of Day
Major Incidents Minor Incidents PS Background Traffic & Video M2M
11am 12pm 1pm 2pm 3pm 4pm 5pm 6pm 7pm
Cell 55
0%
20%
40%
60%
80%
100%
120%
1 361 721 1081 1441 1801 2161 2521 2881
Perc
ent o
f Cha
nnel
Use
d
Time of Day
Major Incidents Minor Incidents PS Background Traffic & Video M2M
11am 12pm 1pm 2pm 3pm 4pm 5pm 6pm 7pm
Cell 55
Projected Public Safety Incident Blocking Frequency
0
10
20
30
40
50
60
70
80
2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025
Peta
Byte
s/M
onth
Traffic Demand Projections
Police
Fire
EMS
Private EMS
Other Public Safety
Federal Police
Corrections
Projected U.S. Public Safety Traffic Demand
DENSIFICATION
Massive increase in number of devices, sites, backhaul
SDN / NFV
Site density approaching 1 site per active user
Latency reduction
SPECTRUM SHARING
Highly dynamic spectral reuse and interference management
mmWave (>10GHz spectrum with > 1 GHz channels)
5G enables an explosion of interconnected devices, and paradigms broadening the attack surface
Security must be “baked in” 5G standards and 5G devices
SECURITY
5G CRITICAL COMMUNICATIONS TECHNOLOGY ELEMENTS
COVERAGE & CAPACITY
Pervasive coverage (95%+) with high minimum throughput
Transparent to broad application ecosystem
Deployable mobile sites, repeaters, relays, ad-hoc and direct modes
5G SMARTER MUST PROVIDE REQUIREMENTS FOCUSED ON BUSINESS/MISSION CRITICAL COMMS
SECURITY & 5G: IOT AS A DRIVER
• Perceived gaps:• There have been many security gaps publicly identified in existing IoT solutions• Many vendors lack knowledge around the secure SW development life cycle (SDLC)
• How industry is addressing these gaps:• Many industry orgs provide compliance requirements that includes security• Multiple industry best practices include CTA, CSA, NIST, FTC, DHS, OWASP
2015 FCC TAC Cybersecurity WG key findings on IoT
2016 FCC TAC Cybersecurity WG task around 5G Security
• FCC’s Goal for the WG• Recommend to the FCC the strategy, procedures and steps necessary to help incorporate
the concept of “security by design” into the very fabric of 5G
• Proposed scope/direction• Leverage the 2015 TAC IoT work and focus on IoT applications of 5G technology• Create a list of key security principles that should be built into the 5G IoT ecosystem• Identify SDOs and develop an action plan to influence the standards development process
SECURITY & 5G: KEY CONSIDERATIONS
IDENTIFY
RECOVER
PROTECT
NIST Cyber Security Framework Core Functions
• 5G will enable greater connectivity and an explosion of interconnected devices, broadening the attack surface
• Critical comms, critical infrastructure, ICS, healthcare, etc. drive the need for stronger security capability
• Technical considerations:
• Protection of dynamic spectrum enablers (e.g. DSA)
• Privacy enablers (e.g. ephemeral “thing” identifiers)
• Highly scalable deployment/maintenance models including SDN and NFV
• Crypto agility for greater interoperability & longevity
• IoT friendly, decentralized trust models
• User friendly and interoperable user authentication
• Rapid defense/response through edge and swarm intelligence
RESPOND
DETECT
8
WE INNOVATE TO MOBILIZE AND CONNECT PEOPLE IN THE MOMENTS THAT MATTER