Presentation SlidesPermission to use with attribution
to ‘5G Americas’ is granted.
“5G networks are beginning to touch every facet of human life - from work, entertainment, personal and social activities, making security central to this monumental technology. Mobile Network operators and their vendor partners have always and will continue to put security as a top priority for their networks.”
Chris Pearson, President, 5G Americas
“Security has been designed and incorporated into 5G standards. A strategic approach is taken related to cloud-native services, open-source software, APIs, SDN, and NFV, which together provide greater overall 5G network security.”
David Krauss, Principal Network Architect for Ciena
Monolithic versus
Disaggregated Architecture
Evolution from network appliances to virtualization
5G RAN splits
resulting in fronthaul,
midhaul and backhaul
5G Non-Standalone Architecture
5G Standalone Architecture
System Architecture for 5G SMS over NAS
UE
AMF
UDM
SMSF(SMS Function)
N1
N20
N8
to/from SMS-GMSC/IWMSCSMS Router
to/from SMS-GMSC/IWMSCSMS Router
N21to/from IP-SM-GW
to/from SGs MSC
SDN Architecture and 5G
Comparison of 4G and
5G NR Architecture
Efficiencies and Threats for an Open
5G RAN Architecture
Threat Intelligence
Layers
Unsupervised Machine LearningSupervised Machine LearningBehavior Analysis/Anomaly DetectionHeuristics AnalysisMalware Signatures/File HashesThreat Reputation - DomainsThreat Reputation - IP Addresses
Indicators of Compromise (IoC)
Automated Threat Intelligence (ATI)
Non-roaming
reference architecture from 3GPP
23.501
SECaaSbuilt upon Network Slicing
Zero-Trust Validation checks required at both the hardware and software layers