Security Risks Faced By 5G Application Scenarios

Mar 23, 2020

Leave a message

Besides technology, 5G application scenarios also face new security risks. At present, typical 5G scenarios focus on enhancing mobile broadband services, and gradually expand to each vertical industry. 3GPP has completed the formulation of security standards for eMBB scenarios, and uRLLC and mMTC scenarios are being formulated.


Enhanced mobile broadband (eMBB) scenarios: major applications include 4K/8K UHD mobile video, immersive AR (augmented reality)/VR (virtual reality) services. The main risk is: to enhance the mobile broadband scene of the large traffic to the existing network security protection means to challenge.


Ultra high reliability low latency (uRLLC) scenario: typical applications include industrial Internet, Internet of vehicles, etc. URLLC is able to provide quality of service assurance with high reliability and low latency, and its main security risks are: the low latency requirements cause the deployment of complex security mechanisms to be limited.


Mass machine communication (mMTC) scenario: the application covers a wide range of areas, access devices, application areas and equipment supplier standards scattered, business types. The main security risk is that the mass diversified terminals in the ubiquitous connection scenario are easy to be attacked and utilized, which poses a threat to the security of network operation.


For security risks in typical 5G application scenarios, the following countermeasures can be taken:

One is to strengthen the evolution and upgrading of safety protection technology and equipment to effectively adapt to and cope with the impact of large flow on existing protection means.


The second is to establish a security mechanism for low delay requirements, to optimize the delay caused by business access authentication, data encryption and decryption, and try to improve the security protection capability under low delay conditions.


Third, build a security model based on large-scale machine-like communication scenarios, build an intelligent dynamic defense system to deal with network attacks, and prevent the horizontal spread of network security threats.


Send Inquiry