The security challenges of next-generation communications networks

Samuel S Visner of Netcracker Technology

As the global IT ecosystem changes dramatically in the near future, due in large part to the spread of 5G networks and IPv6, there will exist tremendous opportunities for operators as well as their customers.

Operators will be able to deliver cutting-edge new services that support futuristic endeavors such as VR/AR, smart cars, robotics, smart cities, and drones, and other things previously seen only in science-fiction. With 5G and IPv6, demand for and availability of these and other services will grow rapidly, say Samuel S. Visner, security director, and Scott Sykes, senior director, Global Security Organisation, Netcracker Technology.

5G networks have been looming on the horizon for several years, but it seems finally that the industry is breaking through and drawing ever closer with widespread deployment expected in the next two to three years. Some operators are already claiming to be 5G-enabled, although in many cases they are referring to a more advanced version of LTE. But whether it’s 5G-enabled as operators prepare for the real deal, or 5G-ready, which we’ll see in the near future, operators will need to ensure they do not forget about security issues for this next generation communications network.

These use cases may still seem several years from becoming ubiquitous around the world. Now is the time, however, for IT managers, security managers, and their staff to learn about cybersecurity issues and prepare themselves for what’s coming.

Security challenges for telcos

The number of 5G-enabled devices is expected to grow rapidly, and when one factors in the seemingly endless number of IoT-related end points – sensors in healthcare and traffic applications, automobile telematics units, drones, devices in a smart home, and other use cases that form the basis of smart cities, all enabled by IPv6 – the need for security becomes critical at multiple levels. Indeed, billions of new devices, connected through 5G, will generate data for use by advanced analytics, and will be managed by applications these advanced analytics support. Data that must be protected includes:

  • Customer data – The data flowing into and out of devices needs to be secure to protect the privacy of subscribers and the integrity of the information itself. In the case of IoT end points such as sensors, data could be moving constantly from one point to another very rapidly; all of this data must be kept safe from prying eyes and those who would undermine its integrity.
  • Transaction data – With the onset of 5G, we’ll start seeing much more activity in the network core and increased requirements for securing those resources, including commerce transactions.
  • Network data – Preventing breaches to the network at the core, where most services will reside, is also top of the list of concerns for operators and their security professionals.
Scott Sykes

These needs becomes even more complicated with 5G-supported network slicing, which enables the creation of simultaneous mini networks that operate under different sets of security and service requirements. This ability to invoke a 5G instance for a specific period of time, in a specific place, will make security an even higher priority and that much more of a challenge for operators, who will be the ones tasked with securing these various data types.

Operators and security professionals will have to resolve any issues, which will require significant levels of knowledge and proficiency around security issues. In fact, most operators will not be able to go it alone when it comes to overcoming the security hurdles of 5G and other changes in communications networks. Rather, they will need to work with trusted partners with the expertise and experience to ensure data integrity, customer privacy and compliance with any mandates or orders.

Netcracker enhanced security plan

Netcracker works closely with our customers to ensure subscriber and other data is secure within the confines of the operator’s network as well as when data traverses public or private clouds. Our enhanced security plan covers sensitive data, as well as the software and services used to store and process that data and to apply it to our customers’ needs.

We predicate our strategy on a shared model of responsibility, which includes:

  • Sound IT and security architecture, including a full set of security tools and controls;
  • A dedicated security organisation to support continuous diagnostics and monitoring of operator networks and data;
  • Support for established security protocols and standards;
  • Strong focus on personal data security and privacy;
  • Auditing and assurance mechanisms.

Having in place these program elements and a strong framework is essential for vendors working with operators as they roll out next-generation networks, but in addition, there must exist the solid experience and knowledge to back it up.

We incorporate the principles of the shared model of responsibility and go further through alignment with industry security frameworks and standards in order to bring the highest levels of assurance to customers. This approach includes providing industry leading secure services and solutions designed to ensure the confidentiality, integrity and availability of our own data and our customers’ data and systems, against the fast-evolving threats of cyber criminals, hackers and other forms of intrusion and disruption.

Security should be an integral part of an operator’s plan for 5G networks and services. But to be successfully, operators will need to team up with a vendor that’s serious about security and has been delivering a strong solution to its customers as they move into the world of 5G and beyond.

The authors are Samuel S. Visner, security director, and Scott Sykes, senior director, Global Security Organisation, Netcracker Technology

About the authors

Scott Sykes is the senior director of Global Security Organisation at Netcracker Technology, in Boston, and a former Board Member of the Virginia Cyber Security Partnership, in Richmond, VA. He previously served as chief information security officer at Tata Communications International, in Herndon, VA, and director of Internet Marketing for Genworth Financial and director of IT strategy at Capital One Financial Services, both in Richmond, VA.

Samuel Visner is the director of the National Cybersecurity Federally Funded Research and Development Centre (MITRE), sponsored by the National Institute of Science and Technology. He also serves as the security director for Netcracker Technology Corporation and as a member of the Cyber Council of the Intelligence and National Security Alliance and the Cyber Committee of the Armed Forces Communications and Electronics Association. Sam is also a member of the Council on Foreign Relations, the Atlantic Council and the Intelligence Community Studies Board, sponsored by the National Academy of Science and serving the Office of the director of National Intelligence.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

Get a US$50 Amazon voucher for sharing your IoT brand knowledge

Posted on: March 28, 2024

We want to know what you know about the IoT space. Just 3 minutes could earn you a US$50 Amazon digital gift card!

Read more

Enhance EV charging performance with cellular connectivity

Posted on: March 28, 2024

Electric vehicles (EVs) are steadily growing their market share at the expense of internal combustion engine vehicles. The growth is fuelled by several factors. Perhaps most importantly, prices for EVs have started to drop as competition in the industry is intensifying. New players and models are emerging, prompting several established EV makers to lower their

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more