50% found this document useful (2 votes)
323 views24 pages

Nokia Seurity

research paper

Uploaded by

Gur Preet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
323 views24 pages

Nokia Seurity

research paper

Uploaded by

Gur Preet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • NGMN as a Source of 5G Security Requirements
  • 5G Security Vision
  • TrustCom-15: Further Steps Towards 5G Security
  • 5G-PPP Projects - 5G NORMA
  • 3GPP Next Generation Security
  • Elements of a 5G Security Architecture
  • Examples: Network Based Anomaly Detection

5G Security Research

at Nokia Bell Labs


• Peter Schneider
• ICT SICS Security Day, 11-05-2016

1 © Nokia Solutions and Networks 2016 Public


Agenda

• NGMN as a source of 5G security requirements


• 5G Security Vision
• TrustCom15: Further steps “Towards 5G Security”
• 5G-PPP projects - 5G NORMA
• 3GPP next generation security
• Elements of a 5G security architecture / 5G security research topics
• Examples: network slicing, network based anomaly detection, security
orchestration

2 © Nokia Solutions and Networks 2016 Public


NGMN Alliance – An important source of views and recommendations

“5G Whitepaper”, Version 1.0, 17-February-2015:


• “enhanced performance is expected to be provided along ...
with the capability to, among others, ensure security and
trust, identity, and privacy”
• Mentions various requirements for improved security
compared to 4G ( next slide)

3 © Nokia Solutions and Networks 2016 Public NGMN Next Generation Mobile Network
Quotations from the NGMN “5G Whitepaper”
• “5G should be designed to provide more options beyond node-to-node and end-to-end
security available in today’s mobile systems”
• “design of security solutions (e.g. key exchange/derivation protocols upon handover or
when interworking with other RATs) should provide better secrecy than 4G”
• “Specific security design for use cases which require extremely low latency (including the
latency of initiating communications)”
• “Improve resilience and availability of the network against signalling based threats,
including overload”
• “Improve system robustness against smart jamming attacks of the radio signals and
channels”
• “Improve security of 5G small cell nodes”

 Substantial security requirements!

4 © Nokia Solutions and Networks 2016 Public


NGMN Alliance – An important source of views and recommendations

“5G Whitepaper”, Version 1.0, 17-February-2015:


• “enhanced performance is expected to be provided along ...
with the capability to, among others, ensure security and
trust, identity, and privacy”
• Mentions various requirements for improved security
compared to 4G

NGMN 5G Security Group:


• “does not make requirements, just recommendations”
• Recommendations concerning improvements of the access network, DoS
protection ( has been sent to 3GPP)
• Document on network slicing security, approval pending
• To come: Mobile edge computing, low latency, consistent user experience
5 © Nokia Solutions and Networks 2016 Public NGMN Next Generation Mobile Network
5G Security Vision

Changing
New use cases
Supreme ecosystem
built-in security

New threats Flexible security Growing need for


mechanisms flexibility
Automation
New networking Growing need for
paradigms dependability

Sound security concepts must be built into


the 5G architecture right from the start!
6 © Nokia Solutions and Networks 2016 Public
5G Security Vision – a slightly deeper look

Higher level of Higher flexibility in the selection Higher degree of


security of security mechanisms security
• Increased robust- • Alternative identification and automation
ness against authentication procedures • Holistic security
cyber attacks • User plane encryption and orchestration and
• Enhanced privacy integrity protection optional management
• Security to use • Self-adaptive,
assurance • Adjust security mechanisms intelligent
per network slice security controls

Proven network security concepts


Standardized e.g. 3GPP LTE security Non-standardized e.g. traffic separation, security zones, secure OAM

Secure software and platforms

7 © Nokia Solutions and Networks 2016 Public


IEEE-TrustCom-15: Further steps “Towards 5G Security”

From
https://research.comnet.aalto.fi/
Trustcom2015/index.html

• The “1st IEEE International Workshop on 5G Security”, organized by people


from Nokia T&I Research, now Nokia Bell Labs
• Overall 5G security views of vendors - on this level not controversial
• Further presentations on security topics relevant for future networks

8 © Nokia Solutions and Networks 2016 Public


Nokia Contribution “Towards 5G Security”

9 © Nokia Solutions and Networks 2016 Public


Example: Security between mobile and network and on network interfaces
IMS / Operator
LTE Non access stratum HSS PCRF services
signaling security
Core interface
MME
security

Access stratum eNB Internet


Backhaul link security
security Serv.-GW PDN-GW

5G ?
? ? ?
5G-NB
?
5G remote Aggregation
Local NFV
radio head platform cloud Central cloud
Internet
10 © Nokia Solutions and Networks 2016 Public
5G PPP

• “The 5G PPP will deliver


solutions, architectures,
technologies and standards
for the ubiquitous next
generation communication
infrastructures of the
coming decade.”
From https://5g-ppp.eu/

• 5G PPP Security Working Group: Various projects have shown interest


- 5G-ENSURE (initiator), 5G NORMA, 5G-SPEED, 5GEX, CHARISMA, COGNET,
SELFNET, SESAME, VIRTUWIND
• 5G NORMA: A NOvel Radio Multiservice adaptive network Architecture for the
5G era  Combining architecture and security work
11 © Nokia Solutions and Networks 2016 Public
12 © Nokia Solutions and Networks 2016 Public Source: 5G NORMA Consortium
13 © Nokia Solutions and Networks 2016 Public Source: 5G NORMA Consortium
5G NORMA Security

5G NORMA Feature Related Security


NFV environments for core and RAN NFV security (for central and distributed
functions NFV environments)
Software Defined Mobile Network SDN security, specialized for SDMC
Control (SDMC)
Mobile network multi-tenancy Tenant isolation, network slicing security
Multi-service awareness Flexible security approach,
e.g. choice of crypto-algorithms
Adaptive allocation of functions, Flexible security approach, e.g. support
joint optimization of RAN and core for flexible allocation of security
functions

14 © Nokia Solutions and Networks 2016 Public


5G NORMA: Radio Interface Security Termination Functions
Bare Metal RAN
Equipment
Radio Interface
Low Layer Secure Radio Interface Security
UE
Functions Termination
Function

Secure
Physically Exposed Entities
Cloud
Other RAN
Function
Other RAN
Bare Metal RAN Equipment Function

Low Layer Functions Secure


Communication Other Core
in the Cloud Function
Secure Environment
Radio Interface Backhaul Link Backhaul Link
Security Security Security
UE Termination Termination Termination
Secure Secure
Radio Function Function Function
Backhaul Link
Interface
Other RAN Functions

15 © Nokia Solutions and Networks 2016 Public


3GPP (3.Generation Partnership Project)
• SA1 – Services ( requirements):
- “SMARTER” Technical Report TR 22.891
- Four dedicated TRs on Massive Internet of Things (mIoT), Critical
Communications (CriC), Enhanced Mobile Broadband (eMBB),
Network Operation (NEO)
- An overview of security requirements in these reports is given
by a current SA3 contribution (S3-160458)
• SA2 – Architecture: Study ongoing (TR 23.799)
(includes an authentication framework as a topic
to be investigated)
• SA3 – Security: see next slide
• Security appears also in the work of RAN groups

16 © Nokia Solutions and Networks 2016 Public SA: Service and System Aspects
3GPP SA 3
• SA3 – Security: Study agreed, skeleton of TR 33.899 exists, security “key
issues” as well as solutions to be investigated
- ~60 contributions to SA3 Meeting #83 (this week), proposing various security areas
Network Subscriber
Architectural Network Virtualization User
Aspects Privacy Awareness and
Slices Security
Control of Security
Security Minimum security
Authentication Resilience AAA level assured by
Methods, the UE Security
identifiers and Authentication within NG UE
Credentials and Authorisation User plane Key
Core Network security Hierarchy
Security Key
Control Plane Access Network
Features Security Connectivity Negotiation
Signaling Plane
Security Over Relays

- and a lot of key issues, partly already with solutions


17 © Nokia Solutions and Networks 2016 Public
LTE Security Aspects – A more detailed view
Authentication and Key Agreement

Non access stratum HSS IMS / Operator


signaling security AuC PCRF services
K
User Identity Privacy
MME Core interface
KASME security
VoLTE/IMS security
UE Access stratum eNB
UICC security Backhaul link
KeNB
K security Serv.-GW PDN-GW Internet
Secure
KASME
KeNB RRC Environment

PDCP Crypto
algorithms More security aspects: Mobility (key separation in
RLC
handovers), Home eNB, Relay Node, non-3GPP access, dual
MAC connectivity (LTE, LTE/WiFi), proximity services (incl. device-
PHY to-device communication), security assurance methods, …

18 © Nokia Solutions and Networks 2016 Public


Elements of a 5G Security Architecture  Research Topics
Authentication/autorization, key agreement
EPS-AKA, EAP-AKA’, EAP-xyz, others?
Security negotiation, key hierarchy
Enhanced C-plane robustness NFV security
Enhanced subscriber privacy
Network slicing security
C/U-plane security Security assurance for NFV
Crypto algorithms environments
Protocol layer for sec.
Physical layer sec.
Jamming Protection

5G remote Local NFV Aggregation


radio head platform
cloud Central cloud
Subscriber Id, Device Id, credentials
(e/i)UICC, other security modules Security management and orchestration
Security awareness and control Self-adaptive, intelligent security controls

19 © Nokia Solutions and Networks 2016 Public


Network Slicing Security
NGMN
• (Sub-)network slice
blueprint/instance
• Sharing subnetwork slice
instances
• Security considerations Source: NGMN 5G Whitepaper

Network slicing discussed in Research Projects, in 3GPP (SA1, SA2, SA3)


The obvious basic security requirement: Isolation!
Should be provided in the cloud by cloud security mechanisms.
Are we OK? Maybe not. Don’t know how to hack a hypervisor? Take a tutorial!
(https://www.troopers.de/events/troopers15/293_exploiting_hypervisors/ )
 “Participants will learn about the […] security pitfalls of these platforms and will
analyze and exploit three recent vulnerabilities in these hypervisors”
20 © Nokia Solutions and Networks 2016 Public
Holistic Security Management and Orchestration

Security Orchestrator Trust Network Data


Hardening
Management Protection Protection
Design (policies and topology) Automation (policies, compliance validation)

ETSI NFV Reference Architecture


NFVO (Network Service Lifecycle)
VNF Manager (VNF Lifecycle)

VSF
VNF ..
Hyper KVM VMware (ESXi) Virtual Infrastructure Manager
visor Security Functions Security Functions Openstack VMware (vCenter, vCloud)
PSF Data Center
Compute Storage Network (SDN)
.. Hardware
Security Features Security Features

21 © Nokia Solutions and Networks 2016 Confidential


Example: Network based Anomaly Detection for IoT

Dashboard for IoT


and end user devices
Security Insight Action Engine
(Dashboard) (automated actions)
Uses device profiles
Decide Act and Telco data for
Managed corporate detection and
IoT networks Malware Correlation of automated mitigation
• Known network intelligence DB traffic
architecture Analyze patterns
Sense
Detailed real-time
• Known device types
information about
infected devices

Radio Core

22 © Nokia Solutions and Networks 2016 Public


5G Security Vision

Supreme
built-in security Securing 5G networks is a
Flexible security multi-faceted, interesting and
mechanisms challenging task!
Automation

Questions?

23 © Nokia Solutions and Networks 2016 Public

You might also like