Scope
5G phase 1 specifications are now done, and the world is preparing for the arrival of 5G networks. A major design goal of 5G is a high degree of flexibility to better cater for specific needs of actors from outside the telecom sector (e.g. automotive industry, mission-critical organisations). During this workshop, we will review how well 5G networks can provide security for different trust models, security policies, and deployment scenarios – not least for ongoing threats in the IoT world. 5G provides higher flexibility than legacy networks by network slicing and virtualization of functions. The workshop aims to discuss how network slicing could help in fulfilling needs for different users of 5G networks.
5G will allow the use of different authentication methods. This raises many interesting questions. How are these authentication methods supported in devices via the new secure element defined in ETSI SCP, or vendor-specific concepts? How can mission-critical and low-cost IoT use cases coexist side-by-side on the same network?
The 5G promise of higher flexibility is also delivered via its Service-Based Architecture (SBA). SBA provides open 3rd party interfaces to support new business models which allow direct impact on network functions. Another consequence of SBA is a paradigm shift for inter-operator networks: modern APIs will replace legacy signaling protocols between networks. What are the relevant security measures to protect the SBA and all parties involved? What is the role of international carrier networks like IPX in 5G?
Event Objectives
The workshop intends to:
- Gather different actors involved in the development of 5G, not only telecom, and discuss together how all their views have shaped phase 1 of 5G, to understand how security requirements were met, and what challenges remain;
- Discuss slicing as a means to implement separate security policies and compartments for independent tenants on the same infrastructure;
- Give an update of what is happening in 3GPP 5G security;
- Explain to IoT players what 5G security can (and cannot) do for them, including risks and opportunities related to alternative access credentials;
- Understand stakeholders' (PMNs, carriers, GSMA, vendors) needs to make SBA both secure and successful. How can SBA tackle existing issues in interconnect networks like fraud, tracking, privacy breaches;
- Allow vendors to present interesting proposals for open security questions in 5G: secure credential store, firewalling SBA's RESTful APIs;
- Debate about hot topics such as: IoT security, Slicing security, Privacy, Secure storage and processing and Security of the interconnection network.
Target Audience
The 5G Security workshop will be of interest to:
- Industry, customers and regulators
- Researchers and standardizers
- Research Institutes & Universities
- SMEs and Start-Ups driving security innovation
- Chipset and Device Manufacturers
- Network Infrastructure Manufacturers
- Network security vendors (firewalls, API gateways)
- Network Operators and international (IPX) carriers
- Service Providers
Wednesday 13 June 2018 pm | |
13:00 | Check-in/Registration opens |
13:30 | Welcome Bengt Sahlin, Ericsson |
13:40 | Session 1: Input to 5G: Views from Different Stakeholders Session Chair: Bengt Sahlin, Ericsson |
13:40 Hardening a Mission Critical Service Using 5G Peter Haigh, NCSC | |
13:55 Security in the Automotive Electronics Area Alexios Lekidis, SecurityMatters | |
14:15 Questions & Answers | |
14:30 Integrating the SIM (iUICC) Adrian Escott, QUALCOMM | |
14:45 Smart Secure Platform Klaus Vedder, Giesecke & Devrient, ETSI SCP Chairman | |
15:00 Questions and Answers | |
15:15 | Coffee and Networking Break |
16:00 | Session 1: Input to 5G: Views from Different Stakeholders (continuation) Session Chair: Bengt Sahlin, Ericsson |
16:00 Network Slicing Anne-Marie Praden, Gemalto | |
16:15 Don't build on Sand: Validating the Security Requirements of NFV Infrastructure to Confidently Run Slices Nicolas Thomas, Fortinet | |
16:30 Questions & Answers | |
16:40 5G Enhancements to Non-3GPP Access Security Andreas Kunz, Lenovo | |
16:55 Security and Privacy of IoT in 5G Marcus Wong, Huawei Technologies | |
17:10 ITU-T activities and Action Plan on 5G Security Yang Xiaoya, ITU-T SG17 | |
17:25 Questions & Answers | |
17:40 | Wrap up: 5G Overview from 3GPP SA3 Perspective and What is There to Be Done for Phase 2 Sander Kievit, TNO |
18:00 | Close of the Day and Networking Cocktail |
Thursday 14 June am | |
09:00 | Session 2: Security in 5G Inter-Network Signalling Session Chair: Stefan Schroeder, T-Systems |
09:00 Presentation on SBA: Introduction of the Topic and Current Status in SA3 Stefan Schroeder, T-Systems | |
09:20 5G Inter-PLMN Security: The Trade-off Between Security and the Existing IPX Business Model Ewout Pronk, KPN on behalf of GSMA Diameter End to End Security Subgroup | |
09:40 Secure Interworking Between Networks in 5G Service Based Architecture Silke Holtmanns, Nokia Bell Labs | |
10:00 | Coffee & Networking Break |
10:30 | Session 2: Security in 5G Inter-Network Signalling (continuation) Session Chair: Stefan Schroeder, T-Systems |
10:30 Security Best Practises using RESTful APIs Sven Walther, CA Technologies | |
10:50 Identifying and Managing the Issues around 5G Interconnect Security Stephen Buck, Evolved Intelligence | |
11:10 Zero Trust Security Posture in 5G Architecture Galina Pildush, Palo Alto Networks | |
11:30 Questions & Answers with all Session 2 Speakers | |
12:00 | Workshop Wrap up: 5G Phase 1 Conclusions and Outlook Towards Phase 2 Stefan Schroeder, T-Systems and Bengt Sahlin, Ericsson |
12:30 | Close of the event - Lunch Break |
Click here to access the Presentations for What does 5G Security Offer?
The Programme Committee is composed of the following members:
- Mirko Cano Soveri, ETSI
- Peter Haigh, NCSC
- Anand R. Prasad, NEC Corporation
- Bengt Sahlin,Ericsson Research NomadicLab
- Stefan Schroeder, T-Systems International GmbH
The Programme Committee is in charge of selecting the presentations that fit the event objectives and build the 5G Security programme.