5G Security in the Spotlight: Can it Help Sustain Future IoT Applications?

essidsolutions

5G security is gaining massive attention in the current crisis. Dimitrios Pavlakis, Senior Analyst at ABI Research outlines how cybersecurity operations linked with 5G connectivity are lacking in certain areas and how IT stakeholders can rethink 5G security strategy.

Stakeholders might need to re-think their long-term strategies, especially when certain high-profile Mobile Network Operators (MNOs) and vendors are dominating the value chain and extending their reach in other geographic areas worldwide. All signs point toward 5G increasing the cyber-threat surface across the board.

Essentially, this may well boil down to one key factor: Internet of ThingsOpens a new window (IoT) integration. The premise of having such a high-powered, IP-enabled cellular technology intertwined with billions of IoT devices and systems worldwide will expand both network- and internet-related threats. This has the potential to affect most related verticals and end markets that chose to invest in 5GOpens a new window : critical features in automotive, smart city integrations and public securityOpens a new window , energy, critical infrastructure, healthcare systems, industrial/manufacturing, and Industrial IoT (Industrial Internet of Things), enterprise and, of course, consumer verticals.

Learn More: Future-Proofing Your Business for 5GOpens a new window

By itself, 5G does not “help” or “hinder” security Opens a new window since it all depends greatly on the target implementation. The key difference that implementers need to keep in mind is the edge versus core processing. In 4G, there is a clear distinction between the network core (which processes the data) and the edge (which allows for user connectivity).

In 5G, these two operations will be intertwined and supported by virtualized hardware components with software from multiple vendors at the same time (and potentially from different countries), which might significantly affect the overall security posture. Some claim this might increase security since there might be no single point of failure (i.e., no separation between core and edge); others point out that certain vendors with less-than-optimal security measures or perhaps even sinister intentions might compromise the network (in some cases, even in another country). This is in tune with the U.S. executive order issued on May 15, 2019 regarding foreign threat actors that constantly monitor and exploit vulnerabilities in network and communication systems.

To put it simply, in practice, assigning a “critical component” tag on certain parts of a network or system (or any technology really) is a good thing. This allows organizations to clearly address the security functions in key technological components before moving on to other system functions. If this core and edge merge in 5G networks means that this separation between critical and non-critical components becomes rather blurry, then risk-assessment needs to be addressed, standardization and regulations implemented, and multiple security aspects reworked for each different implementation and vertical. This does not necessarily mean “no core network,” but rather that the core will be split up into many smaller base-stations that might not have the ability to enhance the cybersecurityOpens a new window operations that will be required in some cases.

Learn More: 5G & IoT: 5 Tips to Stay on Top of Security ThreatsOpens a new window

Looking ahead, all involved and opposed parties should not be too quick to outright adopt or blindly combat future 5G integrations but rather seek to reach an appropriate level of tolerance—an acceptable security threshold per se—which will clearly outline the security scope for involved use case scenarios while also taking into account the monetary infrastructure investments that might be required.

Security prerequisites for 5G will change considerably, and one must also keep in mind that the tech migration and transition from 4G will not be easy for some verticals in IoT that historically have a higher dependence on legacy tech (e.g., industrial and manufacturing). This potentially includes different network segmentation, more secure gateway components and firewalls, and the introduction of more potent behavioral network monitoring and intruder prevention systems, virtualization and software container aspects, encryption key lifecycle management, consistency over patching and firmware updates, and anti-Distributed Denial of Service (DDoS) measures, among a host of other variables, while still keeping in mind the number of vendors, network operators, implementers, government agencies, and/or any other entities that need to be part of that security value chain.

Learn More: 5G Networks Are Coming, So is a New Set of VulnerabilitiesOpens a new window

On the other hand, if only a small number of vendors control access, then that might greatly increase the chances for network exploitation, greatly propagate vendor-specific vulnerabilities, increase the risk for data privacy concerns, or enable third-party access, outright fraud, or unlawful conduct threatening citizen rights.

The bottom line is that cybersecurityOpens a new window concerns are still at the bottom of the implementation list for a large percentage of organizations worldwide. There are still a great deal of security concerns that are, even now, quite prevalent across the entire tech spectrum and relate to technologies that are quite familiar to organizations (including cellular tech like 4G or industry-specific protocols like Modbus). If companies fail to combat the already-known security issues of familiar technologies and protocols, one can only speculate the impact that new technology like 5G will have on the entire IoTOpens a new window spectrum if security is not properly addressed.

Let us know if you liked this article on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window . We would love to hear from you!