SlideShare a Scribd company logo
Paul Bradley, Head of 5G Strategy & Partnerships
May 15th 2018
A New Trust Model for 5G Networks
A complex ecosystem emerges
A new trust model for the 5G era2
5G system security and data protection
A new trust model for the 5G era3
The greatest risks to enterprise data:
CONFIDENTIALITY, INTEGRITY,
AVAILABILITY
What at
A new trust model for the 5G era4
A new trust model for the 5G era5
CENTRAL
CLOUD
Fixed or
Mobile/
Backhaul Wide Area
Network
METRO
EDGES
LOCAL
EDGES UE
Local Access
Network
A new trust model for the 5G era6
What virtualization & 5G mean for security
RESOURCE
SHARING BETWEEN
THE TELECOM OPERATOR
AND
THE ENTERPRISE
ZERO-TOUCH
AUTOMATION
Softwarization
of the network Integration of existing
and new local access
networksMoving the intelligence
towards the edge
A new trust model for the 5G era7
Customer controlled encryption
of the VMs
or containers running
in the network
Encryption management
for centralized lifecycle
management leveraging
the most reliable root of trust
Stored database encryption
Secure enclaves at the edge
Ultra-low latency encryption
of ‘anyhaul’ transport
Key capabilities to create trustworthy 5G virtualized
networks
Softwarization
of the network
CENTRAL
CLOUD
Moving the intelligence
towards the edge
Integration of existing
and new local
access networks
Fixed or
Mobile/
Backhaul Wide
Area Network
METRO
EDGES
LOCAL
EDGES UE
Local Access
Network
Secure enclaves
A new trust model for the 5G era8
A local trusted execution environment is needed to protect keys thus preventing
unauthorized access to, and manipulation of VNFs, apps or sensitive data.
Secure enclave solutions are hardware encrypted zones created at the chip level
that give developers the means of leveraging the CPU to create
isolated, trusted, memory regions.
A New Trust Model for 5G Networks
5G / NFV INFRASTRUCTURE
HARDWARE RESOURCES (CPU, STORAGE, NETWORK)
HYPERVISOR
A hypervisor provides a first level of isolation between co-located functions,
based on logical separation secured by firewalls.
Multi
Access
EDGE
5G / NFV INFRASTRUCTURE
HARDWARE RESOURCES (CPU, STORAGE, NETWORK)
HYPERVISOR
Malicious code could leak data through the walls as functions are co-located
on the same machine. Data-centric protection is required.
Multi
Access
EDGE
5G CORE / EDGE COMPUTE INFRASTRUCTURE
5G Network
Manager &
Orchestrator
(MANO)
ATTESTATION
SERVER
Intel® Software
Guard Extensions
(Intel® SGX)
The NFV and enterprise app security is provided by a Gemalto Protection Agent on each machine,
propagated into the Intel® SGX secure enclave and certified by an attestation server.
Gemalto Protection Agent
Simple Provisioning
eases OEM integration and
logistics
Dynamic, Seamless & Secure
migration of VNFs/apps from
one machine to another
Confidentiality and Integrity
protection of VNFs and apps is
assured at runtime
Agnostic
VM or Container-level protection
for VNFs and enterprise apps
High performance, secure
credential storage and key
management assured by a
Hardware Root of Trust
Protects NFVs and apps at the
core and at the edge of the
network
Download our whitepaper on 5G Network Security here
gemalto.com/5g
A new trust model for the 5G era14
Thank you
You can find me on
15 A new trust model for the 5G era

More Related Content

PDF
The essential role of AI in the 5G future
PDF
Enabling on-device learning at scale
PDF
Etsi wp24 mec_deployment_in_4_g_5g_final
PPT
Telecom software testing for CSPs
PPTX
Machine learning for 5G
PDF
Leading Research Across the AI Spectrum
PDF
Network slicing-5g-beyond-networks
PDF
Efficient video perception through AI
The essential role of AI in the 5G future
Enabling on-device learning at scale
Etsi wp24 mec_deployment_in_4_g_5g_final
Telecom software testing for CSPs
Machine learning for 5G
Leading Research Across the AI Spectrum
Network slicing-5g-beyond-networks
Efficient video perception through AI

What's hot (20)

PDF
5G Fundamentals
PDF
White Box Hardware Challenges in the 5G & IoT Hyperconnected Era
PPTX
Self interference cancellation of full duplex technology in 5G
PDF
Alcatel Wimax Whitepaper (quantumwimax.com)
PDF
5G positioning for the connected intelligent edge
PDF
Understanding 5G Guide
PDF
Intelligently connecting our world in the 5G era
PPTX
PhD Projects in Telecommunication Research Help
PDF
What's in the future of 5G millimeter wave?
PDF
5G Security Briefing
PPTX
Carrier As A Service15102009
PPT
Presentación Qualcomm evento Movilidad en la empresa española
PDF
Wireless Multimedia Sensor Networks
PDF
LTE :Mobile Network Security
DOCX
Lte security solution white paper(20130207)
PDF
5G + AI: The Ingredients For Next Generation Wireless Innovation
PDF
Low Power Wireless Technologies and Standards for the Internet of Things
PPTX
ECI-Revolutionizing Services with Cloud Native
PDF
5G, IoT and AI. Overview strategy for business_Rev20200505
PDF
Transforming enterprise and industry with 5G private networks
5G Fundamentals
White Box Hardware Challenges in the 5G & IoT Hyperconnected Era
Self interference cancellation of full duplex technology in 5G
Alcatel Wimax Whitepaper (quantumwimax.com)
5G positioning for the connected intelligent edge
Understanding 5G Guide
Intelligently connecting our world in the 5G era
PhD Projects in Telecommunication Research Help
What's in the future of 5G millimeter wave?
5G Security Briefing
Carrier As A Service15102009
Presentación Qualcomm evento Movilidad en la empresa española
Wireless Multimedia Sensor Networks
LTE :Mobile Network Security
Lte security solution white paper(20130207)
5G + AI: The Ingredients For Next Generation Wireless Innovation
Low Power Wireless Technologies and Standards for the Internet of Things
ECI-Revolutionizing Services with Cloud Native
5G, IoT and AI. Overview strategy for business_Rev20200505
Transforming enterprise and industry with 5G private networks
Ad

Similar to A New Trust Model for 5G Networks (20)

PDF
Building a chain of trust from the device to the cloud in 5G
PDF
Quick Quote App Portfolio
PDF
Cor review2018-a
PDF
Gemalto Review: 5G Feature
PPTX
5G mission diary: Houston, we have a problem
PDF
The role-of-5g-in-private-networks-for-industrial-iot (1)
PDF
NFV evolution towards 5G
PPTX
SaskTel & Data for Good - Sean Milne
PDF
Presentation - 5G Private & Dedicated Networks.pdf
PDF
Securing the 5G growth story with NFVi (1).pdf
PDF
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
PDF
Securing the 5G growth story with NFVi.pdf
PDF
5 g network white paper
PPTX
Zero Touch 5G Slicing Infrastructure Management | Thủy Đặng, Trinh Nguyen
PPTX
Zero Trust for Private 5G and Edge
PDF
5G TO MARS
PDF
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
PDF
5G Multi-Access Edge Compute
PDF
Great Expectations: The life and times of 5G. Vish (Vishwamitra) Nandlall
PDF
Trustworthy networking and technical considerations for 5G
 
Building a chain of trust from the device to the cloud in 5G
Quick Quote App Portfolio
Cor review2018-a
Gemalto Review: 5G Feature
5G mission diary: Houston, we have a problem
The role-of-5g-in-private-networks-for-industrial-iot (1)
NFV evolution towards 5G
SaskTel & Data for Good - Sean Milne
Presentation - 5G Private & Dedicated Networks.pdf
Securing the 5G growth story with NFVi (1).pdf
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Securing the 5G growth story with NFVi.pdf
5 g network white paper
Zero Touch 5G Slicing Infrastructure Management | Thủy Đặng, Trinh Nguyen
Zero Trust for Private 5G and Edge
5G TO MARS
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
5G Multi-Access Edge Compute
Great Expectations: The life and times of 5G. Vish (Vishwamitra) Nandlall
Trustworthy networking and technical considerations for 5G
 
Ad

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Modernizing your data center with Dell and AMD
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
Advanced methodologies resolving dimensionality complications for autism neur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Modernizing your data center with Dell and AMD
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
The Rise and Fall of 3GPP – Time for a Sabbatical?

A New Trust Model for 5G Networks

  • 1. Paul Bradley, Head of 5G Strategy & Partnerships May 15th 2018 A New Trust Model for 5G Networks
  • 2. A complex ecosystem emerges A new trust model for the 5G era2
  • 3. 5G system security and data protection A new trust model for the 5G era3 The greatest risks to enterprise data: CONFIDENTIALITY, INTEGRITY, AVAILABILITY
  • 4. What at A new trust model for the 5G era4
  • 5. A new trust model for the 5G era5
  • 6. CENTRAL CLOUD Fixed or Mobile/ Backhaul Wide Area Network METRO EDGES LOCAL EDGES UE Local Access Network A new trust model for the 5G era6 What virtualization & 5G mean for security RESOURCE SHARING BETWEEN THE TELECOM OPERATOR AND THE ENTERPRISE ZERO-TOUCH AUTOMATION Softwarization of the network Integration of existing and new local access networksMoving the intelligence towards the edge
  • 7. A new trust model for the 5G era7 Customer controlled encryption of the VMs or containers running in the network Encryption management for centralized lifecycle management leveraging the most reliable root of trust Stored database encryption Secure enclaves at the edge Ultra-low latency encryption of ‘anyhaul’ transport Key capabilities to create trustworthy 5G virtualized networks Softwarization of the network CENTRAL CLOUD Moving the intelligence towards the edge Integration of existing and new local access networks Fixed or Mobile/ Backhaul Wide Area Network METRO EDGES LOCAL EDGES UE Local Access Network
  • 8. Secure enclaves A new trust model for the 5G era8 A local trusted execution environment is needed to protect keys thus preventing unauthorized access to, and manipulation of VNFs, apps or sensitive data. Secure enclave solutions are hardware encrypted zones created at the chip level that give developers the means of leveraging the CPU to create isolated, trusted, memory regions.
  • 10. 5G / NFV INFRASTRUCTURE HARDWARE RESOURCES (CPU, STORAGE, NETWORK) HYPERVISOR A hypervisor provides a first level of isolation between co-located functions, based on logical separation secured by firewalls. Multi Access EDGE
  • 11. 5G / NFV INFRASTRUCTURE HARDWARE RESOURCES (CPU, STORAGE, NETWORK) HYPERVISOR Malicious code could leak data through the walls as functions are co-located on the same machine. Data-centric protection is required. Multi Access EDGE
  • 12. 5G CORE / EDGE COMPUTE INFRASTRUCTURE 5G Network Manager & Orchestrator (MANO) ATTESTATION SERVER Intel® Software Guard Extensions (Intel® SGX) The NFV and enterprise app security is provided by a Gemalto Protection Agent on each machine, propagated into the Intel® SGX secure enclave and certified by an attestation server. Gemalto Protection Agent
  • 13. Simple Provisioning eases OEM integration and logistics Dynamic, Seamless & Secure migration of VNFs/apps from one machine to another Confidentiality and Integrity protection of VNFs and apps is assured at runtime Agnostic VM or Container-level protection for VNFs and enterprise apps High performance, secure credential storage and key management assured by a Hardware Root of Trust Protects NFVs and apps at the core and at the edge of the network
  • 14. Download our whitepaper on 5G Network Security here gemalto.com/5g A new trust model for the 5G era14
  • 15. Thank you You can find me on 15 A new trust model for the 5G era