What does 5G Security Offer?

Wednesday 13 June 2018 13:30 - Thursday 14 June 13:00 Amphitheatre Athena (240 pax)

register-button-small

5G phase 1 specifications are now done, and the world is preparing for the arrival of 5G networks. A major design goal of 5G is a high degree of flexibility to better cater for specific needs of actors from outside the telecom sector (e.g. automotive industry, mission-critical organisations). During this workshop, we will review how well 5G networks can provide security for different trust models, security policies, and deployment scenarios – not least for ongoing threats in the IoT world. 5G provides higher flexibility than legacy networks by network slicing and virtualization of functions. The workshop aims to discuss how network slicing could help in fulfilling needs for different users of 5G networks.
5G will allow the use of different authentication methods. This raises many interesting questions. How are these authentication methods supported in devices via the new secure element defined in ETSI SCP, or vendor-specific concepts? How can mission-critical and low-cost IoT use cases coexist side-by-side on the same network?
The 5G promise of higher flexibility is also delivered via its Service-Based Architecture (SBA). SBA provides open 3rd party interfaces to support new business models which allow direct impact on network functions. Another consequence of SBA is a paradigm shift for inter-operator networks: modern APIs will replace legacy signaling protocols between networks. What are the relevant security measures to protect the SBA and all parties involved? What is the role of international carrier networks like IPX in 5G?

Event Objectives

The workshop intends to:

  • Gather different actors involved in the development of 5G, not only telecom, and discuss together how all their views have shaped phase 1 of 5G, to understand how security requirements were met, and what challenges remain;
  • Discuss slicing as a means to implement separate security policies and compartments for independent tenants on the same infrastructure;
  • Give an update of what is happening in 3GPP 5G security;
  • Explain to IoT players what 5G security can (and cannot) do for them, including risks and opportunities related to alternative access credentials;
  • Understand stakeholders' (PMNs, carriers, GSMA, vendors) needs to make SBA both secure and successful. How can SBA tackle existing issues in interconnect networks like fraud, tracking, privacy breaches;
  • Allow vendors to present interesting proposals for open security questions in 5G: secure credential store, firewalling SBA's RESTful APIs;
  • Debate about hot topics such as: IoT security, Slicing security, Privacy, Secure storage and processing and Security of the interconnection network.

Target Audience

The 5G Security workshop will be of interest to:

  • Industry, customers and regulators
  • Researchers and standardizers
  • Research Institutes & Universities
  • SMEs and Start-Ups driving security innovation
  • Chipset and Device Manufacturers
  • Network Infrastructure Manufacturers
  • Network security vendors (firewalls, API gateways)
  • Network Operators and international (IPX) carriers
  • Service Providers

  Wednesday 13 June 2018 pm
13:00 Check-in/Registration opens
13:30  Welcome
Bengt Sahlin, Ericsson
13:40 Session 1: Input to 5G: Views from Different Stakeholders
Session Chair: Bengt Sahlin, Ericsson
  13:40 Hardening a Mission Critical Service Using 5G
Peter Haigh, NCSC
  13:55 Security in the Automotive Electronics Area
Alexios Lekidis, SecurityMatters
  14:15 Questions & Answers
  14:30 Integrating the SIM (iUICC)
Adrian Escott, QUALCOMM
  14:45 Smart Secure Platform
Klaus Vedder, Giesecke & Devrient, ETSI SCP Chairman
  15:00 Questions and Answers
15:15 Coffee and Networking Break 
16:00 Session 1: Input to 5G: Views from Different Stakeholders (continuation)
Session Chair: Bengt Sahlin, Ericsson
  16:00 Network Slicing
Anne-Marie Praden, Gemalto
  16:15 Don't build on Sand: Validating the Security Requirements of NFV Infrastructure to Confidently Run Slices
Nicolas Thomas, Fortinet
  16:30 Questions & Answers
  16:40 5G Enhancements to Non-3GPP Access Security
Andreas Kunz, Lenovo
  16:55 Security and Privacy of IoT in 5G
Marcus Wong, Huawei Technologies
  17:10 ITU-T activities and Action Plan on 5G Security
Yang Xiaoya, ITU-T SG17
  17:25 Questions & Answers
17:40 Wrap up: 5G Overview from 3GPP SA3 Perspective and What is There to Be Done for Phase 2
Sander Kievit, TNO
18:00 Close of the Day and Networking Cocktail

   Thursday 14 June am
09:00 Session 2: Security in 5G Inter-Network Signalling
Session Chair: Stefan Schroeder, T-Systems
  09:00 Presentation on SBA: Introduction of the Topic and Current Status in SA3
Stefan Schroeder, T-Systems
  09:20 5G Inter-PLMN Security: The Trade-off Between Security and the Existing IPX Business Model
Ewout Pronk, KPN on behalf of GSMA Diameter End to End Security Subgroup
  09:40 Secure Interworking Between Networks in 5G Service Based Architecture
Silke Holtmanns, Nokia Bell Labs
10:00 Coffee & Networking Break 
10:30 Session 2: Security in 5G Inter-Network Signalling (continuation)
Session Chair: Stefan Schroeder, T-Systems
  10:30 Security Best Practises using RESTful APIs
Sven Walther, CA Technologies
  10:50 Identifying and Managing the Issues around 5G Interconnect Security
Stephen Buck, Evolved Intelligence
  11:10 Zero Trust Security Posture in 5G Architecture
Galina Pildush, Palo Alto Networks
 

11:30 Questions & Answers with all Session 2 Speakers 

12:00 Workshop Wrap up: 5G Phase 1 Conclusions and Outlook Towards Phase 2
Stefan Schroeder, T-Systems and Bengt Sahlin, Ericsson
12:30 Close of the event - Lunch Break

Click Here to access the Presentations for What does 5G Security Offer?

The Programme Committee is composed of the following members:

  • Mirko Cano Soveri, ETSI
  • Peter Haigh, NCSC
  • Anand R. Prasad, NEC Corporation
  • Bengt Sahlin,Ericsson Research NomadicLab
  • Stefan Schroeder, T-Systems International GmbH

The Programme Committee is in charge of selecting the presentations that fit the event objectives and build the 5G Security programme.