“Security overall architecture” is a structured description of the system security architecture, and the definition of the security interrelationship between functional modules and security modules and security modules in the model. A scientific and reasonable security architecture can effectively guide the specific security mechanism design and technology development of the entire system. 5G security should break the “patch-type” upgrade and evolution model of the previous mobile communication system after it was formed, and evolve in synchronization with 5G mobile communication technology, so as to achieve the goal of “fixing both the root cause and the root cause” of system security endogenous and security threats. In order to achieve this goal, the design of the 5G security overall architecture (hereinafter referred to as the security architecture) should have good elasticity and scalability, and be able to meet the evolution and development needs of 5G security technology. fibconet.com cwdm fiber channel cwdm fiber channel
Specifically, corresponding to the new security requirements brought about by the evolution of 5G applications, networks, wireless access, terminals, and systems, the design requirements of the overall 5G security architecture can be summarized from the following five aspects:1) 5G will penetrate into diversified vertical industries and fields such as transportation, medical care, and industry, and support diversified information interaction between people, people and things, and things and things. Therefore, the security architecture should be oriented to diverse and massive applications and terminals, support unified identity management and authentication functions, and support the construction of diversified trust relationships; oriented to diversified security needs, support the flexible adaptation of differentiated security policies and modules . fibconet.com cwdm fiber channel cwdm fiber channel
2) With the introduction of technologies such as SDN, NFV, and slicing, 5G networks are characterized by virtualization, software, and openness. Faced with these characteristics, the security architecture should support highly reliable virtualization security technologies (such as SDN security, slice security, VNF security, etc.); support compliance monitoring of open interface calls to ensure the safe opening of services and capabilities. fibconet.com cwdm fiber channel cwdm fiber channel
3) The 5G wireless access network has the characteristics of multi-type access technology integration, ultra-dense networking, etc., and introduces new service technologies such as mobile edge computing (MEC). Therefore, the security architecture should support the integration of multiple types of access technologies and unified access security management, and have the MEC endogenous service security capabilities. fibconet.com cwdm fiber channel cwdm fiber channel
4) The application of 5G in enriching vertical industries and special fields makes the types of 5G terminals diversified. Therefore, the security architecture should meet the security requirements of diversified terminals, support the flexible adaptation of differentiated security policies and modules, and build a secure operating environment for highly trusted terminals. fibconet.com cwdm fiber channel cwdm fiber channel
5) The characteristics of 5G applications, networks, wireless access, terminals, etc. have led to a substantial increase in the attack surface of 5G networks. Therefore, in order to deal with potential unknown security threats, it is necessary to introduce into the security architecture the ability to manage and manage the 5G network security situation. Long-term means of monitoring and early warning. fibconet.com cwdm fiber channel cwdm fiber channel