5G network advancement work Fiber optic splitter calculator

Share This Post

IMT-2022 (5G) Promotion Group’s next key work in 5G security includes two aspects:
1) 5G network security architecture design: Design a flexible and scalable security architecture, analyze security mechanisms and protocols, and study specific technical implementation methods for slice security, security capability opening, security credential management, and on-demand user privacy protection.

2) International standardization of symmetric cryptographic algorithms with 256-bit key length: At present, 3GPP SA3 has started to adopt a pair of 128-bit key length and 256-bit key length in 5G networks.
Speaking of the discussion of cryptographic algorithms, the promotion group will promote the evaluation of cryptographic algorithms such as ZUC-256 (with a key length of 256 bits) as soon as possible, and actively promote cryptographic algorithms such as ZUC-256 to become international standards.

At present, 3GPP SA3 is already carrying out 5G security-related standardization work, including research projects (such as next-generation system security technology research) and standard projects (such as 5G system security architecture and processes). It is planned to complete the REL-15 in March 2018. Standardized work. Since the 5G network security features and solutions need to be closely integrated with the radio access network and core network architecture, in addition to SA3, 3GPP SA1, SA2, RAN2, RAN3 5G network architecture and 5GRAN related research, also with 5G security standardization work is closely related.

New technologies such as NFV/SDN will bring new impacts to 5G network security. The research content of ETSI NFV security group involves NFV security architecture, privacy protection, lawful interception, MANO (management and orchestration) security, certificate management, security management, Security deployment and other aspects; ONF (Open Network Foundation) and ITU-T’s research content involves the standardization of SDN security.

Facing more diversified business scenarios, multiple access methods, multiple device forms, new business models, higher privacy protection requirements, and new network architecture security requirements in the future, the 5G network security architecture will support data security protection, unified authentication framework and business authentication, multi-level slice security, differentiated security protection, open security capabilities, multiple security credential management, and on-demand user privacy protection, etc. Identifying 5G network security requirements and architecture as early as possible, and comprehensively considering 5G security requirements in the overall architecture design, business processes, algorithms and subsequent standardization work of 5G networks will help ultimately achieve the goal of building a more secure and reliable 5G new network.

With the full development of 5G network security standardization and the continuous deepening of research, the IMT-2022 (5G) Promotion Group is willing to strengthen cooperation with 5G-related organizations, enterprises, scientific research institutions and universities around the world to jointly promote research on 5G network security requirements and architecture. , to promote 5G security standards and the vigorous development of the industry.

More To Explore

Do you want more professional advice and solutions?

drop us a line and keep in touch

Fibconet Team

Get A Quick Quote

We will respond within 12 hours, please pay attention to the email with the suffix “”

Also, you can go to the Contact Page, which provides a more detailed form.