• Deutsche Telekom involvement was flagged in a research paper detailing an emerging, policy-based system to cover vulnerabilities in security systems for 5G heterogeneous networks.

5G security policies in the works

5G security policies in the works

Source: Middlesex University

Deutsche Telekom (DT) involvement was flagged in a research paper detailing an emerging, policy-based system to cover vulnerabilities in security systems for 5G heterogeneous networks. A group of researchers from DT, the Networking Research Group at Middlesex University, the Computer Laboratory at Cambridge University, and Samsung Research are apparently the brains behind the proposed Y‑Communication (Y‑Comm) framework. Y‑Comm uses Ponder2, a general-purpose distributed object management system. The aim of the new architecture is to achieve the main service requirements of 5G — lower latency, faster downlinks speeds, and greater capacity than 4G — while still addressing unique security challenges posed by the next‑gen cellular tech. The paper, Policy-Based Security Management system for 5G Heterogeneous Networks, written by academics from universities in the UK and Saudi Arabia, stressed that 5G was a new ball game when it came to security. Due to its open architecture and IP‑based environment, the paper warned that 5G heterogeneous networks will be subject to threats not really seen with 3G and 4G. These include IP address spoofing, user ID theft, denial of service, and intrusion attacks. Initial tests of Y‑Comm were encouraging in terms of quality of service, security, and “vertical handover” (disconnection rates of between 4% and 7%), said the paper’s authors.