Interview with Miss Stone / Bin Lee / Zhai in particular: 5G new era, how to do security building?

In the central mentioned many times, "new infrastructure" became the hottest contemporary social concerns. Followed by central guidance comes a single direction accelerated rules ground.

March 24, the Ministry website issued "on accelerating the development of 5G promote" further implement the overall layout of the new infrastructure. Notice specifically mentioned "efforts to build 5G security system", including strengthening the 5G network infrastructure security, strengthen 5G network data security, foster 5G network security industry ecosystem.

How should we approach the relationship between the 5G and security? And which security strategy should be adopted? Current and future security work should be how to develop? We invite Tencent to secure three senior security experts: Tencent laboratory safety Cohen, head of Miss Stone , Tencent cloud security deputy general manager Li Bin , chief researcher at Center for Security Studies Tencent new technologies, especially Zhai , share 5G safe construction point of view.

5G landing accelerate industry change

Security is especially important in the new scene

"New infrastructure" is becoming the core of the Internet era of industrial development of 5G keyword. The Ministry of Industry issued the "Circular on promoting 5G speed up the development of" means that China 5G scenarios will be more abundant, industry application solutions more comprehensive and complete, while the industrial Internet, car networking, healthcare, media and entertainment is becoming a 5G Innovation pilot areas of application. 

Q: as for the new generation of mobile communications technology, whether the relationship between security and 5G What has changed? Whether to become more closely?

 Li Bin  :

Certainly more closely, this is a multi-attribute decision by the 5G own has the.

The first is the network of the future 5G enormous influence. From the technology point of view, 5G has three major advantages: greater bandwidth, high-density access, extremely low latency. Its technical advantages determine 5G 4G will not only do good, but also do not do a thing before.

Trends in the application of specific industries, 5G will get more development on this several paths:

  • First of all, it is a continuation of the era of 4G mobile communication applications, higher speeds, greater bandwidth mobile broadband access networks, a wider range of connection types of home intelligent terminals and enterprise applications, and can carry 4K / 8K and AR / VR, etc. new media content, and industrial applications to home entertainment and interactive bring new changes;

  • Secondly, the expansion of the Internet of Things, 5G can provide good network coverage and the end of large-scale M2M (machine - machine) communication capability, allowing tens of billions of dollars at very low cost terminal and IoT sensor device has the ability to connect directly to the Internet , to "all things Internet, everything smart" evolution, further to the smart city, smart logistics, intelligent transportation, smart agriculture to provide new impetus;

  • Finally, low latency characteristics 5G to new industrial applications, particularly time-sensitive critical applications offers possibilities, such as remote monitoring and control signals and traffic control, industrial control systems and intelligent transportation autopilot in , as well as automated manufacturing, remote education and healthcare.

From the overall development of the Internet of the future look, 5G will become the most important part of the Internet, 5G-end information greatly improve network coverage, will bring enormous changes in the industry and society.

In 5G changing, expanding the boundaries of the Internet during those key industries about to be covered by the 5G, also the importance of their bonus on top of 5G. A typical example is the automatic pilot. Up to now, the mobile communications still can not cover all the needs of the autopilot, especially delay, 5G hopefully change that. But appropriate, as a key infrastructure for autonomous vehicles traveling at high speed, delay or destroy any data that can cause irreversible result, this is one of many tasks must be completed 5G safety and security in a .

Finally, within reason 5G's --5G qualified, have the ability to play such an important role in the future, the driving force of disruptive innovation is everywhere, eventually 5G future have the ability to create change. More simply, 5G industry development, space development, innovative applications are based on the premise of their ability to 5G.

This is a typical example is the 5G network standard network functions and network virtualization slice, can efficiently communication bandwidth and network resources organization and management capabilities through new hardware and software, but the new agreement, the new architecture, new technologies import also brings more threats to the system interface, thereby creating new security risks.

All in all, 5G network coverage and influence inevitably larger, 5G will involve more people with personal data, 5G itself contains a lot of changes in technology and industry innovation, which are bound to bring more security threats. In certain scenarios, specific applications, these security threats will be superimposed on each other, threatening further amplification.

The face of such a grim trend, 5G and security will be more closely, it is precisely because 5G still in the process of construction, a lot of variables, we should be one of the security front to complete as much as possible.

5G a new era of security needs in various forms

Currently, 5G is at a critical period of technology innovation and industrialization of cultivation: 5G networking capabilities introduces virtualization, edge computing, new technologies and new network features sections, such as service oriented architecture, these have brought new security challenges.

Q: application of innovation, is likely to become the next 5G key elements of the new infrastructure, which will determine 5G can play a useful role, this one will have to face the security challenges?

 Zhai in particular  :

5G first open application innovation is the "high-speed, low latency," which is actually a double-edged sword. On the one hand bring a better experience to the user, it also means that the network attack faster and more destructive. From the perspective of the overall point of view, the application of innovative 5G security challenges facing can be summarized in two points:

On the one hand, more diverse security requirements. 5G more diverse application scenarios, B end users to encrypt all of the demand for environmental information, C end user to focus on the key information encryption situation. Further broken down, the security needs of different users will also be further subdivided and differentiated, need to speed up the layout 5G security diversification. For example, autopilot, remote control in communication if compromised, it may involve life safety, in order to avoid a vehicle collision requiring high-level security measures, and can not be additional communication delay.

On the other hand, "signaling storm" or more frequently. As more and more into the 5G network IoT devices, mass Things initiated by the terminal "signaling storm" will cause network congestion or even collapse. Things equipment diverse security requirements, the need to reduce the cost of Things equipment in authentication and identity management, support networking terminal low-cost, efficient mass deployment, so the relevant business needs a lightweight security algorithms and security protocols to safeguard simple and efficient application security .

Actively respond to new security challenges

5G line of defense to build a new security era

Faced with new challenges, Tencent think 5G security mechanisms to meet the basic premise communications security, provide differentiated security services for different business scenarios, can adapt to a variety of network access methods and security architecture, focusing on user privacy protection, provide support open security capabilities.

Q: 5G security threats menacing face, we should develop strategies how to plan security capabilities? What direction is the ability should focus on?

 Zhai in particular  :

This I can share with you Tencent ideas, we are safe for the 5G capacity building constructed a forward-looking model, called "DEPAZ", includes five parts: defense in depth, embedded, persistent, automated, zero trust.

  • Defense in depth: security capabilities covering all levels of complex IT facilities;

  • Embedded: edge computing, microsystems, cloud, virtualization and other technologies widely used, traditional box-type safe mode is a great challenge, embedded security and adaptive architecture will lead the future of information security transformation;

  • Persistent: 5G requirements of the times Security Incident Response shift from sustained response mode, the need for constant monitoring, response, and even continued to validate access control policy;

  • Automation: 5G bring a lot of growth in terminal equipment, IT will be unusually large scale, automated security management system will require from automated scheduling, automated risk identification, automatic adjustment of the angle of protection strategies to enhance the intelligence level of security protection;

  • Zero Trust: 5G for borderless security is a natural demand, zero trust architecture key consideration, policy engine and security policy enforcement, border-free access and trusted computing.

5G car networking era of rapid development

Edge computing brings security issues

5G technology continues to mature so that vehicle networking prospects even more uncertain. Future, intelligent network linking the car would be "- vehicle - infrastructure" wide linkage, the decision to transfer and complete tasks through high-speed, low latency 5G network, but this scene also brings new security challenges.

Q: Can a concrete application scenario of a 5G, 5G specific about the security challenges?

 Li Bin  :

Currently scenarios 5G inside, autopilot may be easier to expand, because we probably have seen the movie plot. From the perspective view of the automatic driving inevitably rely 5G network to transmit various kinds of information, calculates various types of information. But it was not to be as they are now, like many AI applications, end side is only responsible for the data back to the cloud, and finally receive the results to calculate it? In fact, not necessarily, a large number of repeatedly uploading and downloading of data, not only a waste of network bandwidth, but also lead to overall system stability worse.

Now widely recognized as the ideal solution, in fact, the edge computing, each car itself should now have far more computing power, but in the process of edge computing, the data and calculations should be close communication and cloud. According to this trend, each a networked automobile are likely to encounter serious security threat, because it does not prevent the cloud can be adjusted according to the type of threat resource, directly connected to the end edge of the core network, it is likely to cause the entire system appears problem.

So autopilot this scenario, the security threat from the problem in fact a single vehicle itself, and instantly rose to a very complex system problems, the magnitude of this change is very large.

IoT-Sec to address the security challenges of Things

Tencent multi-line layout 5G security escort

With high-speed, low-latency characteristics of wide connections, 5G Internet makes everything possible. At the same time, the frequency of attacks for IoT smart terminal equipment is also on the rise.

Q: Is there currently Tencent to create a product for the safety of the scene 5G, 5G What about other security-related business development?

 Miss Stone  :

In terms of products, we have a IoT-Sec is built specifically for the Internet of Things scene. According to consultancy predicts that by 2025 we will have 22 billion active substance networking equipment. Originally separate, isolated, conventional security devices will be connected through a network of terminals all interconnected.

The device itself has more entrances and control, while this operation brings convenience to users, but also the formation of a more attack surface. Heavily fragmented phenomenon IoT devices and weak design and development of safety awareness, will lead to the factory firmware, there are all kinds of loopholes.

On the other hand, due to the number of the operating system itself IoT use, the use of infrastructure is not uniform, firmware format is due to vendor-specific, common formats hundreds, but there are still many manufacturers set their own special format of. Bring diversity to the IoT device customization and differentiation of convenience, but also brought challenges to the security automation testing.

IoT-Sec, Tencent is a set of security solutions for the Internet of Things era 5G security issues in advance of delivery. It can be across multiple platforms and systems architecture precise positioning and efficient security risks firmware. In addition to the IoT-Sec, Tencent in car safety networking has also seen success, Audi, Volkswagen, SAIC, GM and other processes are our customers, 5G security-related business is continuing to advance in the future we will at the right time announced.

 

Written in the last

5G is accelerating into reality, as a larger, more complete digital wave, we have to make more double-edged sword that we use to create more positive value. This has become a new challenge placed in front of the entire security industry, such as the Internet giant Tencent in which it should play a leading role, it is clear that they have done so.

To respond positively to the call of the Government to promote the development of 5G, the future Tencent will release industrial internet connection and technical capacity building and application of research in the various services 5G increased, and work together carriers, 5G application developers to explore new applications, new content and a new scene, and actively respond to security challenges, escort 5G development.

 

Published 34 original articles · won praise 3 · views 10000 +

Guess you like

Origin blog.csdn.net/qcloud_security/article/details/105337462