Communication: 5g security knowledge base

Introduction to 5g network

In 2015, The International Telecommunication Union (ITU) released IMT vision: 5g architecture and overall objectives, which defined enhanced mobile broadband (embB), ultra-high reliability and low delay (urllc) and massive machine type communication (mmtc) three application scenarios and eight key performance indicators such as peak rate and traffic density. Compared with 4G, 5g will provide at least ten times the peak rate of 4G, millisecond transmission delay and million connection capacity per square kilometer.

5g network is a complex combination. The structure of traditional mobile communication network is mainly divided into access network, transmission network and core network, followed by backbone network. Due to the introduction of new technologies such as network function virtualization, software defined network and multi access edge computing, 5g network is more complex than 4G. In terms of network participants, in addition to traditional communication equipment manufacturers and basic telecom enterprises, due to the introduction of new technologies in the 5g era, cloud, big data, Internet data center and other manufacturers have joined various links of the 5g network, and multi domain vertical industry players have also deeply participated in the development of 5g integration applications.

In the past two years since the official commercial use of 5g in China, it has made world-leading development achievements in technical standards, network construction and industrial development. 5g applications have also achieved a breakthrough from “0” to “1”, showing a huge potential market space and great potential to help economic and social innovation and development. As China enters a critical period of large-scale development of 5g applications, 5g technology, industry and applications have entered a “no man’s land” without experience. The security risks caused by the deep integration of 5g and vertical fields have attracted much attention, It (Information Technology), CT (Communication Technology) and ot (operation technology) security issues are intertwined. It is urgent to build a security system suitable for 5g application development, and formulate technical documents that comply with the characteristics of China’s 5g network construction and application development and guide the best practice of 5g network and Application security in the whole industry.

 

- Advertisment -