Connect with us

5G

Federal Communications Commission Advisory Council Recommends 5G Vulnerability Changes

Published

on

Photo of Lee Thibaudeau, chair of the the Managing Security Risk in the Transition to 5G Working Group, courtesy of Nsight News

June 11, 2020 — The Federal Communications Commission’s Security, Reliability and Interoperability Council voted to accept recommendations addressing how vulnerabilities of 5G infrastructure might impact the integrity and confidentiality of wireless networks Wednesday.

Lee Thibaudeau, chair of Working Group 2, which was tasked with the investigation, presented a summary of the report as well as proposed mitigation practices.

The group found that the transition from 4G to 5G will be unlike previous communications technology advancements, due to the non-standalone nature of 5G architecture.

While the transition from 3G to 4G required a complete replacement of radio networks and core switching technology, 5G non-standalone architecture allows an operator to deploy 5G by leveraging 4G radio networks and core infrastructure.

This means that legacy 4G vulnerabilities will continue to effect 5G networks, prompting the working group’s recommendation the FCC take into account existing 4G security recommendations.

They further recommended that the agency actively participate in supply chain risk management programs, stating public-private partnerships are necessary for developing trusted 5G networks.

The final critical privacy recommendation was to use encryption features to secure user planes, or the communications between devices and base stations.

The group’s recommendations to the tech industry included implementing new workforce training on next generation internet infrastructure and considering higher layer protections for devices to mitigate user plane threats.

The working group will present further recommendations on 5G vulnerabilities to the agency in December.

Former Assistant Editor Jericho Casper graduated from the University of Virginia studying media policy. She grew up in Newport News in an area heavily impacted by the digital divide. She has a passion for universal access and a vendetta against anyone who stands in the way of her getting better broadband. She is now Associate Broadband Researcher at the Institute for Local Self Reliance's Community Broadband Network Initiative.

5G

Broadband Breakfast Interview About the Future of 5G with John Godfrey of Samsung

Greater availability of mid-band spectrum has kick-started 5G through better signal propagation, penetration and carrying capacity.

Published

on

June 11, 2020 — The Federal Communications Commission’s Security, Reliability and Interoperability Council voted to accept recommendations addressing how vulnerabilities of 5G infrastructure might impact the integrity and confidentiality of wireless networks Wednesday.

Lee Thibaudeau, chair of Working Group 2, which was tasked with the investigation, presented a summary of the report as well as proposed mitigation practices.

The group found that the transition from 4G to 5G will be unlike previous communications technology advancements, due to the non-standalone nature of 5G architecture.

While the transition from 3G to 4G required a complete replacement of radio networks and core switching technology, 5G non-standalone architecture allows an operator to deploy 5G by leveraging 4G radio networks and core infrastructure.

This means that legacy 4G vulnerabilities will continue to effect 5G networks, prompting the working group’s recommendation the FCC take into account existing 4G security recommendations.

They further recommended that the agency actively participate in supply chain risk management programs, stating public-private partnerships are necessary for developing trusted 5G networks.

The final critical privacy recommendation was to use encryption features to secure user planes, or the communications between devices and base stations.

The group’s recommendations to the tech industry included implementing new workforce training on next generation internet infrastructure and considering higher layer protections for devices to mitigate user plane threats.

The working group will present further recommendations on 5G vulnerabilities to the agency in December.

Continue Reading

5G

Network Automation is Key to 5G’s Future, Experts Say

Artificial intelligence can help manage an increasingly growing network with the advent of new devices on 5G networks.

Published

on

Screenshot of Amdoc's Ofer Farkash at the 5G symposium in early June

June 11, 2020 — The Federal Communications Commission’s Security, Reliability and Interoperability Council voted to accept recommendations addressing how vulnerabilities of 5G infrastructure might impact the integrity and confidentiality of wireless networks Wednesday.

Lee Thibaudeau, chair of Working Group 2, which was tasked with the investigation, presented a summary of the report as well as proposed mitigation practices.

The group found that the transition from 4G to 5G will be unlike previous communications technology advancements, due to the non-standalone nature of 5G architecture.

While the transition from 3G to 4G required a complete replacement of radio networks and core switching technology, 5G non-standalone architecture allows an operator to deploy 5G by leveraging 4G radio networks and core infrastructure.

This means that legacy 4G vulnerabilities will continue to effect 5G networks, prompting the working group’s recommendation the FCC take into account existing 4G security recommendations.

They further recommended that the agency actively participate in supply chain risk management programs, stating public-private partnerships are necessary for developing trusted 5G networks.

The final critical privacy recommendation was to use encryption features to secure user planes, or the communications between devices and base stations.

The group’s recommendations to the tech industry included implementing new workforce training on next generation internet infrastructure and considering higher layer protections for devices to mitigate user plane threats.

The working group will present further recommendations on 5G vulnerabilities to the agency in December.

Continue Reading

5G

Robert Kubik, John Godfrey and Derek Johnston: After a Decade of Progress, What’s Next for 5G?

A decade after the advent of LTE, the next-generation 5G will be, and already is, a critical resource for Americans.

Published

on

The authors of this Expert Opinion are Samsung Electronics America officials Robert Kubik, John Godfrey and Derek Johnston

June 11, 2020 — The Federal Communications Commission’s Security, Reliability and Interoperability Council voted to accept recommendations addressing how vulnerabilities of 5G infrastructure might impact the integrity and confidentiality of wireless networks Wednesday.

Lee Thibaudeau, chair of Working Group 2, which was tasked with the investigation, presented a summary of the report as well as proposed mitigation practices.

The group found that the transition from 4G to 5G will be unlike previous communications technology advancements, due to the non-standalone nature of 5G architecture.

While the transition from 3G to 4G required a complete replacement of radio networks and core switching technology, 5G non-standalone architecture allows an operator to deploy 5G by leveraging 4G radio networks and core infrastructure.

This means that legacy 4G vulnerabilities will continue to effect 5G networks, prompting the working group’s recommendation the FCC take into account existing 4G security recommendations.

They further recommended that the agency actively participate in supply chain risk management programs, stating public-private partnerships are necessary for developing trusted 5G networks.

The final critical privacy recommendation was to use encryption features to secure user planes, or the communications between devices and base stations.

The group’s recommendations to the tech industry included implementing new workforce training on next generation internet infrastructure and considering higher layer protections for devices to mitigate user plane threats.

The working group will present further recommendations on 5G vulnerabilities to the agency in December.

Continue Reading

Recent

Signup for Broadband Breakfast

Get twice-weekly Breakfast Media news alerts.
* = required field

 

Trending