SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
5G Activites of NGMN
Security Competence Team (SCT)
ITU Workshop on 5G Security
Geneva, 19 March 2018
Security Competence Team (SCT) formed in May 2017
• Provide vision and high-level security and privacy requirements
for NGMN, with respect to both digital infrastructure and
verticals
• Interact with standardization and other relevant organizations
• Provide input to other NGMN work groups
• Promote business opportunities and improved user experience
• Take holistic security approach, in addition to communications
security (3GPP) approach
• Promote security and privacy by design and integrated
cybersecurity
Mission
• Network virtualization and slicing together with E2E framework and
massive IoT require a holistic approach to security including software
and hardware security aspects in addition to traditional network
security aspects
• Lawful access needs to be separated from unlawful access; privacy-
sensitive data need to be protected (e.g., IoT data in E2E manner,
possibly at applications or communications layer)
• There is an overlap with non-NGMN security groups, in terms of
security areas and participating companies
• Standardization organizations (e.g., 3GPP SA3) focus on more specific
requirements and concrete solutions
• Consequently, the right balance between high-level NGMN
requirements and more concrete standardization requirements is
needed in order to increase practical impact of NGMN
Challenges
 5G E2E Architecture Framework – Security requirements
 Cellular V2X – Security and privacy aspects
 Network Capabilities Exposure – Security aspects and
requirements
 5G RAN Functional Decomposition – Security of new interfaces
 Update of “5G Security – Package 3: Mobile Edge Computing /
Low Latency / Consistent User Experience” (NGMN, Oct. 2016)
with respect to law enforcement requirements for MEC
 Pre-commercial 5G Network Trials & Testing – Security Tests
SCT Activities (Overview)
 5G E2E Architecture Framework – Security requirements
 E2E architecture framework necessitates a wide range of security
requirements, concerning network layer, business enablement layer,
business application layer, management and orchestration,
endpoint/user equipment, as well as identity management
 White paper (v1.0 and v2.0), with SCT input, published and
distributed with liason statements to 3GPP TSG SA WG3, ETSI SAGE,
ETSI TC CYBER, ISO/IEC JTC1/SC 27, FIDO Alliance, etc.
SCT Activities (1)
 Cellular V2X – Security and privacy aspects
 Comparison of network-layer security in LTE V2X and 802.11p as well
as of application-layer security in IEEE/SAE (with SCMS) and ETSI ITS
 LTE interfaces to be used: LTE PC5 (network-supported or not) and
LTE Uu (with eMBMS)
 Privacy considerations, especially w.r.t. tracking and linkability
 Advantages of LTE V2X over 802.11p pointed out
 White paper, with SCT input, to be published soon
SCT Activities (2)
 Network Capabilities Exposure – Security aspects and
requirements
 Exposure of network access and communications services and
functions, network infrastructure, and their management to 3rd parties
 Security requirements, exposure of security capabilities, scenarios, and
use cases
 White paper to be finalized soon
SCT Activities (3)
 5G RAN Functional Decomposition – Security of new interfaces
 White paper, with SCT input on F1 interface, published; dedicated SCT
security document in preparation
 Update of “5G Security – Package 3: Mobile Edge Computing /
Low Latency / Consistent User Experience” (NGMN, Oct. 2016)
with respect to law enforcement requirements for MEC
 Updated white paper published and distributed
 Pre-commercial 5G Network Trials & Testing – Security tests
 To start soon
SCT Activities (4)
 3GPP: SA3, SA2, SA1, SA5, RAN, etc
 ETSI: TC LI, SAGE, TC CYBER, ISG NFV, ISG MEC, etc
 ISO/IEC: JTC1/SC 27
 5GAA
 GSMA
 FIDO Alliance
 … and many more including ITU
NGMN SCT welcomes the feedback and involvement
from ITU-T SG17
SCT Relationships
Thank you
Merci
Cпасибо
谢谢
‫شكرا‬
Gracias
ありがとう
감사합니다
10

Contenu connexe

Plus de ITU

Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of AutomotiveITU
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. ITU
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesITU
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learningITU
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyondITU
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsITU
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportITU
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15ITU
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim ITU
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsITU
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...ITU
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesITU
 
Implementing SDG11 by connecting sustainability policies and urban planning p...
Implementing SDG11 by connecting sustainability policies and urban planning p...Implementing SDG11 by connecting sustainability policies and urban planning p...
Implementing SDG11 by connecting sustainability policies and urban planning p...ITU
 
Connecting cities and communities with the SDGs
Connecting cities and communities with the SDGsConnecting cities and communities with the SDGs
Connecting cities and communities with the SDGsITU
 
Synchronization in ITU-T in the New SG15 Study Period (2017-2020)
Synchronization in ITU-T in the New SG15 Study Period (2017-2020)Synchronization in ITU-T in the New SG15 Study Period (2017-2020)
Synchronization in ITU-T in the New SG15 Study Period (2017-2020)ITU
 
Overview of ITU-T SG 15 Q4 xDSL and G.(mg)fast
Overview of ITU-T SG 15 Q4 xDSL and G.(mg)fastOverview of ITU-T SG 15 Q4 xDSL and G.(mg)fast
Overview of ITU-T SG 15 Q4 xDSL and G.(mg)fastITU
 
Livecare Realtime healthcare Monitoring service
Livecare Realtime healthcare Monitoring serviceLivecare Realtime healthcare Monitoring service
Livecare Realtime healthcare Monitoring serviceITU
 
Live Migration of 5G Services between Heterogenous Infrastructure Domains
Live Migration of 5G Services between Heterogenous Infrastructure DomainsLive Migration of 5G Services between Heterogenous Infrastructure Domains
Live Migration of 5G Services between Heterogenous Infrastructure DomainsITU
 
Live Demo Experience Live Software-defined RAN slicing
Live Demo Experience Live Software-defined RAN slicingLive Demo Experience Live Software-defined RAN slicing
Live Demo Experience Live Software-defined RAN slicingITU
 
Cost efficient and low latency delivery of IP-based services
Cost efficient and low latency delivery of IP-based servicesCost efficient and low latency delivery of IP-based services
Cost efficient and low latency delivery of IP-based servicesITU
 

Plus de ITU (20)

Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of Automotive
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities.
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devices
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learning
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyond
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in Communications
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 Report
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGs
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable cities
 
Implementing SDG11 by connecting sustainability policies and urban planning p...
Implementing SDG11 by connecting sustainability policies and urban planning p...Implementing SDG11 by connecting sustainability policies and urban planning p...
Implementing SDG11 by connecting sustainability policies and urban planning p...
 
Connecting cities and communities with the SDGs
Connecting cities and communities with the SDGsConnecting cities and communities with the SDGs
Connecting cities and communities with the SDGs
 
Synchronization in ITU-T in the New SG15 Study Period (2017-2020)
Synchronization in ITU-T in the New SG15 Study Period (2017-2020)Synchronization in ITU-T in the New SG15 Study Period (2017-2020)
Synchronization in ITU-T in the New SG15 Study Period (2017-2020)
 
Overview of ITU-T SG 15 Q4 xDSL and G.(mg)fast
Overview of ITU-T SG 15 Q4 xDSL and G.(mg)fastOverview of ITU-T SG 15 Q4 xDSL and G.(mg)fast
Overview of ITU-T SG 15 Q4 xDSL and G.(mg)fast
 
Livecare Realtime healthcare Monitoring service
Livecare Realtime healthcare Monitoring serviceLivecare Realtime healthcare Monitoring service
Livecare Realtime healthcare Monitoring service
 
Live Migration of 5G Services between Heterogenous Infrastructure Domains
Live Migration of 5G Services between Heterogenous Infrastructure DomainsLive Migration of 5G Services between Heterogenous Infrastructure Domains
Live Migration of 5G Services between Heterogenous Infrastructure Domains
 
Live Demo Experience Live Software-defined RAN slicing
Live Demo Experience Live Software-defined RAN slicingLive Demo Experience Live Software-defined RAN slicing
Live Demo Experience Live Software-defined RAN slicing
 
Cost efficient and low latency delivery of IP-based services
Cost efficient and low latency delivery of IP-based servicesCost efficient and low latency delivery of IP-based services
Cost efficient and low latency delivery of IP-based services
 

Dernier

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 

Dernier (20)

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 

5G Activities of NGMN; Security Competence Team (SCT)

  • 1. 5G Activites of NGMN Security Competence Team (SCT) ITU Workshop on 5G Security Geneva, 19 March 2018
  • 2. Security Competence Team (SCT) formed in May 2017 • Provide vision and high-level security and privacy requirements for NGMN, with respect to both digital infrastructure and verticals • Interact with standardization and other relevant organizations • Provide input to other NGMN work groups • Promote business opportunities and improved user experience • Take holistic security approach, in addition to communications security (3GPP) approach • Promote security and privacy by design and integrated cybersecurity Mission
  • 3. • Network virtualization and slicing together with E2E framework and massive IoT require a holistic approach to security including software and hardware security aspects in addition to traditional network security aspects • Lawful access needs to be separated from unlawful access; privacy- sensitive data need to be protected (e.g., IoT data in E2E manner, possibly at applications or communications layer) • There is an overlap with non-NGMN security groups, in terms of security areas and participating companies • Standardization organizations (e.g., 3GPP SA3) focus on more specific requirements and concrete solutions • Consequently, the right balance between high-level NGMN requirements and more concrete standardization requirements is needed in order to increase practical impact of NGMN Challenges
  • 4.  5G E2E Architecture Framework – Security requirements  Cellular V2X – Security and privacy aspects  Network Capabilities Exposure – Security aspects and requirements  5G RAN Functional Decomposition – Security of new interfaces  Update of “5G Security – Package 3: Mobile Edge Computing / Low Latency / Consistent User Experience” (NGMN, Oct. 2016) with respect to law enforcement requirements for MEC  Pre-commercial 5G Network Trials & Testing – Security Tests SCT Activities (Overview)
  • 5.  5G E2E Architecture Framework – Security requirements  E2E architecture framework necessitates a wide range of security requirements, concerning network layer, business enablement layer, business application layer, management and orchestration, endpoint/user equipment, as well as identity management  White paper (v1.0 and v2.0), with SCT input, published and distributed with liason statements to 3GPP TSG SA WG3, ETSI SAGE, ETSI TC CYBER, ISO/IEC JTC1/SC 27, FIDO Alliance, etc. SCT Activities (1)
  • 6.  Cellular V2X – Security and privacy aspects  Comparison of network-layer security in LTE V2X and 802.11p as well as of application-layer security in IEEE/SAE (with SCMS) and ETSI ITS  LTE interfaces to be used: LTE PC5 (network-supported or not) and LTE Uu (with eMBMS)  Privacy considerations, especially w.r.t. tracking and linkability  Advantages of LTE V2X over 802.11p pointed out  White paper, with SCT input, to be published soon SCT Activities (2)
  • 7.  Network Capabilities Exposure – Security aspects and requirements  Exposure of network access and communications services and functions, network infrastructure, and their management to 3rd parties  Security requirements, exposure of security capabilities, scenarios, and use cases  White paper to be finalized soon SCT Activities (3)
  • 8.  5G RAN Functional Decomposition – Security of new interfaces  White paper, with SCT input on F1 interface, published; dedicated SCT security document in preparation  Update of “5G Security – Package 3: Mobile Edge Computing / Low Latency / Consistent User Experience” (NGMN, Oct. 2016) with respect to law enforcement requirements for MEC  Updated white paper published and distributed  Pre-commercial 5G Network Trials & Testing – Security tests  To start soon SCT Activities (4)
  • 9.  3GPP: SA3, SA2, SA1, SA5, RAN, etc  ETSI: TC LI, SAGE, TC CYBER, ISG NFV, ISG MEC, etc  ISO/IEC: JTC1/SC 27  5GAA  GSMA  FIDO Alliance  … and many more including ITU NGMN SCT welcomes the feedback and involvement from ITU-T SG17 SCT Relationships