5G SECURITY

iSolutions, being for more than decade a partner for telecom and national operators, now acts as a think tank for 5G enhanced capabilities integration, cybersecurity of 5G networks and supply chain deep risk management, we provide and foster new possibilities for growth and business with 5G in health care, self-driving cars and 5G related security domain management.

One of the leading 5G security problems, according to experts, is the increase in the number of possible attack vectors as the number of network slices designed for different types of traffic increases. And given the enormous amount of sensors of the Internet of things and other endpoints that will be served by 5G networks, it would seem that virtually unlimited possibilities open up for attackers.

The notorious “slicing” of the core network into logical segments can stand in their way, which isolates them from each other, placing each in a kind of “quarantine”. That will give 5G networks more security than a “single” 4G network – each segment will have to be hacked separately

3GPP 5G Specification Phases

We are learning and deliver cutting edge analytics and support national stakeholders with information regarding next steps 3GPP 5G Phase-2 Security and particularly:

  • Long-term key update
  • 256 bits keys usage
  • Security Assurance
  • Network slicing security
  • Location services security
  • Security for 5G URLLC
  • Security for Vertical & LAN Services

Security Functions in 5G Architecture

iSolutions LLC as a Think Tank in Ukraine provide analytics on threat landscape:

  • Data manipulation
  • Privilege misuse
  • Package modification
  • Rogue VNF
  • Malicious code or tenant
  • Configuration modification
  • Resource allocation issues
  • Image tampering
  • Catalogue information exploit
  • Uploading malicious images

Enhanced Subscriber Privacy

We help national telecom providers and Service providers (mobile operators, IT, digitization – IoT etc.)

  • Understand organization’s connectivity needs and security requirements
  • Map the requirements to 5G and virtualization
  • Develop appropriate management and automated control mechanisms

We have intensive and mutual cooperation with vendors and help to:

  • Verify 5G products security assurance requirements from 3GPP
  • Optimize implementation for virtualization
  • Consider security based on changing customer network architecture

Contact Us

 Let’s talk about our mutual partnership towards best cybersecurity deliverables for you