|
As chance has it, the attempt by NTIA to create a fake Trump Open 5G Security Framework MAGAverse as they headed out the door on 15 January is being followed this week by the global meeting of 3GPP SA3 (Security) to advance the industry’s real open 5G security Framework. Designated TSGS3-102e (the 102nd meeting, occurring electronically), it continues the practice of assembling companies, organisations, and agencies from around the world every 8 to 12 weeks to focus on 5G security for current and future releases of 5G infrastructure. Compared to the NTIA exercise in MAGAverse fantasy, the meeting is an inspiring reality check and success story.
TSGS3-102e has 555 input contributions—some of them done jointly—from a total of 42 different companies, agencies, and academic institutions, as shown in the graph.
There are 123 registered participants from 63 different companies, agencies, and academic institutions. Ericsson, Huawei, and Samsung had the largest numbers. The US government and support entities collectively (largely clustered around DOD/NSA) had the most registrants—thirteen—although their actual engagement in the work is still nil, except for NIST passively joining 15 companies in calling for a new false base station detection work item.
The 555 contributions are devoted to the following important components of the global open 5G security framework as follows.
Specifications | |
---|---|
1 | Adapting BEST for use in 5G networks (Rel-17) |
13 | Authentication and key management for applications based on 3GPP credential in 5G (Rel-17) |
5 | Enhancements to User Plane Integrity Protection Support in 5GS (Rel-17) |
2 | eSCAS_5G for Network Slice-Specific Authentication and Authorization Function (NSSAAF) (Rel-17) |
3 | Evolution of Cellular IoT security for the 5G System (Rel-16) |
7 | Integration of GBA into 5GC (Rel-17) |
3 | Mission critical security enhancements phase 2 (Rel-17) |
6 | Security Aspects of 3GPP support for Advanced V2X Services (Rel-16) |
27 | Security aspects of 5G System - Phase 1 (Rel-15) |
7 | Security aspects of Enhancement of Network Slicing (Rel-16) |
15 | Security Aspects of the 5G Service Based Architecture (Rel-16) |
15 | Security Assurance Specification Enhancements for 5G (Rel-17) |
7 | Security Assurance Specification for 5G (Rel-16) |
4 | Security Assurance Specification for 5G NWDAF (Rel-17) |
13 | Security Assurance Specification for IMS (Rel-17) |
2 | Security Assurance Specification for Inter PLMN UP Security (Rel-17) |
6 | Security Assurance Specification for Non-3GPP InterWorking Function (N3IWF) (Rel- 17) |
4 | Security of the Wireless and Wireline Convergence for the 5G system architecture (Rel-16) |
Studies | |
13 | 5G security enhancement against false base stations |
29 | authentication enhancements in 5GS |
13 | enhanced Security Aspects of the 5G Service Based Architecture |
38 | enhanced security support for Non-Public Networks |
15 | SECAM and SCAS for 3GPP virtualized network products |
24 | security aspects of enablers for Network Automation (eNA) for the 5G system Phase 2 |
46 | Security Aspects of Enhancement for Proximity Based Services in 5GS |
29 | Security Aspects of Enhancement of Support for Edge Computing in 5GC |
17 | Security Aspects of Enhancements for 5G Multicast-Broadcast Services |
6 | security aspects of the 5GMSG Service |
4 | security aspects of the Disaggregated gNB Architecture |
18 | security aspects of Unmanned Aerial Systems |
10 | security for enhanced support of Industrial IoT |
2 | Security for NR Integrated Access and Backhaul |
1 | Security Impacts of Virtualisation |
15 | security of AMF re-allocation |
9 | security of the system enablers for devices having multiple USIMs |
23 | storage and transport of 5GC security parameters for ARPF authentication |
16 | User Consent for 3GPP services |
22 | User Plane Integrity Protection |
Other | |
5 | New study item proposals |
4 | New work item proposals |
32 | Other work areas (no release restrictions) |
18 | Reports and Liaisons from other Groups |
The advancement of the SECAM and SCAS for 3GPP virtualized network products is especially important and essential for effective 5G supply chain security. Seven proposed new study and work items touched upon key emerging needs—some drawing broad support.
It only harms the nation to create a fake 5G initiative for pandering to Trump to create an insular 5G MAGAverse. We are dealing here with a continuum of globally interconnected communication networks and services that have existed since 1850 pursuant to international treaties. A 5G MAGAverse is a death sentence for the nation’s viability.
The U.S. private sector is actually doing a reasonably good job in participating in the forums working on the real 5G Security Framework. The Federal government just needs to: 1) do a better job supporting the private sector and allies in the participation in the real 5G security work, and 2) bolster the analytical capabilities and tailored programs of the expert national security agencies and facilitate their enhanced participation in venues such as SA3.
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byVerisign