Showing posts with label ETSI. Show all posts
Showing posts with label ETSI. Show all posts

Friday, 22 June 2018

5G and IoT Security Update from ETSI Security Week 2018

ETSI Security Week 2018 (link) was held at ETSI's Headquarters in Sophia Antipolis, South of France last week. It covered wide variety of topics including 5G, IoT, Cybersecurity, Middlebox, Distributed Ledger Technology (DLT), etc. As 5G and IoT is of interest to the readers of this blog, I am providing links to the presentations so anyone interested can check them out at leisure.


Before we look at the presentations, what exactly was the point of looking at 5G Security? Here is an explanation from ETSI:

5G phase 1 specifications are now done, and the world is preparing for the arrival of 5G networks. A major design goal of 5G is a high degree of flexibility to better cater for specific needs of actors from outside the telecom sector (e.g. automotive industry, mission-critical organisations). During this workshop, we will review how well 5G networks can provide security for different trust models, security policies, and deployment scenarios – not least for ongoing threats in the IoT world. 5G provides higher flexibility than legacy networks by network slicing and virtualization of functions. The workshop aims to discuss how network slicing could help in fulfilling needs for different users of 5G networks.

5G will allow the use of different authentication methods. This raises many interesting questions. How are these authentication methods supported in devices via the new secure element defined in ETSI SCP, or vendor-specific concepts? How can mission-critical and low-cost IoT use cases coexist side-by-side on the same network?

The 5G promise of higher flexibility is also delivered via its Service-Based Architecture (SBA). SBA provides open 3rd party interfaces to support new business models which allow direct impact on network functions. Another consequence of SBA is a paradigm shift for inter-operator networks: modern APIs will replace legacy signaling protocols between networks. What are the relevant security measures to protect the SBA and all parties involved? What is the role of international carrier networks like IPX in 5G?

Event Objectives
The workshop intends to:

  • Gather different actors involved in the development of 5G, not only telecom, and discuss together how all their views have shaped phase 1 of 5G, to understand how security requirements were met, and what challenges remain;
  • Discuss slicing as a means to implement separate security policies and compartments for independent tenants on the same infrastructure;
  • Give an update of what is happening in 3GPP 5G security;
  • Explain to IoT players what 5G security can (and cannot) do for them, including risks and opportunities related to alternative access credentials;
  • Understand stakeholders' (PMNs, carriers, GSMA, vendors) needs to make SBA both secure and successful. How can SBA tackle existing issues in interconnect networks like fraud, tracking, privacy breaches;
  • Allow vendors to present interesting proposals for open security questions in 5G: secure credential store, firewalling SBA's RESTful APIs;
  • Debate about hot topics such as: IoT security, Slicing security, Privacy, Secure storage and processing and Security of the interconnection network.


So here are the relevant presentations:

Session 1: Input to 5G: Views from Different Stakeholders
Session Chair: Bengt Sahlin, Ericsson

Hardening a Mission Critical Service Using 5G, Peter Haigh, NCSC

Security in the Automotive Electronics Area, Alexios Lekidis, SecurityMatters

Integrating the SIM (iUICC), Adrian Escott, QUALCOMM

Smart Secure Platform, Klaus Vedder, Giesecke & Devrient, ETSI SCP Chairman

Network Slicing, Anne-Marie Praden, Gemalto

Don't build on Sand: Validating the Security Requirements of NFV Infrastructure to Confidently Run Slices, Nicolas Thomas, Fortinet

5G Enhancements to Non-3GPP Access Security, Andreas Kunz, Lenovo

Security and Privacy of IoT in 5G, Marcus Wong, Huawei Technologies

ITU-T activities and Action Plan on 5G Security, Yang Xiaoya, ITU-T SG17

Wrap up: 5G Overview from 3GPP SA3 Perspective and What is There to Be Done for Phase 2, Sander Kievit, TNO


Session 2: Security in 5G Inter-Network Signalling
Session Chair: Stefan Schroeder, T-Systems

Presentation on SBA: Introduction of the Topic and Current Status in SA3, Stefan Schroeder, T-Systems

5G Inter-PLMN Security: The Trade-off Between Security and the Existing IPX Business Model, Ewout Pronk, KPN on behalf of GSMA Diameter End to End Security Subgroup

Secure Interworking Between Networks in 5G Service Based Architecture, Silke Holtmanns, Nokia Bell Labs

Security Best Practises using RESTful APIs, Sven Walther, CA Technologies

Identifying and Managing the Issues around 5G Interconnect Security, Stephen Buck, Evolved Intelligence

Zero Trust Security Posture in 5G Architecture, Galina Pildush, Palo Alto Networks (Missing)


Session 1 & 2 Workshop Wrap up: 5G Phase 1 Conclusions and Outlook Towards Phase 2 - Stefan Schroeder, T-Systems and Bengt Sahlin, Ericsson


Session 5: Benefits and Challenges of 5G and IoT From a Security Perspective
Session Chair: Arthur van der Wees, Arthur's Legal

Setting the Scene, Franck Boissière, European Commission

ENISA's View on Security Implications of IoT and 5G, Apostolos Malatras, ENISA

Smart City Aspects, Bram Reinders, Institute for Future of Living

The Network Operators Perspective on IoT Security, Ian Smith, GSMA


Related Links:

Tuesday, 13 February 2018

Artificial Intelligence - Beyond SON for Autonomous Networks


What is the next step in evolution of SON? Artificial Intelligence obviously. The use of artificial intelligence (AI) techniques in the network supervisory system could help solve some of the problems of future network deployment and operation. ETSI has therefore set up a new 'Industry Specification Group' on 'Experiential Networked Intelligence' (ISG ENI) to develop standards for a Network Supervisory assistant system.


The ISG ENI focuses on improving the operator experience, adding closed-loop artificial intelligence mechanisms based on context-aware, metadata-driven policies to more quickly recognize and incorporate new and changed knowledge, and hence, make actionable decisions. ENI will specify a set of use cases, and the generic technology independent architecture, for a network supervisory assistant system based on the ‘observe-orient-decide-act’ control loop model. This model can assist decision-making systems, such as network control and management systems, to adjust services and resources offered based on changes in user needs, environmental conditions and business goals.


The introduction of technologies such as Software-Defined Networking (SDN), Network Functions Virtualisation (NFV) and network slicing means that networks are becoming more flexible and powerful. These technologies transfer much of the complexity in a network from hardware to software, from the network itself to its management and operation. ENI will make the deployment of SDN and NFV more intelligent and efficient and will assist the management and orchestration of the network.


We expect to complete the first phase of ENI work in 2019. It will include a description of use cases and requirements and terminology, including a definition of features, capabilities and policies, which we will publish in a series of informative best practice documents (Group Reports (GRs)).
This will of course require co-operation from many different industry bodies including GSMA, ITU-T, MEF, IETF, etc.

Will see how this goes.

Further reading:



Tuesday, 25 July 2017

5G Security Updates - July 2017


Its been nearly 2 years since I last blogged about ETSI Security workshop. A lot has changed since then, especially as 5G is already in the process of being standardised. This is in addition to NFV / SDN that also applied to 4G networks.

ETSI Security Week (12 - 16 June) covered lot more than 5G, NFV, SDN, etc. Security specialists can follow the link to get all the details (if they were not already aware of).

I want to quickly provide 3 links so people can find all the useful information:

NFV Security Tutorialdesigned to educate attendees on security concerns facing operators and providers as they move forward with implementing NFV. While the topics are focused on security and are technical in nature we believe any individual responsible for designing, implementing or operating a NFV system in an organization will benefit from this session. Slides here.

NFV Security: Network Functions Virtualization (NFV), leveraging cloud computing, is set to radically change the architecture, security, and implementation of telecommunications networks globally. The NFV Security day will have a sharp focus on the NFV security and will bring together the world-wide community of the NFV security leaders from the industry, academia, and regulators. If you want to meet the movers and shakers in this field, get a clear understanding of the NFV security problems, challenges, opportunities, and the state of the art development of security solutions, this day is for you. Slides here.



5G Security: The objectives of this event are to:
  • Gather different actors involved in the development of 5G, not only telecom, and discuss together how all their views will shape together in order to understand the challenges, threats and the security requirements that the 5G scenarios will be bringing.
  • Give an update of what is happening in:
    • 5G security research: Lot of research is on-going on 5G security and several projects exist on the topic.
    • 5G security standards: Standardization bodies have already started working 5G security and their work progress will be reviewed. Also any gap or additional standardization requirements will be discussed.
    • Verticals and business (non-technical) 5G security requirements: 5G is playground where different verticals besides the telecom industry is playing a role and their requirements will be key for the design of 5G security. In addition 5G is where "security" will become the business driver.
  • Debate about hot topics such as: IoT security, Advances in lightweight cryptography, Slicing security. Privacy. Secure storage and processing. Security of the interconnection network (DIAMETER security). Relevance of Quantum Safe Cryptography for 5G, Authorization concepts....
Slides for 5G Security here.

In addition, Jaya Baloo, CISO, KPN Telecom talks about 5G network security at TechXLR8 2017. Embedded is a video of that:


Saturday, 1 April 2017

Some interesting April Fools' Day 2017 Technology Jokes

Here are the interesting April Fools' Day 2017 Technology Jokes. If I have missed one, please add them in comments. For those who don't know what April Fools' Day means, see here.

Google Windmill from Google Nederland: Interesting use of Wind and Cloud to keep Rain away.




Amazon Petlexa (Alexa for Pets): It allows dogs, cats, and other animals to communicate with Alexa just like you do. The Petlexa feature gives pets the freedom to place orders from Amazon, and to activate smart home enabled toys.




Google Play for Pets: A new category of games, apps and training tools to keep your pet stimulated. Honestly, I cant see why this cannot be real.



Honda Horn Emoji's: Horn Emojis offer a range of horn sounds for a variety of scenarios, from seeing your kids off to school to commiserating with other drivers in rush-hour traffic.


See video here. Honda has also launched In-car dating app to help lonely drivers find love at the wheel. More details here.


T-Mobile ONEsie: T-Mobile CEO John Legere has designed this Onesie and CTO Neville Ray has also participated in testing. Its got a lot of Amazing properties, including creating Human SotSpots.


See videos here and here.


Virgin Atlantic Dreambird 1417: World’s first-ever aircraft using new patented technology – flapology – to create the world’s first aircraft with flappable wings.




Virgin Trains (UK) Tickink: Innovative new contactless ticket system, offering customers the opportunity to have their train ticket permanently tattooed on their body, preventing frequent passengers from ever losing their tickets again. Details here.


Virgin Mobile Australia PhoYo:


Prysm Avatar: I quite like this concept. A work drone that enables you to reap the benefits of working from home, without sacrificing the interpersonal advantages of being in the office. Each drone is equipped with sophisticated sensors and a holographic projector that displays your likeness as a realistic, life-sized avatar.




Telenor prohibits the word ‘Digital’ in all communication: There is a small chance this may be true ;-). See here.


Finally, there was also Google Gnome (like Google home), Google Ms. Pac-ManLexus LC: Lane ValetShake Me - by Trade Me, Huawei Mate 9.2 with 2 headphone jacks


There is also this picture from 1992 circulating, showing how standards body (ETSI) celebrated April Fools' before twitter/youtube :-)


Related Posts:

Monday, 2 May 2016

Does 5G need 'Next Generation' of Internet Protocols?

I have often heard Martin Geddes mention that the Internet is broken, the protocols (TCP/IP) are wrong and if we want to continue the way our data usage is going, we need to define new protocols (see here for example). It was good to find out last week at 5G Huddle that ETSI is already working on this.


The TCP/IP protocol suite has undoubtedly enabled the evolution of connected computing and many other developments since its invention during the 1970’s. Thanks to the development and ubiquity of this protocol stack, we have managed to build an Internet on which we are dependent as a communications tool, an information storage and distribution tool, a marketing channel and a sales and distribution platform, for consumers and for businesses large and small.

However, the industry has reached a point where forward leaps in the technology of the local access networks will not deliver their full potential unless, in parallel, the underlying protocol stacks used in core and access networks evolve. The development of future 5G systems presents a unique opportunity to address this issue, as a sub-optimal protocol architecture can negate the huge performance and capacity improvements planned for the radio access network.

ETSI has created an Industry Specification Group to work on Next Generation Protocols (NGP ISG), looking at evolving communications and networking protocols to provide the scale, security, mobility and ease of deployment required for the connected society of the 21st century.

The NGP ISG will identify the requirements for next generation protocols and network architectures, from all interested user and industry groups. Topics include:

  • Addressing
  • Security, Identity, Location, Authorization, Accounting/Auditing and Authentication
  • Mobility
  • Requirements from Internet of Things
  • Requirements from video and content distribution
  • Requirements from ultra‐low latency use cases from different sectors (i.e. automotive)
  • Requirements from network operators (e.g. challenges with E2E encrypted content)
  • Requirements from eCommerce
  • Requirements for increased energy efficiency within the global ICT sector.


This ISG is seen as a transitional group i.e. a vehicle for the 5G community (and others of interest) to first gather their thoughts and prepare the case for the Internet community’s engagement in a complementary and synchronised modernisation effort.

The ISG provides a forum for interested parties to contribute by sharing research and results from trials and developments in such a way that a wider audience can be informed. Other standards bodies will be involved so that parallel and concerted standardization action can take place as a further step in the most appropriate standards groups.

Andy Sutton, chair of the NGP recently gave the following presentation in 5G Huddle:



Please feel free to add your opinions in the comments.

Further reading:

**** Added 05/06/2016:20.00 ****
A whitepaper published by ETSI on this topic is available here and embedded below:


Saturday, 23 April 2016

5G & Accident Free Driving


ETSI recently held a workshop titled "5G: From Myth to Reality". There were some interesting presentations and discussions, hopefully I will get a chance to write a bit more about it.

One interesting presentation was how 5G will make accident free driving a reality. While the current approach is to use the 802.11p standards that uses the license exempt 5.9GHz band, there is a possibility of enhancements based on 5G


As the final 2 slides say, What could be the use cases for 5G in vehicles? The answer suggested:

  • Map update for highly automatic driving - Instantly update the map of vehicle's surrounding. The challenge of this use case is that the vehicle is currently in the tile that needs to be updated, hence a very quick update is required. 
  • Precise Positioning high speed, no GPS, support for vehicles without high precision location tracking like cars 
  • Audio / Video Streaming (Entertainment) 
  • Online Gaming - side jobs 
  • Sensor- and State Map Sharing (Sensor Raw Data) - Transmit raw sensor data such that others can use their own classifiers to infer decisions
  • Camera and Radar sharing to improve visibility, including See-Through Share sensor information to augment ego vehicle's view. Allows for better visibility in presence of obstructing vehicles, heavy rain / fog, etc. 
  • Short-Term Sensor sharing for crash mitigation - Mitigate crash between multiple vehicle by last-minute traffic exchange 
  • Traffic forwarding using cars as relays Extend coverage or improve efficiency by using the car as a relay 
  • Teleoperated Driving "Let car be controlled by off-site driver / car operator e.g. car sharing, taxi operator, …“ 
  • Augemented Reality, e.g. Daytime-Visibility at night)

Here is the complete presentation, let me know what you think:



Monday, 24 August 2015

Some interesting presentations from ETSI Security workshop


ETSI held their security week from 22-26 June 2015 at their headquarters. There are lots of interesting presentations (see agenda [PDF]); I am embedding some here.


This is a good presentation providing a summary of the reasons for IoT security issues and some of the vulnerabilities that have been seen as a result of that.




The next one is The Threat landscape of connected vehicles and ITS (Intelligent Transportation Systems) integration in general



This presentation provides a good summary of the threats in the connected cars/vehicles which is only going to become more common. Some of these issues will have to be solved now before we move on to the autonomous vehicles in future. Security issues there will be catastrophic and many lives can be lost.

The final presentation is from 3GPP SA3 that provides a quick summary of security related work in 3GPP.



Sunday, 15 February 2015

5G and NFV


In my 5G: A 2020 vision presentation, I argued that some of the technologies that will be necessary for 5G is in fact independent of 5G. One such technology is NFV. Having said that, I also argue that the minimum prototype for 5G would require an NFV based implementation.


Tieto gave an interesting presentation in our last Small Cell SIG event explaining how the network will be implemented based on NFV. The presentation is embedded below:



There is also an interesting paper that expands on this further, available from Slideshare here.

Saturday, 17 May 2014

NFV and SDN - Evolution Themes and Timelines


We recently held our first Virtual Networks SIG event in Cambridge Wireless. There were some great presentations. The one by the UK operator EE summarised everything quite well. For those who are not familiar with what NFV and SDN is, I would recommend watching the video on my earlier post here.

One of the term that keeps being thrown around is 'Orchestration'. While I think I understand what it means, there is no easy way to explain it. Here are some things I found on the web that may explain it:
Orchestration means Automation, Provisioning, Coordination and Management of Physical and Virtual resources.  
Intelligent service orchestration primarily involves the principles of SDN whereby switches, routers and applications at Layer 7 can be programmed from a centralized component called the controller with intelligent decisions regarding individual flow routing in real time.
If you can provide a better definition, please do so.
There are quite a few functions and services that can be virtualised and there are some ambitious timelines.

ETSI has been working on NFV and as I recently found out (see tweet below) there may be some 3GPP standardisation activity starting soon.
Anyway, here is the complete presentation by EE:



There was another brilliant presentation by Huawei but the substance was more in the talk, rather than the slides. The slides are here in case you want to see and download.

Related post:



Saturday, 25 January 2014

Security and other development on the Embedded SIM


Its no surprise that GSMA has started working on Embedded SIM specifications. With M2M getting more popular every day, it would make sense to have the SIM (or UICC) embedded in them during the manufacturing process. The GSMA website states:

The GSMA’s Embedded SIM delivers a technical specification to enable the remote provisioning and management of Embedded SIMs to allow the “over the air” provisioning of an initial operator subscription and the subsequent change of subscription from one operator to another.
The Embedded SIM is a vital enabler for Machine to Machine (M2M) connections including the simple and seamless mobile connection of all types of connected vehicles. In the M2M market the SIM may not easily be changed via physical access to the device or may be used in an environment that requires a soldered connection, thus there is a need for ‘over the air’ provisioning of the SIM with the same level of security as achieved today with traditional “pluggable” SIM. It is not the intention for the Embedded SIM to replace the removable SIM currently used as the removable SIM still offers many benefits to users and operators in a number of different ways – for example, the familiarity of the form factor, easy of portability, an established ecosystem and proven security model.
















The last time I talked about embedded SIM was couple of years back, after the ETSI security workshop here. Well, there was another of these workshops recently and an update to these information.


The ETSI presentation is not embedded here but is available on Slideshare here. As the slide says:

An embedded UICC is a “UICC which is not easily accessible or replaceable, is not intended to be removed or replaced in the terminal, and enables the secure changing of subscriptions” (ETSI TS 103 383)


Finally, Embedded SIM should not be confused with Soft-SIM. My last post on Soft-SIM, some couple of years back here, has over 15K views which shows how much interest is there in the soft SIM. As the slide says:

Soft or Virtual SIM is a completely different concept that does not use existing SIM hardware form factors and it raises a number of strong security issues:

  • Soft SIM would store the Operator secret credentials in software within the Mobile device operating system - the same system that is often attacked to modify the handset IMEI, perform SIM-Lock hacking and ‘jail-break’ mobile OS’s
  • Operators are very concerned about the reduction in security of their credentials through the use of Soft SIM. Any SIM approach not based on a certified hardware secure element will be subject to continual attack by the hacking community and if compromised result in a serious loss of customer confidence in the security of Operator systems
  • Multiple Soft SIM platforms carrying credentials in differing physical platforms, all requiring security certification and accreditation would become an unmanageable overhead – both in terms of resource, and proving their security in a non-standardised virtual environment

The complete GSMA presentation is as follows:



You may also like my old paper:

Thursday, 16 January 2014

3GPP Rel-12 and Future Security Work


Here is the 3GPP presentation from the 9th ETSI Security workshop. Quite a few bits on IMS and IMS Services and also good to see new Authentication algorithm TUAK as an alternative to the widely used Milenage algorithm.



Wednesday, 27 November 2013

ETSI Summit on Future Mobile and Standards for 5G



Edited from the original in 3GPP News:

The ETSI Future Mobile Summit has heard how the mobile internet will evolve over the next ten to fifteen years, and how 3GPP systems will ensure future stability as the network copes with an explosive growth in complexity and usage.


With 3GPP providing the evolutionary framework for mobility, via its Releases of new functionality and features, the more radical thinking, at the Summit, came in the form of Research projects and some future focused industry initiatives, such as the WWRF, the METIS Project and the DVB Project.

In his keynote address, Mario Campolargo - of the European Commission - introduced a new initiative on research & innovation that will provide momentum to funded work on research. The 5G Public Private Partnership is being launched as a blueprint for the deployment of 5G, in the years after 2020. 



In summing up the Summit’s main themes, the ETSI CTO, Adrian Scrase identified some certainties; “...traffic will continue to increase, connected devices will increase dramatically over time, new device types will significantly contribute to that increase (e.g., probes, sensors, meters, machines etc) and new sectors will bring new priorities (e.g, critical infrastructures).”

On the concept of 5G, Mr. Scrase reported that ultra-reliable 5G networks should, among other things, enable the tactile internet, the perception of infinite capacity and bring in augmented reality.



Download the presentations:
5G, the way forward!
Mario Campolargo, Director, Net Futures, DG Connect, European Commission
A new initiative 5GPPP, to accelerate and structure research & innovation."...Industry to co-create the "vision" and build global convergence by end 2015.
Who needs 5G?
Hans D. Schotten, University of Kaiserslautern
Long Term Evolution of LTE (linear evolution) or Something new (5G)?
Why 5G?
Rahim Tafazolli, Director of CCSR and 5GIC, The university of Surrey
Perceived infinite capacity, a new communication paradigm for 5G and Beyond
The 5G mobile and wireless communications system 
Afif Osseiran, Project Coordinator of METIS
Explanation of 5G scenarios (selected) and examples of 5G technology components
Next generation wireless for a cognitive & energy-efficient future
Nigel Jefferies, Wireless World Research Forum Chairman
"New technology challenges: huge number of nodes, latency , energy efficiency, backhaul and over the air signaling design...May require a whole new approach to: physical layer, air interface and spectrum usage, resources management & optimization..."
 3GPP RAN has started a new innovation cycle which will be shaping next generation cellular systems
Spectrum for 5G, a big deal?
Jens Zander, KTH, Royal Institute of Technology  
 A World Divided - The coverage world versus the capacity world
Opportunities for TV services over future mobile networks
Nick Wells, Chairman Technical Module, DVB
 Can broadcasters and mobile industry cooperate to define a new worldwide standard that will benefit both broadcasters and mobile industry?
3GPP core network & services evolution
Atle Monrad, 3GPP CT Chairman
Architecture evolution, More new nodes, CS-domain removal?, new ways of design of networks?
The impact of NFV on future mobile
Uwe Janssen, Deutsche Telekom, lead delegate to Network Functions Virtualisation ISG
 The challenge for Operators, Suppliers and Standards Bodies
The tactile internet - Driving 5G
Gerhard Fettweis, Technical University of Dresden
 3D Chip-Stacks & High-Rate Inter-Chip Communications, Monitoring / Sensing, Tactile internet - Latency Goals
Summit conclusions
Adrian Scrase, ETSI CTO, Head of 3GPP MCC
 Includes the 'Standardization Challenges' raised by the Summit.