Introduction
I. Introduction and Executive summaryA. The 5G Security Imperative
The advent of 5G wireless communications constitutes a new era of network connection that will revolutionize many aspects of commerce and our personal lives. As with previous advancements in wireless communications, the transition from 3G and 4G to 5G will provide dramatic increases in both bandwidth and upload/download speeds, along with extraordinary decreases in latency. Together, these improvements will not only expand technical capabilities but also drive exponential increases in the number of connected devices in every sector of the economy, ranging from autonomous and connected vehicles to remote surgery.
The 5G revolution will also expand the “attack surface” for cyber threats, including sabotage and espionage by sophisticated actors, both through the convergence of the cyber and physical worlds and through the massive increase in all types of commercial and personal data. Technology advancements as far back as the control of fire and the invention of the wheel have created opportunities for both good and bad, and there is no doubt that criminals, spies and saboteurs will seek to leverage 5G to their malicious ends.
Download the white paper
Verizon is designing and deploying its 5G network with full awareness of these threats, and we will operate and innovate the security functions of this network in a manner that accounts for them. Verizon and the communications sector have a long history of protecting against threats to customers’ security and ensuring the reliability and resilience of communications services against all manner of hazards, including cyber threats. We are building on decades of experience and technological leadership to do this, and we are leveraging the unique benefits of 5G technology to develop and operate a more secure network.
Verizon embraces “security by design” principles by architecting and deploying its 5G network with security baked in from the beginning. Though new threats will try to exploit 5G’s expansion of the attack surface, the distinctly new architecture and capabilities of 5G networks give operators opportunities to detect and address cyber threats faster and more efficiently than ever before. In contrast to previous advancements in wireless technologies, 5G is an altogether different network technology that will introduce a virtualized, cloud-based architecture, enabling highly specialized functions – and security – for different network applications.
In short, Verizon will leverage the technological capabilities of 5G to design, deploy, operate and innovate the functions of its 5G network to provide best-of-breed security. Our 5G network will provide a brand-new customer experience, but it is also an evolution of our state-of-the-art 4G LTE foundation. 5G leverages security measures that exist today in the 4G environment, and it ushers in new innovations such as sophisticated encryption and authentication features, as well as a new Security Edge Protection Proxy (SEPP) that prevents threats from less-secure interconnected networks from harming 5G networks. This paper will introduce these new security technologies and features for 5G in the context of the existing security features of Verizon’s network, and will set forth generally applicable principles that can guide all stakeholders as they do their parts to secure 5G communications.
The design, deployment, operation and innovation of secure 5G networks.
December 2019