By navigating our site, you agree to allow us to use cookies, in accordance with our Privacy Policy.

Huawei’s Shield Lab at 2016 Future Forum, Shares Outlook on 5G Security Research

Huawei s Shield

Amidst 5G Security Technology Workshop hosted by the Future Forum, Huawei announces to have shared its outlook on 5G security research and its achievements in areas such as service-driven end-to-end security protection, the multi-party trust model, and the identity management model.

Sharing dialogue, Dr. Kang Xin, a senior researcher at Huawei’s Shield Lab, gave a keynote speech themed 5G Security: Forward Thinking. Focusing on the security challenges and opportunities of 5G networks, Dr. Kang laid out the goals, architecture, and perspectives on 5G security. He spent a good deal of time explaining technical insights concerning the isolation of virtual network slices, multi-party trust model, identity management, and the decoupling of security functions. These insights were included in the Huawei White Paper on 5G Security: Forward Thinking, which was released at the Globecom Conference in December 2015.

By sharing its research results on 5G security, Huawei demonstrated its commitment to creating a more secure 5G network environment for users.

Kang Xin
Dr. Kang Xin, a senior researcher at Huawei’s Shield Lab, giving a keynote speech on 5G security at the 5G workshop

Dr. Kang commented, “5G security technologies must evolve in sync with changes to 5G network architecture and diverse application scenarios. At the same time, new 5G technologies will lead to new security issues. In the 5G era, security technologies for networks and devices will be a fundamental concern of operators, service providers, and end users.”

He continued, “The service-driven architecture of 5G network slices will require end-to-end security protection, including virtual security in network functions virtualization (NFV) and software-defined networking (SDN). Heterogeneous access networks will need unified authentication architecture to simplify user access. To cope with new application scenarios and business models, it’s imperative that we introduce new identity management models. As huge amounts of data will be used in the 5G era, encryption and isolation technologies will be needed to protect personal data. To accomplish these goals, all industry players must work together to build secure 5G networks by design.”

At the 5G workshop, representatives from academia and industry shared their latest research results. Experts and scholars from Chinese and international mobile operators, manufacturers, scientific research institutions, and universities discussed a range of topics, such as 5G information security, 5G technical verification and testing, 5G spectrums, and the Internet of Vehicles. The event played a critical role in guiding and driving 5G security applications.

Tags

BiS Team

BIS Infotech is a vivid one stop online source protracting all the exclusive affairs of the Consumer and Business Technology. We have well accomplished on delivering expert views, reviews, and stories empowering millions with impartial and nonpareil opinions. Technology has become an inexorable part of our daily lifestyle and with BIS Infotech expertise, millions of intriguers everyday are finding for itself a crony hangout zone.

Related Articles