Вы находитесь на странице: 1из 13

5G : Security and Privacy

Dr. Ian Oliver


Security Research
Nokia Networks
IW5GS at TrustCom 2015
21 August 2015

1 © Nokia Solutions and Networks 2014

Public
Preliminaries: ISO 7 Layer Protocol Stack

Content The message/data being sent

L7: Application

L6: Presentation APIs, Applications, eg: email, ftp, dns etc.


Formats: JSON, XML, Text etc.
L5: Session

L4: Transport
[Machine] Addressing, encryption, routing, authentication, identity,
L3: Network Eg: IP addressing, protcols such as: TCP, BGP, SS7, Diameter, HTTP(s)
etc…
L2: Data Link

L1: Physical Radio, Wire, Satellite, WiFi, LiFi etc


”Physical properties and aspects”
2 © Nokia Solutions and Networks 2014
Preliminaries: ISO 7 Layer Protocol Stack

Content The message/data being sent


• encryption

L7: Application
• Network address, subnets, etc
L6: Presentation • IP, Telephony, GT, etc.
• Machine identity
L5: Session • Packet flow and ordering, inc. sequence and nonce values

Meta-Data
• Timing
• Protocol
• Browser/Client information and configuration
L4: Transport
• API calls and parameters
• Encryption and authentication parameters
L3: Network • Location, language
• Session parameters
L2: Data Link •…

L1: Physical

3 © Nokia Solutions and Networks 2014


Preliminaries: 5G, SDN, NFV

Software Defined Networking


SDN
• Network packet routing, filtering, processing
• Based on L2-L4 properties
• Very fine grained
Complimentary technologies:
• eg: An SDN router may be physical or implemented as a VNF

Network Function Virtualisation

NFV • ”Cloud computing for networks”


• Virtualisation of functionality and components
• eg: firewalls, routers (SDN), security monitoring, LI, encryption
VNF VNFc • Service provision through orchestration of network functionality
• Trusted components (inc. Geographical Trust)
Virtualised Network Virtualised Network Function • Multi-tenancy, Hardware/Data center utilisation
Function Component •Antenna virtualisation

5th Generation Mobile Network/Wireless Systems


5G
• High data rate, Massive number of simultaneous connections
• IoT, WSN
• Cognitive radio, [Mobile]
• Dynamic AdHoc networking (MANET), Mesh Networking, MIMO
4 © Nokia Solutions and Networks 2014
• Machine 2 Machine (Automotive, IoT)
Preliminaries: 5G, SDN, NFV

Software Defined Networking


SDN
• Network packet routing, filtering, processing
• Based on L2-L4 properties
• Very fine grained
Complimentary technologies:

5G
• eg: An SDN router may be physical or implemented as a VNF

Network Function Virtualisation

NFV • ”Cloud computing for networks”


• Virtualisation of functionality and components
• eg: firewalls, routers (SDN), security monitoring, LI, encryption
VNF VNFc • Service provision through orchestration of network functionality
• Trusted components (inc. Geographical Trust)
Virtualised Network Virtualised Network Function • Multi-tenancy, Hardware/Data center utilisation
Function Component •Antenna virtualisation

5th Generation Mobile Network/Wireless Systems


5G
• High data rate, Massive number of simultaneous connections
• IoT, WSN
• Cognitive radio, [Mobile]
• Dynamic AdHoc networking (MANET), Mesh Networking, MIMO
5 © Nokia Solutions and Networks 2014
• Machine 2 Machine (Automotive, IoT)
Security, Privacy and Trust

•Authentication and identity of components, users, routes etc


•Provenance of data
Trust
•Guaranteed properties, eg: integrity of virtualised environment
•Software and hardware integrity
•Memory integrity
•Geographical trust

•Content of data
•Information leakage
Privacy •LI and Surveillance
•Routing, storage and computation of data
•Geography and jurisdiction

•Integrity of contents of communication


Security •Integrity of transport
•Encryption

6 © Nokia Solutions and Networks 2014


Attacks and Vulnerabilities

•”Traditional”

•SS7 -> Diameter


•DoS Well known and ’traditional methods’ of attacking systems
•Social Engineering
•Poor security implementation
•Wiretap, Radio Interface

These do not go away, but we now have more opportunities for these
as well as mitigations

7 © Nokia Solutions and Networks 2014


Attacks and Vulnerabilities

Traffic Load
•SDN VNF VNF VNF Mgmnt Balancing
•Data Plane
• Denial of Service
• Topology detection
• Probing Controller

Management
•Control Plane
• Deliberate (or accidental) configuration
• Internal vs External access
• Human vs Automatic (Service orchestration) access
•Management Plane

•SDN as an applicance vs SDN as an VNF

8 © Nokia Solutions and Networks 2014


Attacks and Vulnerabilities
•NFV
•VNFs Domain Domain
•Trust, integrity
• Usual software problems, bugs
• Access control

application
application

application
application

application
application
•MANO & Orchestration
• Security orchestration … … …
• Log file
•LI/Surveillance/BigData

•Multitenancy
•[Security] Domain Management O/S O/S O/S …
VM VM VM …
•Process Mobility
•Geographical
•LI / Surveillance Hypervisor
•Domains

•Hypervisor
Hardware
•Memory integrity

Acceleration

Interfaces
Network
Memory

Storage

Physical
•Trusted compute environments

Module
Trust
CPUs
•Underlying hardware
•Hardware (network) acceleration

9 © Nokia Solutions and Networks 2014


Privacy in 5G

•Privacy as a security concern


•Privacy as a privacy concern

•Encryption and Authentication


•Limitations
•Homomorphic Encryption
•Expanded data/meta-data collection •Private Information Retrieval (PIR)
•Ad hoc networking and routing
•IoT, WSN, Automotive •Geographical/Jurisdictional threats
•Tor-like possibilities •LI / Surveillance
•Log file analysis
•Malware detection •Anonymisation
•Machine Learning
•Big Data •De/re-identification
•Profiling •Encrypted data analysis
•Fingerprinting

•Multi-tenancy threats

10 © Nokia Solutions and Networks 2014


Future

•Towards 2020
•Privacy
•Security monitoring for SDN, NFV •Geographical/Jurisdictional Trust
•Privacy Orchestration
•Security Orchestration •Advanced novel encryption: eg:
homomorphic
•Advanced packet filtering
•Multitenancy
•Malware detection •VNF mobility
•Traditional PC/Device security in the cloud
•Machine learning •Higher level attack detection
•Content detection in the presence of encryption •HLR/VLR integrity
•Honeypots •SDN reconfiguration
•SDN rerouting •Orchestration integrity
•Honeypots as a service

•Legacy Protocols
•SS7 vs Diameter

11 © Nokia Solutions and Networks 2014


Summary

•5G Networking provides: •Security Challenges


•High speed, integrated heterogenous
•All the existing problems in a much more dynamic,
networking
highly configurable environment
•Ad hoc network topologies and routing
•Automotive, mobile, fixed networking
•Traditional attack in a new environment
•Hardware virtualisation (antenna technology)
•Cognitive radio
•Better detection possibilities
•Malware and machine learning
•SDN provides:
•Network topologies and routing in software •Novel encryption and authentication techniques
•Fine grained filtering, mapping and routing •Homomorphic encryption
•Secure 2-party communication
•NFV provides:
•All of the cloud advantages
•Virtualisation of network services, eg: firewall, •Privacy Challenges
routing, SDN etc
•Massive opportunities for meta-data collection
•WSN, IoT, Automotive
•Encryption
•Minimal IoT devices
•De anonymisation techniques

•LI and Surveillance


12 © Nokia Solutions and Networks 2014

Вам также может понравиться