Cyber Threats in P5G Are Mitigated by Confidential Computing

In recent years, there has been a lot of hype around 5G networks and their ability to deliver super-fast connectivity to users, humans or machines. IEEE listed a number of 5G benefits , among them: much higher data rates (up to 1-20 Gbps), much lower latency (1 mS) , increased capacity as the network expands and scalability, high security and reliability. Alas, the global rollouts of public 5G are still moving slow, and it is obvious that they are years away from mainstream adoption. In order to maximize the enormous investment in spectrum licenses, private licensed 5G networks are being rolled-out. These so called P5G are shortening the RoI to Telecoms, and are new business enablers for a variety of verticals.

P5G are not deployed seamlessly, and as in so many other new technologies pose technological and financial challenges. But even with these challenges, the many benefits create a springboard for businesses that require built-in mobility, ultra-low latency, reliability and the field-proven scalability.

Current Private 5G Status

Just recently Google announced its plans to sell Private 5G networks, or rather create a P5G ecosystem. This follows https://aws.amazon.com/private5g/ and Microsoft’s Azure private multi-access edge compute offerings. The three major Cloud-compute providers are seeking to expand to the edge, hence establishing new capabilities to offer three compute flavors : Cloud, Edge and Hybrid.

In addition, Telecoms are also offering P5G (e.g. NTT Global) attempting to expand their off-the-shelf country wide cellular services. Both Telecom and private entities (Cloud providers, System Integrators etc.) are hunting for specific vertical markets, verticals where the many technological advantages of 5G, while being focused on a rather limited area, can boost new business opportunities.

Among the targeted verticals we can find : venues, warehousing, healthcare, manufacturing, industrial, healthcare, retail, government, transportation and more. Obviously, there are numerous opportunities for deploying P5G in small geographies, geographies which can be carefully surveyed hence leading to a very effective wireless performance.

New Security Challenges in Private 5G

Traditionally, cyber security started with a firewall, and a created protection perimeter. But over the years, this approach proved to be insufficient. The evolving complexity of the digital environment proved that a hard border line cannot be drawn around enterprises. Hence, in recent years the concept of Zero Trust emerged. Zero Trust is all about not trusting the assets, and any asset should undergo an authentication process should a user attempt to use it or invoke a service on it. When it comes to 5G and private 5G, this means that the networking functions do not assume trust in each other, and they will have to run mutual authentication in order to smoothly pass traffic. This defends the networks from breaches penetrating threats.

Possible Solutions for 5G Security Risks

Some vendors discuss the merits of secure identities and protocols as means to fortify the daily operations of 5G. In the case of P5G there will be many 5G enabled devices, which do not use the cellular phones secure, hardware-based identity like SIM or hardware security module. The industry will have to develop a similar level of security to be embedded in, e.g., sensors, robots, devices which will be wirelessly connected. The trusted identities should behave like cellular phones, hence easing the massive field deployment.

The other technology is Confidential computing. P5G offers the ability to deploy computing functions closer to the edge. This brings many advantages, but also adds complexity to the overall cyber security careful planning. The need to trust the remotely and distributed executed data is not straightforward. This is where Confidential Computing comes into play. Its ability to securely examine data in any part of the network is a wild card.

Confidential Computing offers an effortless way of securing distributed edge computing, enabling massive deployment of new wireless networks which are based on the 5G.