security needs for iot: now and in a 5g future · 2017-10-25 · security challenges in a connected...
TRANSCRIPT
Security Needs for IoT: Now and in a 5G Future
Bertrand Moussel
Board Member, SIMalliance
ETSI IoT Workshop – 25 October, 2017
SIMalliance: Who we are
SIMalliance members represent 90% of the global SIM market and deliver
the most widely distributed secure application delivery platform in the world (UICC/SIM/USIM)
Security challenges in a connected world
* https://www.juniperresearch.com/document-library/white-papers/cybercrime-the-internet-of-threats-2017
Juniper Research predicts there will be 46 trillion
connected devices by 2021*
Trillions of connected devices
+
Unprecedented new IoT / M2M use cases
+
5G / further IoT expansion
=
Connected society grows increasingly vulnerable....
What is 5G?
Low latency
High reliability
High throughput
High connectivity density
Best available coverage
High mobility range
Network operations
Massive IoT Enhanced mobile broadband
V2X Critical communications
The 5G network: security from the outset
Network of networks
Consistent user experience
Progressive security
challenges
Growth in range of attack
targets
Network slicing and security
A multi-layer security model
Download the white paper to find out more
http://simalliance.org/wp-
content/uploads/2016/02/SIMalliance-5G-
Security-Technical-Paper.pdf
Security requirements in 5G use cases
Key security requirements
Mobile edge
Authentication policies
for ultra low latency
Data authenticity
Privacy
Trust
Massive IoTCritical
communicationsV2X
Mobile
broadband
Security recommendations by 5G segment
• Data value, not
device cost
• Power efficient
• Lifetime security
• Digital rights
management
• Prevent
MSISDN
takeover
• Fast re-
authentication
• Seamless
security without
security
bottleneck
• Highest
application layer
security grades
• High speed
crypto-
processing
Massive IoT Enhanced Mobile
Broadband
Critical Communications V2X
Secure provisioning is vital
Unique device and user identity
Network and service level
access
Network and service level
authentication credentials
Cryptographic keys and
application identifiers
Key security recommendations for 5G
Secure storage for AKA and service level credentials, based upon use case
Certification and qualification
Power efficient algorithms and policies
Quantum safe cryptography for lifetime security
Technology Options: eUICC, TEE or SoftSIM
eUICC
• UICC supporting remote provisioning
• Separate, tamper resistant hardware module
• Own SIM OS and data storage separated from
device
• Certifiable and GSMA specified.
TEE based SIM
• Isolated, trusted area of main processor in
connected device
• Stores, processes and protects SIM OS and data
• Weak protection, several TEE hacks
• Not standardised.
SoftSIM
• Software applications and data with functionality of a
SIM card
• Stored in memory and processor of device
• Not possible to protect network & App assets
• Not standardised.
For use cases of critical nature, eUICC is
the most secure option.
To find out more, please download our white paper
from www.simalliance.org:
”5G Security – Making the Right Choice to Match
your Needs”
SIM market monitoring data
• SIMalliance publishes annual data on SIM shipments.
• Data is reliable thanks to SIMalliance’s global footprint (approx 90% of the total market).
• Data comes from a blind process. Members declare actual quarterly deliveries (not forecasts). Only aggregated figures are known.
• Data is available, via annual subscription, on a quarterly basis.
Thank youwww.simalliance.org
@SIMalliance
https://uk.linkedin.com/company/simalliance