5g infrastructure
play

5G infrastructure Hiroaki Kamoda Director for Policy Planning, - PowerPoint PPT Presentation

Towards the construction of reliable 5G infrastructure Hiroaki Kamoda Director for Policy Planning, Cybersecurity Division G infrastructure Cyber/Physical Security Framework (CPSF) 1 Risks from Cybersecurity Viewpoints in 5G


  1. Towards the construction of reliable 5G infrastructure Hiroaki Kamoda Director for Policy Planning, Cybersecurity Division

  2. 5 G infrastructure Cyber/Physical Security Framework (CPSF) 1

  3. Risks from Cybersecurity Viewpoints in 5G Infrastructure (1) Hardware - Because general purpose hardware will be mainly used in 5G infrastructure, the scope of damage from a malfunction of an equipment would be larger compared to the case of 4G. (In 4G infrastructure, specific purpose hardware is mainly used. So, the impact of a malfunction of an equipment is limited within a specific function) (2) Software - Fundamentally, verification on software is not perfect. In addition, there will be huge, combined and complicated software in 5G, which will operate various functions. It’s difficult to avoid vulnerability of software perfectly. (3) Software update - Because of (2), there will be frequent software updates in 5G, since the software is updated in 5G infrastructure. There is no perfect real-time verification technology for software. It means that trustworthiness of entities involved into 5G infrastructure is much more important compared to the case of 4G. 【5 G infrastructure 】 (2) building a Operation Support System / Business Support System NFV Manag em ent and Netw ork Orchestration ( NFV MANO ) Logical netw ork for each purpose network with Virtual Netw ork Function ( VNF ) ( Specific functions and perform ance can be selectable for its' purpose) NFVO Netw ork Function Netw ork Function Netw ork Function 5G slice 1 (NFV Orchestrator) software ( Slice Mg m t. . . ) ( Policy Mg m t. .. ) ( Measurem ent, Analysis. . . ) Netw ork Function Netw ork Function Netw ork Function ( Authentication.. . ) ( Term inal Mg m t. . . ) ( Session Mg m t. . . ) VNFM ( VNF 管理) VNFM ( VNF 管理) VNFM Netw ork Function Virtualization Infrastructure ( NFVI ) ( VNF Manag er ) 5G slice 2 Virtualized Resource Virtual Com puter Virtual Storag e Virtual Netw ork VIM ( NFVI 管理) VIM VIM ( NFVI 管理) Hypervisor ( Virtualized Infrastructure 5G slice 3 Manag er ) Physical Com ponent Physical Com puter Physical Storag e Physical Netw ork (1) on general Radio Station ( gNodeB ) purpose hardware Rem ote Station (3) supplying network slices ( RRH ) Base Station as separated logical networks ( BBU ) Rem ote Station ( RRH ) 2 Core Netw ork ( incl. Ag gregation Netw ork ) Radio Access Netw ork(RAN)

  4. Transformation of Industrial Structure for 5G Construction  To introduce robust & innovative infrastructure with innovative & reliable suppliers, “Open Architecture” , requiring open interfaces among functions, should be realized. 1. User Equipment 1. User Equip ment 2. RAN 2. RAN ( Radio Access Network ) 3. Core Netwo 3. Core Network rk Oligopoly by Oligopoly by major major vendors vendors Current EPC, etc. structure P-GW PCRF Antenna RRH RRH BBU BBU HSS MME S-GW Chip Chip Components Transfor sform m to OPEN OPEN ARCHITEC ECTUR URE “ Softwa wariz rizat ation ” • Open Interfac ace • Stan andar ardizat atio ion Loose Coupling New Soft New structure structure development C-Plane Plane Antenna RRH RRH BBU BBU entry of through new suppliers cooperation with innovative U-Plane Plane of carriers technology etc. and vendors Trustful with Supply Chain virtualization Components Hard technology etc. 3

  5. Assumed Basic Structure of 5G Infrastructure OSS/BSS NFVO VNFM C-Plane VNF U-Plane SDN Combination of Functions would be various SDN Controller VIM RU DU CU Middle Front Back haul haul haul NFVI Cloud Native RU : Radio Unit VNF : Virtualized Network NFVI : Network Function NFVO : NFV Orchestrator DU : Distributed Unit Function Virtualized Infrastructure OSS/BSS : Operation Support VIM : Radio Resource Control CU : Centralized Unit VNFM : Virtualized Network System/Business 4 Function Management Support System SDN : Software Defined Network

  6. 5G infrastructure Cyber/Physical Security Framework (CPSF) 5

  7. Supply Chain in Society 5.0 (Cyber-Physical Integrated Society) <Conventional Supply Chain> Integrator Assembler Parts Manufacture <Society 5.0’s Supply Chain (Value Creation Process)> 6

  8. Purpose of Three Layers’ Approach  Three layers’ approach would be useful to articulate and control complicated risks of the new supply chain, “value creation p rocess” .  Each layer has a unique role to protect trustworthiness of organization, transcription, and data. Cyber space Data Data Data Data The Third Layer Data (Connections in cyberspace) Data Trustworthiness of data for service • Data through appropriate management Data Data Data Data The Second Layer (Mutual connections between cyberspace and physical space) Trustworthiness of function “correct • Correct Correct transcription” from cyber to physical/ from transcription Correct transcription physical to cyber transcription “Organization” C The First Layer “Organization” A (Connections between organizations) Trustworthiness of each organization based on • “Organization” B Physical space appropriate management 7

  9. The Cyber/Physical Security Framework (CPSF) ~ To ensure trustworthiness of a new type of supply chain in “Society5.0”, so - called ”Value Creation Process” While “Society 5.0” , where cyber and physical spaces are highly integrated, makes it  possible to construct non-linear and flexible supply chain , this new supply chain, which is defined as “value creation process,” faces new risks such as an expansion of cyber attacking points and an increasing impact on physical infrastructure. For this reason, on April 18th 2019, METI released “Cyber/Physical Security  Framework (CPSF) ver 1.0” , which is a comprehensive framework for securing the new supply chain in society 5.0. A wide variety of individuals and organizations from all over the world submitted  various comments (800 from 51 domestic and 22 foreign individuals and organizations) on CPSF through two times of public comments METI held. Through this process, CPSF earned an international attention. “Three - Layer Model” proposed in CPSF “Six Elements” proposed in CPSF • In order to promote a risk based security measures , six elements that make up the value creation The Third Layer Cyberspace Data process are defined. Data ( Connections in Data Data Data cyberspace) Data Data Organization Data The Second Layer Data Data (Mutual connections Data Data between cyberspace and physical space) People Procedure Correct Correct transcription transcription Correct The First Layer transcription “Organization” C (Connections “Organization” A between Components System “Organization” B organizations ) Physical space https://www.meti.go.jp/english/press/2019/pdf/0418_001b.pdf 8

  10. Brief image of CPSF 9

  11. 20 categories of security measures Category Name acronym Related category of NIST Cybersecurity Framework v1.1 Asset Management CPS.AM ID.AM (Asset Management) Business Environment CPS.BE ID.BE (Business Environment) Governance CPS.GV ID.GV (Governance) Risk Assessment CPS.RA ID.RA (Risk Assessment) Risk Management Strategy CPS.RM ID.RM (Risk Management Strategy) Supply Chain Risk Management CPS.SC ID.SC (Supply Chain Risk Management) Identity Management, Authentication, and Access CPS.AC PR.AC (Identity Management and Access Control) Control Awareness Improvement and Training CPS.AT PR.AT (Awareness and Training) Data Security CPS.DS PR.DS (Data Security) Processes and Procedures to Protect Information CPS.IP PR.IP (Information Protection Processes and Procedures) Maintenance CPS.MA PR.MA (Maintenance ) Protection Technology CPS.PT PR.PT (Protective Technology) Abnormal Activities and Events CPS.AE DE.AE (Anomalies and Events) Continuous Monitoring of Security CPS.CM DE.CM (Security Continuous Monitoring) Detection Process CPS.DP DE.DP (Detection Processes) RS.RP (Response Planning) Response Plan CPS.RP RC.RP (Recovery Planning) RS.CO (Communications) Communication CPS.CO RC.CO (Communications) Analysis CPS.AN RS.AN (Analysis) Mitigation CPS.MI RS.MI (Mitigation) RS.IM (Improvements) Improvement CPS.IM RC.IM (Improvements) 10

  12. Development of sector-specific measures and guidelines METI’s Study Group on Industrial Cybersecurity [Held 5 times since Feb. 2018~] WG1 Rules, Technology, Standards  Developed The CPS Framework Standard Model in Apr. 2019 Examine sector-specific security measures in Sub WGs [Held 8 times since Feb. 2018~] Building (EV, EMS, etc)  Developed the 1 st Draft of Guideline Cross-sectoral SWG Collaboration Platform Electric Utility [Held 4 times since Jun. 2018~] [Held 8 times since Mar. 2018~] Defense [Held once since Apr. 2019~] Auto Vehicle Smart Home [Held 8 times since Mar. 2018~] And so on Proposal of International Standards & Mutual Recognitions 11

  13. The Guidelines for Cyber-Physical Security Measures for Building Systems  The 1st version was published on June 17, 2019. 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend