International practices of endogenous security for 5G infrastructure and data

2022-12-07
| wicinternet.org

share

The in-depth integration of 5G and vertical industries has brought more security challenges. With the acceleration of integration, it will be more difficult to assure network security and protect key infrastructure. Enabling the 5G infrastructure with intrinsic security capabilities and promoting large-scale construction worldwide are of widespread international concerns which ZTE is committed to.

Security in DNA, Pave the Road to 5G Development

Entering to the digital era, the security threat comes from various aspects, and the security solutions need to be carefully designed. 5G cybersecurity is an important foundation of 5G security solutions.

The security of products requires the guarantee of standards. ZTE actively participates in the research of global 5G technology and the formulation of international standards. Besides, it is deeply involved in international mainstream standard organizations and is actively promoting the standardization of 5G security solutions. ZTE ranks third globally in essential 5G patents disclosed by ETSI.

ZTE is committed to delivering secure and trustworthy products and services to customers from the very beginning. ZTE's 5G solutions and products comply with 3 GPP standards and have various security features. It continuously improves the security maturity of 5G products, has been certified by series of standards, and provides operators and industry customers with secure and reliable 5G infrastructure.

5G has arrived; Security is the first step, End-to-end security empowerment to the 5G industry

Fostered by innovative service-based architecture. Differentiated network slicing, open network capabilities, and others, the innovation capabilities of 5G have catalyzed new development opportunities for challenges as well. Network industrial internet and brought more security challenges as well. Network security and data security are crucial for 5G empowering the industrial Internet.

Deploying intelligent orchestration of security capabilities on-demand deployment, and expansion of security resources, the ZTE 5G intrinsic security protection system implements end-to-end secure transmission of key industry data, data processing-and-transfer localization, personal user and industry user data masking, and privacy protection, which provides multi-direction data security protection for 5G network.

The business practices of 5G+ industrial Internet in the ZTE Global 5G Intelligent Manufacturing Base in Binjiang, Nanjing, China have proved the customizable security capability of 5G technology which can not only meet the common security requirements of the 5G industry, but also flexibly customize the differentiated security requirements of the 5G industry

Promoting Global Co-construction and Internationalization Practice, Born to the Sun

ZTE has built many 5GC/EPC networks around the world and provided effective security protection by working with many operators and industry customers to verify the effectiveness of 5G intrinsic security and push on the global construction of 5G infrastructure.

In June 2020, in the 5G SA private network project of Orange Belgium, together with Antwerp Port Administration, BASF Chemical Industry, Convertro, Borealis, Katoen, and many world-famous enterprises, ZTE has built a 5G+ smart port. It successfully verified the effectiveness of multi-slice differentiated security protection and high-throughput secure transmission.

In early 2021, ZTE built a smart community and constructed an end-to-end 5G network by working with Okura which provided intrinsic security capabilities and achieved secure and reliable community access. In July 2021, together with the CRC Ministry of Mongolia, we commissioned the 5GC trial and successfully verified the security and credibility of industry edge access.

In 2018-2022, the vEPC projects of VDF, VEON, and AIS provided security protection for VEPC sites in more than 10 countries and regions. In the China Mobile IMS project, it provides security protection for the service traffic exceeding 1 Tbps.