幺力视频

Skip to main content

3 reasons to be optimistic about data privacy in the 5G era

Estimated reading time: 5 minutes

New 5G networks are set to unleash a data explosion 鈥 which will make people understandably concerned about surveillance, consent and hacks. But we should also be aware of the great work being done to counter the threats鈥 

Last summer a rumour spread fast across social media: . It was quickly . Perhaps the best put-down came from Australian professor of medicine John Dwyer. 

He : 鈥淐oronavirus is available to all Australians, which you can't say about the 5G network.鈥

Still, the conspiracy theories around 5G persist. They reflect the enduring fear of change that greets virtually all transformative new technologies.

That said, 5G will usher in new products, services and behaviors. And some of them could have negative consequences.

There are genuine reasons to be vigilant.

One legitimate concern centres on privacy.

5G will vastly scale up the data flowing across cellular networks. , global mobile data traffic exceeded 49 exabytes (that鈥檚 49 billion gigabytes) per month at the end of 2020.

It is projected to hit 237 EB per month in 2026.

What鈥檚 more, unlike today, almost half of this data will be generated by machines, not people with smartphones. 

The that, by 2025, there will be 2.6 billion 鈥榟uman鈥 5G subscribers compared with 5 billion 5G IoT connections.

Obviously, more data from more (diverse) sources ramps up the risk of leaks 鈥 both accidental and deliberate. It also raises the question of non-consensual corporate/government access to private data.

But against that, it鈥檚 important to remember that . Indeed, they built many privacy safeguards into the network architecture itself. 

What鈥檚 more, 5G is being launched into a world that offers more statutory protections for consumers than ever before.

Jean-Fran莽ois Rubon, SVP of Strategy and Innovation for Mobile Connectivity and Services at Thales, says this makes the current climate very different. 鈥淲e didn鈥檛 really have conversations about privacy when we were building 4G,鈥 he says.

鈥淚t鈥檚 a different world now. People are more aware of the issues, and regulators are acting on these concerns.鈥

So there are good grounds to be positive. 

But before we dive into them, let鈥檚 re-cap the nature of the most pressing 5G privacy concerns.
 

The location threat: 5G鈥檚 small cell size

In the 4G world, cell phone towers are generally positioned about a mile apart from each other. This means that carriers can know the general area a person is in, but not the precise address. 鈥 their signals can鈥檛 easily penetrate buildings. For this reason, they are smaller and more closely spaced together. They sit inside buildings and on rooftops. This proximity makes it possible for phone companies to track a person鈥檚 location in great detail.
 

The corporate threat: edge computing and private networks

In standalone 5G, each network function no longer resides in its own isolated, secure hardware. Instead it resides in software on shared virtualised infrastructure with other applications. This makes 5G a new kind of network, profoundly different from its physically-based predecessors. 

Virtualization makes it possible to offer ultra-fast connectivity and exponentially more connections. It also enables 鈥榥etwork slicing鈥. Carriers can carve up their networks to give private companies the ability to run their own discrete 5G operations.  

The attractions are self-evident. Especially for organisations in sensitive verticals (defence, utilities, etc) that want to keep their data on-site. 

But there are obvious . The 鈥榦ld鈥 centralized 5G set-up offers physical protections: you can even have guards and walls around data centres. By contrast, mobile edge computing (MEC) servers are not centralised. There could be 1000s of them. This makes it essential to monitor and control who has access. 

Also, running a private network doesn鈥檛 mean that data never leaves it. Many private networks will still exchange information with public infrastructure. Companies and MNOs need to ensure proper isolation to prevent data leaks.

And they need 鈥榙ata in motion鈥 security that meets the ultra-low latency and high-throughput requirements of 5G networks. Many existing technologies will struggle to cope. 

It鈥檚 why companies such as Thales have developed that give customers a single platform to 鈥榚ncrypt data in motion鈥欌 from data centre and HQ to backup to disaster recovery sites. Such systems can secure transmitted data at speeds up to 100 Gbps and with microsecond latency.
 

The analytics threat: NWDAF makes it easier to collect data

The architects of 5G wanted to improve the analytical data available to MNOs. They created the to make it easier to collect statistical information on past events, or predictive information about future events. User consent may not be relevant for network data, but it is a consideration when gathering data on user behaviour. 
 

The machine threat: billions of IoT devices widen the attack surface

As stated, 5G will connect more machines than people. The IoT network will include every kind of device 鈥 from 鈥榙umb鈥 sensors to an autonomous cars. 

One might wonder why we should worry about getting consent from a 鈥榙umb鈥 device. But Jean-Fran莽ois Rubon argues it鈥檚 not that simple. 鈥淵ou can ask: do machines have a right to privacy?,鈥 he says. 鈥淏ut it鈥檚 the wrong question. Most machines will be connected to users in some way. It could be meter related to a person鈥檚 power consumption or even a health sensor gathering physiological data. In this sense, IoT privacy is a really important topic.鈥

Indeed, IoT machines will form 鈥榥odes鈥 on a vast connected grid, offering hackers billions of potential access points 鈥 and companies the ability to build profiles on people.

Organizations will be able to gather a lot of information about customers鈥 online and offline behaviour. While this will enable the personalized services consumers demand, it must be done with consent. And it must be protected/anonymized to prevent social engineering attacks targeting individuals and the businesses they work in. Ultimately, , for what purposes and for how long.
 

But there are many reasons to be optimistic 

Plenty has been written about the above threats. Predictions of doom are easy to make. However, there鈥檚 no doubt that the 5G era is different from those that came before. For this reason, industry insiders are working hard to counter the threats. And consumers are taking steps to protect themselves. 

Let鈥檚 look at three stand-out reasons to be positive. 

#1 - MNOs are building 5G networks in a privacy-aware era

When 3G and 4G networks were under construction, there was little or no privacy debate. Today is very different. , Cambridge Analytica and have changed the public mood.
 
They have also changed the law. The big shift started with , which limits the processing of a person鈥檚 data without consent.

GDPR鈥檚 impact was not just on EU citizens. It also inspired in Brazil, India, California, Japan and elsewhere. 

These regulations increase the pressure on corporations and carriers to protect the personal data flowing across 5G networks 鈥 and seek informed consent when they want to process that data.

#2 - 4G SIMs have a privacy flaw. The 5G SIM fixes it

The traditional 4G SIM has a security hole. When it communicates its identity to the network it does so in plain text. This is a problem if attackers are able to intercept this communication. And they can. They use something called an (also known as a Stingray) to gain possession of the IMSI, harvest user data, do location tracking and even perform a denial of service.

When the mobile standards body 3GPP , it fixed the problem. How? By ensuring the user, identity is encrypted when it鈥檚 transmitted over the air. The 3GPP created a new identifier, the . Devices don't send the SUPI over the air. Instead, they send an encrypted identity called a SUCI (Subscription Concealed Identifier), which is ciphered thanks to the 5G SIM. If an attacker intercepts the SUCI the information is useless.

#3 - 5G builds in support for a 鈥榸ero trust鈥 approach to data access, which will lock out intruders

 As stated earlier, the 5G network is far more heterogeneous than its 4G processor. It is built on 鈥榮tandard鈥 cloud-based infrastructure (as compared with the largely physical infrastructure of 4G) and it will comprise many discrete private networks run by autonomous organisations.

All of which makes it difficult to protect network resources with conventional 鈥榩erimeter-oriented鈥 security. 

So if we assume that attackers can and will enter public and private 5G networks, what is the best method of defence?

5G stakeholders believe it to be the .

Zero Trust is based on a simple assumption: trust no one with everything. This means that every access request must be fully authenticated, authorized, and encrypted before being granted. It restricts what an attacker can do, even if he/she has gained entry to the network.

When it defined the tech behind 5G, the 3GPP standards body made sure that in three domains.

鈥    Network access security. This provides users with secure access to services through the device (phone or IoT) and the radio node.

鈥    Network domain security. Enable nodes to securely exchange signalling data and user data.

鈥    Service-based architecture (SBA) domain security. This specifies the mechanism for secure communication between network functions in the serving network domain and with other network domains.

Given the need for 5G networks to meet ultra-low latency and high-throughput requirements from cell sites to the edge and core, securing data in motion can be quite a challenge. Thales HSE with its flexible and easy to manage interface can secure data in motion for the mobile backhaul with the following capabilities:

Companies such as to help corporates enact a zero trust model. These solutions comprise tools for , encryption and key management.

 

Related articles:

How ML can prevent network outage in a 5G world

5G: how can enterprises protect themselves?

5 ways business is getting an industrial 5G makeover

5G versus 4G: what's the difference?

5G SIM, security and privacy for IMSIS