5G and the Need for Platform Integrity

Current cellular architecture will not be suitable for 5G because it will not scale to the anticipated number of connected endpoints and their rich diversity. The distribution of the previously centralized Core Network (CN) functionality, e.g., Access Authentication and Authorization, has to be dece...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of ICT Standardization 2020-01, Vol.8 (1), p.15-28
Hauptverfasser: Brusilovsky, Alec, McDonald, Ira
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 28
container_issue 1
container_start_page 15
container_title Journal of ICT Standardization
container_volume 8
creator Brusilovsky, Alec
McDonald, Ira
description Current cellular architecture will not be suitable for 5G because it will not scale to the anticipated number of connected endpoints and their rich diversity. The distribution of the previously centralized Core Network (CN) functionality, e.g., Access Authentication and Authorization, has to be decentralized, leading to the demise of the most utilized tool of network security engineering, Physical Security Perimeter. The asserted and attested Platform Integrity of the network nodes that comprise the edges of the network, the network cloud, “network fog”, and the endpoints will allow mobile network operators (MNOs) to create Virtual Network Perimeters and allow highly reliable, diverse, and flexible 5G networks. This article describes the reasons for such network transformation, provides references to applicable standardization activities, and uses the examples of support for Unmanned Aerial Vehicles (UAV) and connected automobiles by 5G networks to justify the need for Platform Integrity.
doi_str_mv 10.13052/jicts2245-800X.812
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3055517541</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3055517541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c142t-14c25e959d82e0a51b005282a7070254146c1233bf9546a70dcaa53b67cb89b73</originalsourceid><addsrcrecordid>eNo9UMtOwzAQtBBIVKVfwCUSEreUXdubOEdUQalUAQeQuFmO40Citim2e-jfYxrEafYxmt0Zxq4R5iiA-F3f2Rg4l5QrgI-5Qn7GJqkvclAkzk_1uLtksxB6ABACJSo5Ybe0zMyuyeKXy56da7J28NnrxsSE22y1i-7Td_F4xS5aswlu9odT9v748LZ4ytcvy9Xifp1blDzmKC0nV1HVKO7AENaQHlTclFACJ4mysMiFqNuKZJGmjTWGRF2UtlZVXYopuxl19374PrgQdT8c_C6d1MkqEZZJJLHEyLJ-CMG7Vu99tzX-qBH0KRP9n4n-9a1TJuIHRPBSRA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3055517541</pqid></control><display><type>article</type><title>5G and the Need for Platform Integrity</title><source>ProQuest One Community College</source><source>EZB-FREE-00999 freely available EZB journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Brusilovsky, Alec ; McDonald, Ira</creator><creatorcontrib>Brusilovsky, Alec ; McDonald, Ira</creatorcontrib><description>Current cellular architecture will not be suitable for 5G because it will not scale to the anticipated number of connected endpoints and their rich diversity. The distribution of the previously centralized Core Network (CN) functionality, e.g., Access Authentication and Authorization, has to be decentralized, leading to the demise of the most utilized tool of network security engineering, Physical Security Perimeter. The asserted and attested Platform Integrity of the network nodes that comprise the edges of the network, the network cloud, “network fog”, and the endpoints will allow mobile network operators (MNOs) to create Virtual Network Perimeters and allow highly reliable, diverse, and flexible 5G networks. This article describes the reasons for such network transformation, provides references to applicable standardization activities, and uses the examples of support for Unmanned Aerial Vehicles (UAV) and connected automobiles by 5G networks to justify the need for Platform Integrity.</description><identifier>ISSN: 2245-800X</identifier><identifier>EISSN: 2246-0853</identifier><identifier>DOI: 10.13052/jicts2245-800X.812</identifier><language>eng</language><publisher>Tokyo: River Publishers</publisher><subject>5G mobile communication ; Automation ; Cybersecurity ; Integrity ; Interoperability ; Network security ; Software ; Trust ; Unmanned aerial vehicles ; Virtual networks ; Wireless networks</subject><ispartof>Journal of ICT Standardization, 2020-01, Vol.8 (1), p.15-28</ispartof><rights>2020. This work is published under https://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/3055517541?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,21387,27923,27924,33743,43804,64384,64388,72240,72899,72900,72902</link.rule.ids></links><search><creatorcontrib>Brusilovsky, Alec</creatorcontrib><creatorcontrib>McDonald, Ira</creatorcontrib><title>5G and the Need for Platform Integrity</title><title>Journal of ICT Standardization</title><description>Current cellular architecture will not be suitable for 5G because it will not scale to the anticipated number of connected endpoints and their rich diversity. The distribution of the previously centralized Core Network (CN) functionality, e.g., Access Authentication and Authorization, has to be decentralized, leading to the demise of the most utilized tool of network security engineering, Physical Security Perimeter. The asserted and attested Platform Integrity of the network nodes that comprise the edges of the network, the network cloud, “network fog”, and the endpoints will allow mobile network operators (MNOs) to create Virtual Network Perimeters and allow highly reliable, diverse, and flexible 5G networks. This article describes the reasons for such network transformation, provides references to applicable standardization activities, and uses the examples of support for Unmanned Aerial Vehicles (UAV) and connected automobiles by 5G networks to justify the need for Platform Integrity.</description><subject>5G mobile communication</subject><subject>Automation</subject><subject>Cybersecurity</subject><subject>Integrity</subject><subject>Interoperability</subject><subject>Network security</subject><subject>Software</subject><subject>Trust</subject><subject>Unmanned aerial vehicles</subject><subject>Virtual networks</subject><subject>Wireless networks</subject><issn>2245-800X</issn><issn>2246-0853</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNo9UMtOwzAQtBBIVKVfwCUSEreUXdubOEdUQalUAQeQuFmO40Citim2e-jfYxrEafYxmt0Zxq4R5iiA-F3f2Rg4l5QrgI-5Qn7GJqkvclAkzk_1uLtksxB6ABACJSo5Ybe0zMyuyeKXy56da7J28NnrxsSE22y1i-7Td_F4xS5aswlu9odT9v748LZ4ytcvy9Xifp1blDzmKC0nV1HVKO7AENaQHlTclFACJ4mysMiFqNuKZJGmjTWGRF2UtlZVXYopuxl19374PrgQdT8c_C6d1MkqEZZJJLHEyLJ-CMG7Vu99tzX-qBH0KRP9n4n-9a1TJuIHRPBSRA</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>Brusilovsky, Alec</creator><creator>McDonald, Ira</creator><general>River Publishers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20200101</creationdate><title>5G and the Need for Platform Integrity</title><author>Brusilovsky, Alec ; McDonald, Ira</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c142t-14c25e959d82e0a51b005282a7070254146c1233bf9546a70dcaa53b67cb89b73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>5G mobile communication</topic><topic>Automation</topic><topic>Cybersecurity</topic><topic>Integrity</topic><topic>Interoperability</topic><topic>Network security</topic><topic>Software</topic><topic>Trust</topic><topic>Unmanned aerial vehicles</topic><topic>Virtual networks</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Brusilovsky, Alec</creatorcontrib><creatorcontrib>McDonald, Ira</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Journal of ICT Standardization</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Brusilovsky, Alec</au><au>McDonald, Ira</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>5G and the Need for Platform Integrity</atitle><jtitle>Journal of ICT Standardization</jtitle><date>2020-01-01</date><risdate>2020</risdate><volume>8</volume><issue>1</issue><spage>15</spage><epage>28</epage><pages>15-28</pages><issn>2245-800X</issn><eissn>2246-0853</eissn><abstract>Current cellular architecture will not be suitable for 5G because it will not scale to the anticipated number of connected endpoints and their rich diversity. The distribution of the previously centralized Core Network (CN) functionality, e.g., Access Authentication and Authorization, has to be decentralized, leading to the demise of the most utilized tool of network security engineering, Physical Security Perimeter. The asserted and attested Platform Integrity of the network nodes that comprise the edges of the network, the network cloud, “network fog”, and the endpoints will allow mobile network operators (MNOs) to create Virtual Network Perimeters and allow highly reliable, diverse, and flexible 5G networks. This article describes the reasons for such network transformation, provides references to applicable standardization activities, and uses the examples of support for Unmanned Aerial Vehicles (UAV) and connected automobiles by 5G networks to justify the need for Platform Integrity.</abstract><cop>Tokyo</cop><pub>River Publishers</pub><doi>10.13052/jicts2245-800X.812</doi><tpages>14</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2245-800X
ispartof Journal of ICT Standardization, 2020-01, Vol.8 (1), p.15-28
issn 2245-800X
2246-0853
language eng
recordid cdi_proquest_journals_3055517541
source ProQuest One Community College; EZB-FREE-00999 freely available EZB journals; ProQuest Central UK/Ireland; ProQuest Central
subjects 5G mobile communication
Automation
Cybersecurity
Integrity
Interoperability
Network security
Software
Trust
Unmanned aerial vehicles
Virtual networks
Wireless networks
title 5G and the Need for Platform Integrity
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T10%3A49%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=5G%20and%20the%20Need%20for%20Platform%20Integrity&rft.jtitle=Journal%20of%20ICT%20Standardization&rft.au=Brusilovsky,%20Alec&rft.date=2020-01-01&rft.volume=8&rft.issue=1&rft.spage=15&rft.epage=28&rft.pages=15-28&rft.issn=2245-800X&rft.eissn=2246-0853&rft_id=info:doi/10.13052/jicts2245-800X.812&rft_dat=%3Cproquest_cross%3E3055517541%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3055517541&rft_id=info:pmid/&rfr_iscdi=true