Description
Fifth generation (5G) cellular is poised to transform the ICT industry through substantially enhanced mobility services, massively scalable Internet of Things (IoT) networks, and support for critical apps and services by way of ultra-low latency communications. With these anticipated improvements come great responsibilities for privacy and security. The 5G Security Market must be robust as solutions need to be deployed on multiple levels including devices, air interface equipment, cloud RAN infrastructure, mobile back-haul facilities, and more.
5G Security Market Dynamics
Among other areas, the 3GPP Security architecture and procedures for 5G System (Specification #: 33.501) specifies requirements for E1 and f1 interfaces as well as requirements for an overall secure environment. The organization specified many areas necessary for 5G security market support including subscription authentication, UE authorization, access and serving network authorization and more. Other areas include user and signaling data integrity to ensure seamlessness and interoperability between network elements.
One of the import areas emerging with the 5G security market that is a greater concern than ever before is data security and private. Much more so than LTE, 5G networks must be concerned with the confidentiality and integrity of user and signaling data. The 5G gNB must support encryption as per security policies for various potential vulnerability areas such as user data in transit as well as signaling for radio resource control. Access control is equally important as well as ensuring that serving networks are authorized by home networks.
5G Security Market for Communication Service Providers
It is important to note that substantial 5G security spending will occur coincident with mobile network operator plans to build-out 5G core infrastructure. Whereas network security appliances continue to be viewed as less expensive and path of least resistance with hybrid LTE/5G networks, carriers will realize substantial savings and fill security gaps with a more integrated cybersecurity approach afforded by 5G service-based architecture.
In terms of market drivers for mobile network operators to expedite implementation of a more integrated 5G security approach, one of the primary areas of focus will be support of 5G-based private wireless networks for enterprise and industrial customers. While today’s private networks take a more old-school approach to security, more security-minded enterprise, industrial and government sector customers will realize greater cybersecurity through interconnection and managed services with leading carrier 5G security solutions.
Leading carriers will transform 5G security from a cost of doing business into a major market differentiator for business customers including direct to enterprise/industrial/government customers and via hybrid models involving neutral hosts and/or direct interconnect with private wireless networks. The challenging task for mobile network operators is to simultaneously convince business customers that they are more secure with them than without them, while not causing alarm about security holes that existed prior to implementation of 5G security market solutions.
However, there will also be completely new 5G security market threats and opportunities such as securing 5G network slicing for enterprise, industrial and government customers. Additional opportunities will emerge such as the ability for network operators of all types to better secure digital identity of their customers thanks to an integrated ID management approach afforded by 5G service-based architecture. This will be particularly useful for carriers in their continued efforts to thwart the threat of unwanted robocalls and to ensure that both wanted voice calls and desirable machine-to-machine communications occur unimpeded.
5G Security Market for Infrastructure Vendors
Leading vendors such as Palo Alto Networks, Cylance Inc. (BlackBerry), and others are poised to capitalize on the market for securing 5G based networks, systems, applications, and services. This includes the 5G security market for hardware, software, and data protection. With recent high-profile events such as alleged espionage on the part of Huawei, cybersecurity is also getting extreme attention at the government level.
By way of example, The Internet of Things Cybersecurity Improvement Act was intended to address IoT device security relative to secure development, identity management, patching, and configuration management. Accordingly, Mind Commerce evaluates the market opportunities for next generation cybersecurity solutions, including the use of AI-based applications, for securing IoT networks and systems. Many of these solutions will evolve to become combined sophisticated AIoT market approaches that combine the best of AI and IoT.
Many of these efforts will be focused on 5G security market related networks and systems in support of enterprise and industrial IoT. While some of the same types of security solutions will be required for 5G as other ICT infrastructure elements, such as network firewall protection, there will also be many new areas of concern.
Release 16 addresses many 5G security market issues including networking slicing access, small data mode, session management, mission-critical architecture, and edge devices. The standard considers security in support of voice continuity, 5G LAN, and a few notable other areas including enhanced URLLC, virtualization security and restrictions on local operators.
5G Security Market Impact on Application Layer
One of the biggest 5G security issues at the application layer is the many apps and services supported. With substantially greater bandwidth, and ultra-low latency, 5G supports many new and improved apps and services such as untethered Virtual Reality (VR) and anytime, anywhere telepresence. Whether it is new immersive technologies, or extension of existing apps such as Voice over 5G ( Vo5G ), there are some common security issues (such as data privacy) and some completely different issues, such as virtual identity theft in VR.
There is more at stake with 5G than predecessor network implementations involving LTE and WiFi. New and enhanced immersive experiences such as VR based telepresence will become the norm for enterprise as VR extends beyond consumer gaming and simulations into business markets. New security threats such as virtual identity spoofing mean that the 5G application layer will be at least as important as securing lower technology layers such as the physical and transport portions of the stack. Accordingly, Mind Commerce sees infrastructure, apps, and data as all having great importance within the 5G security market.
5G Security Market Report
This report evaluates the 5G threat landscape as well as technologies and solutions to secure networks, platforms, devices, data, and applications. The report also assesses the 5G security market outlook and potential for many 5G security solutions, services, and support. It also evaluates the impact of security functions across various technologies including Mobile Edge Computing (MEC), IoT networks, and mobility infrastructure. The report includes detailed 5G security market forecasts for all major technologies, industry verticals, solutions and service types from 2021 – 2026.
This research is highly recommended for anyone involved in the 5G security market and/or those involved with network planning, device procurement, and/or application development and management. The report evaluates the state of threats (malware, cyber-attacks, etc.), solutions, and the overall market for wireless security in cellular with an emphasis on 5G networks.
This 5G security market research report builds upon the Mind Commerce cybersecurity practice investigation initiated in 2015, which covered Wireless Security in LTE Networks and M2M: Market and Forecasts. The Fourth generation (4G) Long Term Evolution (LTE) standard for cellular communications represents a substantial leap forward in terms of capacity and services capabilities. However, LTE security also presented a unique challenge as its all-IP nature exposes vulnerabilities that were heretofore not substantial concerns. LTE network planners needed to address many physical and logical security aspects. For example, there is a critical need to protect the communication links between UEs, base stations, and the EPC network from protocol attacks and physical intrusions.
Those inquiring about this research may also be interested the more broadly focused Mind Commerce Cybersecurity Market Report