Cybersecurity

5G will change the world - but who will keep it safe?

A newly installed 5G antenna system made by Ericsson for the AT&T's 5G wireless network is shown high atop a building in downtown San Diego, California, U.S., April 23, 2019

Image: REUTERS/Mike Blake

Amy Jordan
Lead, Cybersecurity Delivery, World Economic Forum Geneva
David Rogers
Lecturer on Mobile Systems Security, Oxford University
Share:
Our Impact
What's the World Economic Forum doing to accelerate action on Cybersecurity?
The Big Picture
Explore and monitor how 5G is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:

5G

The advent of 5G networks brings a wealth of new opportunities. Individuals will be able to access a whole range of services more easily, while businesses and governments will be able to use faster download speeds to deliver an entirely new level of service, using a multitude of increasingly interconnected platforms. But why is 5G so different from what has come before, and what new security threats does it pose?

5G networks will make available many more connections across a spectrum of services that have previously not been connected. This poses a wide and unprecedented set of risks that need to be considered by a significantly broader set of stakeholders than has previously been the case. A number of providers, many of whom run ‘critical’ services, will increasingly come to rely on 5G mobile networks to run their services and provide access to their customers. This can extend from the obvious, such as financial services, which already provide a vast array of products via mobile networks and devices, to the less obvious, such as healthcare and transport providers, who will increasingly offer a greater number of interconnected services that will come to rely on high-speed mobile networks.

Increased dependency

The development of machine-to-machine (M2M) technologies and subsequently the internet of things (IoT) has led to a much greater dependency by all sectors of business, the consumer market and governments on mobile network services. 5G cements that transition and adds to that dependency. The reality for 5G and the future is that the vast majority of services will have some kind of requirement for additional resilience which must be met – much more so than now. Our previous article on IoT sets out the risks of increasing interconnectedness of devices and the measures that can be taken to address some of the key vulnerabilities.

Loading...
Identity

The proliferation of connected devices poses new and increasingly complex questions for security of access and identification. Currently, network operators and service providers generally manage their own authentication for their own services. In the future, however, access to one network or service may allow routes into other connected services and devices. There will therefore need to be much greater collaboration to ensure interoperability of user access. This also changes the trust equation between service providers and consumers, who are already concerned about the levels of privacy they have or don’t have online.

Supply chain

The providers of network infrastructure have an increasingly important role in ensuring the stability of the network as well as protecting the networks from interference from criminals and hostile nation-state activity. There has been much public debate on the role of suppliers of 5G network infrastructure as governments come to realize that this infrastructure will become critical to a far broader array of important services than previously. Never before have networks been relied upon for such an extensive number of services and it will be vital to protect them from interference – whatever its source.

Responding to new challenges

Responses to these and wider challenges will need to take into account the full extent of networks and services that will be used for service provision across industries. A much more comprehensive approach than has been seen to date will be required across networks to ensure that interconnections are understood and can be mitigated. There are several ways in which this might be achieved:

Extending cooperation

Extensive cooperation will be required between entities that have not cooperated before and that will increasingly be dependent on telecoms networks to support the secure provision of their services. Organizations such as the GSMA and the World Economic Forum have a crucial role to play in encouraging their members to connect with the wide range of stakeholders they will need to engage with in a strategic way, and help them to navigate the variety of new of issues at play.

Extensive cooperation between the public and private sectors will also be needed in view of the growing reliance of critical infrastructure on mobile networks. Governments will need to work together with experts in industry to set clear guidance on what is expected of operators and equipment vendors; ensuring that interoperability across sectors, networks and borders will be possible. They will also need to consider questions on supply chain investment in a holistic and open manner, taking account of geopolitical realities and the potential damage of an overly nationalistic view of the issues at stake.

The 5G rollout is well and turly underway - albeit much further along in the Far East
The 5G rollout is much further along in the Far East Image: Deloitte / Statista
More trust and transparency

Growing trust and transparency will be required between the varying operators and service providers who will become increasingly interdependent. In turn, these operators will need to provide more transparency, both to governments and to consumers, on how they are ensuring that their products and services are secure.

Recent initiatives in the UK and in the EU states have sought to develop approaches to testing 5G equipment security before it is embedded in critical networks and systems. Such approaches could well assist in providing additional transparency and confidence in equipment and services as well as in increasing overall levels of security and helping to resolve legacy issues. Care will, however, need to be taken to ensure that such approaches do not cause undue market distortion if biased towards larger operators. There will also need to be political consensus, ideally at an international level, on the outcomes of any transparency-related analysis to avoiding undermining trust and certainty for equipment providers.

More frameworks, policies and oversight

Robust security will need to be designed into both devices and network equipment from the outset, with a continuous product security lifecycle in place to manage it, as well as a secure software development lifecycle. The networks of the future will be largely virtualized, software-based networks. This means they will be difficult to test as verifiably secure at any point in time. Governments and others such as large businesses who interact with a range of other suppliers and networks will need to consider how appropriate incentives are put in place throughout the supply chain to encourage effective consideration of security in the development and operation of new networks.

To ensure interoperability around the globe and to truly realize the benefits of the Fourth Industrial Revolution, governments will also need to consider how they can promote more international approaches to securing and building trust in next-generation networks. This is most likely to come through setting aside trade disputes and geopolitical differences in order to focus on the benefits to be harnessed through new technologies and services, setting agreed benchmarks and behaviours to ensure security at an international level.

Have you read?

Questions are also being raised about the potential oversight of new network infrastructure, and about whether an independent global oversight body might be created to ensure that communications infrastructures are reliable and don’t have backdoors for intelligence agencies. Whether this is a realistic suggestion in the short to medium term remains to be seen.

Industry bodies from all sectors and governments will need to come together to consider these challenges and to develop collaborative solutions to ensure that the benefits of new networks can be securely and effectively harnessed. Development and implementation of effective solutions will require consideration of both technical and wider political issues – it is likely that some crucial differences in current positions will need to be resolved or set aside if progress is to be made.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Share:
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

Tinder Swindler: How 'romance fraud' became a multi-billion dollar cybercrime

Robin Pomeroy and Sophia Akram

May 24, 2024

About Us

Events

Media

Partners & Members

  • Join Us

Language Editions

Privacy Policy & Terms of Service

© 2024 World Economic Forum