8
1 CRITICAL COMMUNICATIONS IMPLICATIONS FOR 5G PAUL STEINBERG CHIEF TECHNOLOGY OFFICER MOTOROLA SOLUTIONS

CRITICAL COMMUNICATIONS - transition.fcc.gov 5G Workshop... · Open Infrastructure API Critical Communications Unified Service Enabler Layer (Group Access, Priority / QoS, ... 1 361

  • Upload
    vodiep

  • View
    222

  • Download
    0

Embed Size (px)

Citation preview

1

CRITICAL COMMUNICATIONSIMPLICATIONS FOR 5G

PAUL STEINBERGCHIEF TECHNOLOGY OFFICERMOTOROLA SOLUTIONS

CRITICAL INTELLIGENCECRITICAL COMMUNICATIONS

ANALOG DIGITAL INFORMATION ENABLED

BUSINESS/MISSION CRITICAL INTELLIGENCE

SOLUTION ARCHITECTURECRITICAL INTELLIGENCE

9-1-1

SOCIETAL

NG 9-1-1

DATABASES

SENSORS &

VIDEO

CONNECTED

VEHICLES

CONNECTED RESPONDERS

Applications/Services/AnalyticsMulti-media

Comm. Services

Other

Services

Critical Communications Workflow / Operations

Knowledge Apps

(Orchestration, Analytics)

App Services

(CAD, Messaging)

Real-time

Comm.

Services

Open Infrastructure API

Critical Communications Unified Service Enabler Layer(Group Access, Priority / QoS, Context Awareness, Event Logging, etc.)

Web-based & Native Application

Open Device API

Critical Communications Enabled Clients

Devices/ Accessories / Wearables

Dispatch

Intelligence Analyst

CONTROL CENTER/BACK

OFFICE

PROFESSIONAL STAFF

Management

Field

Integration Open Services API

CITIZENS

CAPTURE DECIDE & ACT MOBILIZE

IANLMR LTE

CR

ITIC

AL

CO

MM

UN

ICA

TIO

NS

5G CRITICAL COMMUNICATIONSCAPACITY / COVERAGE / GOS NEEDS

Media Sharing, Virtual Reality, Telepresence & IoT become force multipliers, driving capacity needs with intense periods of high demand in incident scenes, coupled with a need for continual connectivity for IoT, personal communications & secure apps

Critical communications requires secure, highly reliable & ubiquitous coverage, system resilience and graceful degradation

Deployable systems with mesh, ad-hoc and direct mode network topologies neededto fill capacity & coverage gaps

“Security by Design” – security is part of the design process from the beginning0%

20%

40%

60%

80%

100%

120%

1 361 721 1081 1441 1801 2161 2521 2881

Perc

ent o

f Cha

nnel

Use

d

Time of Day

Major Incidents Minor Incidents PS Background Traffic & Video M2M

11am 12pm 1pm 2pm 3pm 4pm 5pm 6pm 7pm

Cell 55

0%

20%

40%

60%

80%

100%

120%

1 361 721 1081 1441 1801 2161 2521 2881

Perc

ent o

f Cha

nnel

Use

d

Time of Day

Major Incidents Minor Incidents PS Background Traffic & Video M2M

11am 12pm 1pm 2pm 3pm 4pm 5pm 6pm 7pm

Cell 55

0%

20%

40%

60%

80%

100%

120%

1 361 721 1081 1441 1801 2161 2521 2881

Perc

ent o

f Cha

nnel

Use

d

Time of Day

Major Incidents Minor Incidents PS Background Traffic & Video M2M

11am 12pm 1pm 2pm 3pm 4pm 5pm 6pm 7pm

Cell 55

Projected Public Safety Incident Blocking Frequency

0

10

20

30

40

50

60

70

80

2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025

Peta

Byte

s/M

onth

Traffic Demand Projections

Police

Fire

EMS

Private EMS

Other Public Safety

Federal Police

Corrections

Projected U.S. Public Safety Traffic Demand

DENSIFICATION

Massive increase in number of devices, sites, backhaul

SDN / NFV

Site density approaching 1 site per active user

Latency reduction

SPECTRUM SHARING

Highly dynamic spectral reuse and interference management

mmWave (>10GHz spectrum with > 1 GHz channels)

5G enables an explosion of interconnected devices, and paradigms broadening the attack surface

Security must be “baked in” 5G standards and 5G devices

SECURITY

5G CRITICAL COMMUNICATIONS TECHNOLOGY ELEMENTS

COVERAGE & CAPACITY

Pervasive coverage (95%+) with high minimum throughput

Transparent to broad application ecosystem

Deployable mobile sites, repeaters, relays, ad-hoc and direct modes

5G SMARTER MUST PROVIDE REQUIREMENTS FOCUSED ON BUSINESS/MISSION CRITICAL COMMS

SECURITY & 5G: IOT AS A DRIVER

• Perceived gaps:• There have been many security gaps publicly identified in existing IoT solutions• Many vendors lack knowledge around the secure SW development life cycle (SDLC)

• How industry is addressing these gaps:• Many industry orgs provide compliance requirements that includes security• Multiple industry best practices include CTA, CSA, NIST, FTC, DHS, OWASP

2015 FCC TAC Cybersecurity WG key findings on IoT

2016 FCC TAC Cybersecurity WG task around 5G Security

• FCC’s Goal for the WG• Recommend to the FCC the strategy, procedures and steps necessary to help incorporate

the concept of “security by design” into the very fabric of 5G

• Proposed scope/direction• Leverage the 2015 TAC IoT work and focus on IoT applications of 5G technology• Create a list of key security principles that should be built into the 5G IoT ecosystem• Identify SDOs and develop an action plan to influence the standards development process

SECURITY & 5G: KEY CONSIDERATIONS

IDENTIFY

RECOVER

PROTECT

NIST Cyber Security Framework Core Functions

• 5G will enable greater connectivity and an explosion of interconnected devices, broadening the attack surface

• Critical comms, critical infrastructure, ICS, healthcare, etc. drive the need for stronger security capability

• Technical considerations:

• Protection of dynamic spectrum enablers (e.g. DSA)

• Privacy enablers (e.g. ephemeral “thing” identifiers)

• Highly scalable deployment/maintenance models including SDN and NFV

• Crypto agility for greater interoperability & longevity

• IoT friendly, decentralized trust models

• User friendly and interoperable user authentication

• Rapid defense/response through edge and swarm intelligence

RESPOND

DETECT

8

WE INNOVATE TO MOBILIZE AND CONNECT PEOPLE IN THE MOMENTS THAT MATTER