Is your network secure?

As wireless networks and ICT infrastructure become increasingly mission-critical for large industries and society, it’s imperative that mobile operators protect their infrastructure
Chafic Traboulsi
Chafic Traboulsi


By Chafic Traboulsi, head of Ericsson Networks, Middle East and Africa

As wireless networks and ICT infrastructure become increasingly mission-critical for large industries and society, it’s imperative that mobile operators protect their infrastructure.

It has become more common these days to hear about the latest security breach or denial of service (DOS) attack, which highlights the many challenges businesses face as they look to curb an increasing number of attacks passing through their IT networks.

In the telecom sector, the move to IP-based networks has been a key success factor for mobile broadband, although this crucial move hasn’t necessarily thwarted the increasing threat of attacks on mobile networks.

Our vision of the Networked Society is that when everything becomes connected, society, industries and people will be affected in various ways. The recent Ericsson Mobility Report estimates that the global number of connected IoT devices will surpass the number of mobile phones by 2018. This means that digital opportunities and cyber security challenges will expand beyond human connectivity.

Every new connected device requires holistic security thinking spanning new business models, technologies, standards and regulations. The traditional principles of risk and security management, such as check-box compliance and access control, are being challenged.

Mobile network security is rapidly becoming a critical issue for operators as they transform their cellular networks to 4G/LTE – and even 5G – while adding small cells and Wi-Fi access to boost capacity and increase coverage.

Interestingly, 5G enables more IoT use cases with vastly diverse requirements, some of which support M2M communications with ultra-reliable connectivity. Other use cases are optimised to enable long battery life and very low cost. Essentially, these requirements call or a new generation of services with a new set of cyber security challenges.

Exposing every mobile network

An all-IP network and Wi-Fi access from untrusted public hotspots and access points exposes every mobile network to new threats that can impact service and compromise security.

Ericsson manages telecoms systems on behalf of operators and other customers around the world, serving more than one billion subscribers, supporting 2.5 billion mobile users, while handling 40% of all mobile data traffic.

As wireless networks and ICT infrastructure continue to expand and become increasingly mission-critical for large industry and society, it’s imperative that mobile operators protect their infrastructure – when operators want to offer new cloud services that connect to networks other than their own, a whole range of new security risks must be addressed.

Technology services may include remote control and monitoring of industrial systems, self-driving vehicles, and so much more. The availability and functionality of these services depends on the underlying ICT infrastructure. Cyber-attacks with safety implications are unfortunately becoming a reality.

With more data residing in the cloud, traditional perimeter protection will no longer be enough. When data flows across organisational boundaries and nations, it must be protected at all stages; when it is generated, stored, transmitted and used. This must be done over both trusted and untrusted infrastructures.

Radio access network security solution tests, verifies and integrates applicable nodes needed to build a network. The solution provides end-to-end network security, which is especially important for radio nodes like small cells placed in public areas. This solution offers built-in IP security, which includes encryption, certificate-based authentication, and integrity protection between radio nodes and security gateways.

Securing the gateway

By devising a security strategy that segments the access networks from the core network, using an enhanced security gateway ensures mobile operators can better protect themselves and their users from hacking and unwanted attacks.

Secure gateways support various tunnelling authentication and encapsulation methods, integrated firewalls, as well as high availability and network resiliency. Secure gateways must provide encryption functions with the scale that’s needed to support both new access connections from small cells and Wi-Fi access points, and private network connections to enterprise and cloud networks.

The bottom line is that although mobile networks are open to attacks, channel jamming and message forgery, modern security features are able to prevent intrusion by integrating a security architecture that provides authentication, confidentiality and integrity.

Although modern 3G and 4G/LTE network infrastructure provides good security features, there are always new security issues that arise. It is therefore prudent for operators to investigate, improve and rollout measures that add new security layers capable of meeting the demands of the next generation of mobile network infrastructure.

REGISTER NOW | Webinar Event | Security you can bank on – Safeguarding the Middle East’s financial sector

Presented in partnership with security and network specialist Cybereason, the second in the three part webinar series will bring together a panel of experts to discuss how banks and financial institutions are evolving their service offering while simultaneously staying one step ahead of the cyber criminals who seek to bring their operations crashing to the ground.

Editor's Choice

Emerson expands analytics platform for industrial enterprise-level wireless infrastructure management
Plantweb Insight platform adds two new Pervasive Sensing applications that manage wireless networks more efficiently with a singular interface to the enterprise
Digitalisation seen as a competitive advantage by Middle East private businesses
Nearly 80 per cent of private business leaders acknowledge that digitalisation can impact business sustainability
Etisalat introduces Multi-Access Edge Computing architecture delivering best-in-class video streaming performance for 5G networks
MEC architecture achieves performance gains of as much as 90% in video streaming, validating how ultra-low-latency applications will be delivered over 4G and 5G networks

Most popular

Don't Miss a Story