GO UP
tech background
5G Roaming Security

TNS and Cellusys Partner with an Eye to the Future of 5G Roaming and Security

With 5G roaming and interworking on the horizon, US-based Transaction Network Services (TNS) will collaborate with Irish solutions provider, Cellusys, in research, development, and testing of roaming and security solutions for 5G networks.

SIM card e SIM shop

Utilizing the TNS 5G Innovation Lab, the team will combine TNS’ expertise in steering of roaming and other services for regional and national US carriers for 3G, 4G, and soon 5G traffic with security solutions from the Cellusys portfolio, including Signalling (Diameter, GTP, SIP, SS7) and SMS Firewall.

“We see 5G as a pivotal component within every roadmap and are confident we will be able to offer first-rate solutions to our customers as 5G roaming and security continue to evolve,” said Bill Versen, President of TNS’ Communications Market business. “Developing new technologies requires creativity and competence, but also a flexible and agile approach, which is why we are excited to embark on this journey with Cellusys.”

5G NSA, based on 4G infrastructure, has become prevalent in much of the country and is gaining traction around the world. Over 500 million 5G handsets are forecast to be sold in 2021, according to Gartner, signalling an appetite for faster download speeds. However, when 5G SA roaming is more prevalent, it may also bring new security threats to mobile operators’ networks.

“Our multi-tenant solutions are designed with worldwide leading organizations like TNS in mind, as signalling is increasingly centralized,” said Daniel McTague, Cellusys CTO. “TNS shares our zeal in having the best 5G solutions available to our customers and we are looking forward to working closely with them, as well as continuing our expansion into the Americas.”

 

Key Security Challenges

  1. Increased Attack Surface: The introduction of new network elements and protocols in 5G expands the potential attack surface. This includes new interfaces, network functions, and the increased reliance on software-defined networks (SDN). 
  2. Network Slicing: Network slicing, which enables tailored network services for specific use cases, can introduce security vulnerabilities if not implemented correctly. Each slice can be considered a separate network with its own security requirements.
  3. IoT Integration: 5G is designed to support a massive number of IoT devices. These devices, often with limited security capabilities, can become entry points for attacks.
  4. Interoperability: Roaming between different 5G networks can introduce compatibility issues and security risks if not managed properly.
  5. Data Privacy: Protecting user data privacy is a critical concern in 5G roaming. Ensuring that data is handled securely and in compliance with relevant regulations is essential.

Security Measures

To address these challenges, network operators and equipment manufacturers have implemented various security measures:

  • Authentication and Authorization: Strong authentication and authorization mechanisms are essential to prevent unauthorized access to the network. 
  • Encryption: End-to-end encryption is used to protect data in transit and at rest.
  • Security Edge Protection Proxy (SEPP): SEPPs are deployed to protect the interface between home and visited networks, filtering and authorizing roaming traffic.
  • Network Function Virtualization (NFV): NFV can improve security by enabling more flexible and scalable deployment of network functions.
  • Security Information and Event Management (SIEM): SIEM systems can help detect and respond to security threats.
  • Regular Updates and Patches: Keeping network components up-to-date with the latest security patches is crucial.

Ongoing Challenges and Future Trends

Despite these measures, 5G roaming security remains an ongoing challenge. As the technology evolves and new threats emerge, network operators and security experts must continue to adapt and develop new strategies. Future trends include:

  • AI-powered security: Artificial intelligence can be used to detect and respond to threats more effectively.
  • Zero-trust architecture: Zero-trust principles can be applied to 5G networks to minimize the impact of breaches.  
  • Quantum-resistant cryptography: As quantum computing technology advances, new cryptographic algorithms may be needed to protect against future attacks.

By addressing these challenges and embracing emerging technologies, the security of 5G roaming can be strengthened to ensure the privacy and safety of users.


Get iPhone 15 on us.

Driven by wanderlust and a passion for tech, Sandra is the creative force behind Alertify. Love for exploration and discovery is what sparked the idea for Alertify, a product that likely combines Sandra’s technological expertise with the desire to simplify or enhance travel experiences in some way.