Work item:
|
X.sec-va
|
Subject/title:
|
Security guidelines for vertical applications within the IMT-2020 ecosystem
|
Status:
|
Under study
|
Approval process:
|
AAP
|
Type of work item:
|
Recommendation
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
2027-Q3 (Medium priority)
|
Liaison:
|
-
|
Supporting members:
|
-
|
Summary:
|
Vertical industries are growing rapidly due to the evolution of International Mobile Telecommunications for 2020 (IMT-2020) ecosystem. They are utilizing advanced IMT-2020 networks as underlying communication technologies promote the development of vertical application services. Undoubtedly, this transformative technical environment brings numerous benefits to vertical industry, but also introduces security challenges for vertical applications, including lack of end-to-end protection for vertical application domain(VAD) traffic, vulnerable weak terminals accessing to VAD, and difficulties in security auditing and evaluation, introducing the threats to VAD such as unauthorized access, lateral infection, data traffic attacks, Distributed Denial of Service(DDoS) attacks.
In order to address the above risks, the proposed Recommendation provides security guidelines for vertical applications within the IMT-2020 ecosystem, enhancing the security of vertical applications by leveraging the open capabilities of IMT-2020 network. It includes the analysis of security challenges, the definition of security capability framework, and the security guidelines for vertical applications within IMT-2020 ecosystem. Furthermore, it describes the security procedures for vertical applications within IMT-2020 ecosystem. The proposed Recommendation will serve as a valuable guide for vertical industries, assisting them in safeguarding their respective vertical application domains.
As the proposed Recommendation is focused on security at the application domain, it is essential to clarify that the subject of this Recommendation is out of the scope of IMT-2020 network. Instead, the guidelines and capabilities outlined in this Recommendation are within the area of secure application services.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2025-04-17 13:57:35
|
Last update:
2025-04-17 14:01:27
|
|