Page 152 - Kaleidoscope Academic Conference Proceedings 2021
P. 152

2021 ITU Kaleidoscope Academic Conference




              patch  and  firmware  updates,  and  promptly  fixes   •   Security  zoning:  The power grid business is  mainly
              vulnerabilities. Equipment vendors should be able to   divided into the production control area and management
              provide  sustainable  vulnerability  system  governance   information area. For production control area services, a
              and emergency response capabilities.                massive number of network nodes are scattered and full
           •   Situational awareness capability building: Implements   network coverage is required through the whole phases,
              situational  awareness  of  edge-cloud  collaboration   which is a WAN scenario. In this case, the 5G network
              through  unified  security  situational  awareness  and   needs to provide high security isolation, low  latency,
              collaborative defense capability building. Central cloud   high-frequency forwarding, high-precision timing and
              intrusion detection technologies can be applied to MEC   other capabilities. The user-plane UPF is connected to
              nodes to detect malicious software and attacks.     the dedicated MEC in the power production control area.
                                                                  For  management  information  area,  it  contains  video
           4.2.8   Data security                                  services in the  management  zone  and dedicated LAN
                                                                  services. Video services belong to WAN scenarios and
           It is essential to ensure the security of data stored on MEC   require the user-plane UPF to be connected to dedicated
           nodes and transmitted in complex and heterogeneous MEC   MEC  in  the  power  management  information  area.
           networks in WAN and LAN MEC scenarios. Important data   Dedicate LAN services belong to LAN scenarios and
           that ensures service running should be identified among the   require  the  5G  network  to  provide  high  uplink
           large amount of data stored, ensuring its secure backup and   bandwidth and local data processing capabilities. The
           restoration  to  prevent  service  interruption  due  to  data   user-plane UPF is connected to the dedicated MEC in
           destruction. In addition, it should back up important data to      the power management information area.
           a remote  site. Functions  such as backup data consistency
           check and backup location query should be supported.

           Another security risk is privacy data leakage of MEC users.
           To  address  this,  privacy  protection  technologies  such  as
           lightweight  encryption,  data  aggregation,  differential
           privacy-based data protection, and  federated learning are
           required. In addition, data can be classified and  managed
           based on data types during data routing. Data related to user
           privacy should be tagged and isolated at the data ingress of
           each  MEC  node  by  firewalls.  At  the  same  time,  all
           unnecessary services and ports should be disabled based on
           the minimization principle. Then, the important tagged data
           should be provided with integrity, confidentiality, and anti-
           copy protection.
                                                              Figure 7 – Overall framework of the 5G slices for power grid
             5.  CASE STUDIES FOR 5G MEC SECURITY

           5.1   Smart grid                                   •   Dedicated  networks: Dedicated networks are used for
                                                                  physical or logical isolation. Physical isolation between
                                                                  production control area services and other services: If
           5.1.1   Overview                                       some production control area services use the wireless
                                                                  communication network, network devices and terminals
           MEC deployed  for  smart  grids needs  to  match the  traffic   in  uncontrollable state for communication, and  their
           direction of power services to avoid traffic detours, in   security  protection  level  is  lower  than  that  of  other
           addition to satisfying service latency and isolation   systems in the production control area, secure access
           requirements. Specifically, MEC is deployed at the province,   zones should be set  up, and security isolation, access
           city and district/country levels (aggregation and upper layers)   control, authentication, and encryption measures should
           based on the characteristics of power grid services, with   be taken. Logical isolation between different services in
           large-scale implementation at the province and city levels.   an area:  multiprotocol label  switching VPN, security
           This makes smart grid a typical WAN MEC security scenario.   tunneling, permanent virtual circuit, and static routing
                                                                  technologies can be used to  build subnets for logical
           5.1.2   Smart grid security                            isolation.
                                                              •   Horizontal  isolation:  Horizontal  isolation  serves  to
           Power grid security is critical to the national economy and   isolate  main  sites  in different areas.  Compared  with
           people's everyday life. Therefore, as a typical WAN MEC   legacy networks, 5G public networks have a brand new
           scenario,  smart  grid  has  strict  security  requirements.   E2E  network  slice  isolation  solution  when  carrying
           According  to  the  document  requirements  of  China   electric power services. With MEC and slicing, 5G can
           government, power grid services should comply with general   provide E2E physical and logical isolation for services.
           security  principles:  security  zoning,  dedicated  networks,   At  the physical isolation layer, the air interface  uses
           horizontal isolation, and vertical authentication.     resource blocks based on orthogonal dimensions of time,




                                                           – 90 –
   147   148   149   150   151   152   153   154   155   156   157