Page 153 - Kaleidoscope Academic Conference Proceedings 2021
P. 153

Connecting physical and virtual worlds




              frequency,and space domains  to transmit data. The   5.2.2   Smart factory security
              transport network uses FlexE-based hard isolation to
              have exclusive timeslots similar to TDM; services can   •   UE access security: A CPE equipped with a SIM card
              be carried over network slices based on time division,   initiates a registration procedure to the 5G network, and
              and services on different FlexE slices do not affect each   then initiates a registration authentication procedure to
              other.  The  core  network  uses  NFV  to  allocate   the control plane of the 5G core network through the 5G
              independent physical server resources to the power grid.   base  station  and  5G  transport  network.  During  this
                                                                  process, the identity of the SIM card is authenticated (in
                                                                  compliance  with the 5G AKA  mutual authentication
                                                                  standard)  to  prevent  unauthorized  access  to  the  5G
                                                                  network.  Since  operators  provide  the  authentication
                                                                  capabilities  of  SIM  cards,  if  enterprises  need  to
                                                                  independently authenticate and manage enterprise UEs,
                                                                  they can deploy  AAA  services to perform secondary
                                                                  authentication on enterprise UEs. This ensures that only
                                                                  authorized users and UEs are allowed to access the
                                                                  campus network.
                                                               •   Communication  network  confidentiality and  integrity
                                                                  protection:  One  the  one  hand,  the  5G  air  interface
           Figure 8 – Differences between 5G and legacy networks in   security and transmission security mechanisms are used
                      carrying electric power services            to implement E2E segment-based confidentiality and
                                                                  integrity protection on 5G networks. 5G air interface
           •   Vertical  authentication:  There  are  some  dispatching   security ensures confidentiality and integrity of radio
              centers, power plants and substations that require special   interfaces  between  5G  UEs  and  base  stations.
              protection because their data is highly sensitive. In this   Transmission  security  ensures  confidentiality  and
              case, their data should pass through dedicated vertical   integrity from the base station to the UPF and from the
              encryption and authentication devices or encryption and   UPF to the enterprise intranet. Operators and enterprises
              authentication  gateways  and  related  facilities.  This   can deploy IPsec to ensure confidentiality and integrity
              implements bidirectional  identity authentication, data   of the transport network. On the other hand, enterprises
              encryption, and access control. Vertical encryption and   deploy security capabilities of CPEs and border security
              authentication devices authenticate and encrypt WAN   gateways to ensure security of communication links at
              communication,  protecting  the  confidentiality  and   the application layer such as creating a dedicated tunnel
              integrity of the data in transmission, as well as ensuring   for local transparent transmission and deploying E2E
              secure filtering. In addition to all the functions provided   encryption and integrity at the application layer.
              by encryption and authentication devices, the encryption
              and  authentication  gateways  should  also  be  able  to
              process   power   systems'   data   communication
              application-layer protocols and messages.

           5.2   Smart factory

           5.2.1   Overview

           A smart factory is a typical LAN MEC scenario. The overall
           project covers component material inspection, AR-assisted
           component assembly, status monitoring and analysis during
           equipment  trial,  and  AR-based  remote  guidance  for  the
           maintenance  of  any  identified  issues.  The  project
           preliminarily implements equipment trial and manufacturing
           throughout  the  process,  achieves  secure  production,  and   Figure 9 – E2E encryption and integrity protection
           improves the efficiency of research and production. To meet   •   Enterprise network border isolation: To ensure border
           service requirements, the smart factory network architecture   security of the 5G and enterprise networks, a firewall
           consists of 5G UEs, 5G base stations, a 5G transport network,   can be deployed between the UPF and the core switch
           and 5G core network. In addition, the MEC local breakout   on the enterprise network. The firewall provides refined
           mode  is  deployed  to  implement  low-latency  and  high-  access  control  policies  to  reduce  the  attack  surface,
           bandwidth access to local network resources and ensure that   traffic and behavior analysis capabilities, and malware
           data is not transmitted out of the factory. In this case, the   defection. The firewall adopts a security policy of least
           equipment complies with 3GPP specifications and meets the   privilege, so incoming traffic enters the untrust zone.
           carrier-class reliability of 99.999% or higher.        The security policy is configured based on protocols and
                                                                  allows only Internet key exchange and IPsec traffic to





                                                           – 91 –
   148   149   150   151   152   153   154   155   156   157   158