Security guidelines for IMT-2020 communication system
s |
 |
Connected Internet of things (IoT) devices and mobile applications require wireless network access that is resilient, secure and able to protect individuals' privacy. IMT-2020 communication systems should be designed to meet these high-level requirements. There is a need to define a security framework for IMT-2020 communication systems which could act as a foundation for developing further detailed technical Recommendations on IMT-2020 security topics.
Recommendation ITU-T X.1814 identifies all components related to the security of IMT-2020 communication systems and defines security guidelines for the IMT-2020 communication system. It describes a generic IMT-2020 architecture and its domains. It also identifies threats to and specifies requirements for security capabilities for each component, taking into account unique network features. This Recommendation is based on the 3GPP 5G security architecture.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/14992 |
Series title: |
X series: Data networks, open system communications and security X.1800-X.1839: International Mobile Telecommunications (IMT) security X.1810-X.1839: IMT-2020 security |
Approval date: |
2022-09-02 |
Provisional name: | X.5Gsec-guide |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1814 (09/2022)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 43 (09/2024)
|
Supplement to ITU-T X.1813 - Security deployment scenarios for cellular vehicle-to-everything (C-V2X) services supporting ultra-reliable and low latency communication (URLLC)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|