Trustworthy systems – Future technologies


Service availability

Increased focus on robustness, availability, and resilience of the 5G network platform supports new business and mission critical use cases. Take, for example, a factory – where disturbances in connectivity may cause production interruptions, and consequently, great financial impact. 

Breaking this down, we identify efficient and robust resource provisioning, automated network operations, and predictive network operations as key requirements of consumers and industries in the future.

Solutions built on confidential computing

Confidential computing will be an important enabling technology for security with systems becoming increasingly virtualized. It allows us to protect data as it is being processed and stored, providing assurance to both users and regulators. Confidential computing will also form a basis for secure identity management.

A long-term vision is that we will have automated trust assessment of all network elements, including nodes, devices, applications, and virtual resources in the cloud, rooted in trusted execution environments and with artificial intelligence based processing.

Secure identities and protocols

Secure identities are essential to protect communication at every layer between humans, devices, and applications across different industry segments. To enable secure communication, technologies that have been used throughout the mobile network generations, including protocol stacks, will continue to evolve. Examples are trusted identities and secure protocols, authentication frameworks, consent and access control management, and automated data governance. 

For example, trusted identities, unified identity, consent and access control management, and automated data governance. 

Security assurance and defense

Security automation and assurance mechanisms are essential for the development, deployment, and operations cycle. Present-day security assurance methodologies put a lot of focus on product security. Our long-term vision is that solutions will have built-in assurance and proof-of-compliance mechanisms, supporting communication service providers and their subscribers, assuring full compliance with security specifications, standards, and regulations. New tools, some of which will use AI capabilities for detecting threats and dynamically responding to them, will significantly enhance assurance in the future.


Read More:Trustworthy systems – Future technologies