 रव. can you hear me? Okay. good morning to everybody, good morning friends. Nice to see you here. I cannot delay anymore, I try to delay so that more people come, I know many are on the streets, maybe some are finishing their breakfast, some are finishing their coffee, but at least I can see, around 100 people are in the hall, and by the time our president will talk, I promise there will be more than 100. �Download field of global wireless summit and global wireless summit. मिस्ठियार्ँ को या अस्तार्ँगाक करत्श्सियार्ग्क्र्म्स्तु, की रहे ग़ा, काई तब रहे सीउन्ट्स्तें. आभेदियार्ँ द़ा की रहे देवादियार्उ, वह आप आप तो से अगे वोगी सोच्फ्वा उगाड़े ग़ांगिश हैंना, अवर पर याद़े वोगी सोच्फ्वाझा, ६ ैै ै plants Gram you have global capsules ौ ौ that is independent legal organization ै ै ॐ ृ अत्रवाइ,में जैस ऴादव्या, जैस An maxima only for 2 terms it remains, मैंली के � 성ल fica sabda as president, मैंग्ल Arena।।....।।।।।।।।।।।। Janeiro म bilateral।।।।।।।।।।।।। 아파।।।।।।।।ers।।।। wzgl।। lifestyle।।।।। Jeremiah।।।। investigations। by and cream वराव। थो वर्वाविजет्ते भी रुविज़ा। बश्अ दीज़ी तईदीईंगा कोई वो आपैते आदवीगों वो क्या वोगी दिज़ी या प्रेगी बशादते है तुढब़ा। दूशिस्तर मैं तुछ़न हanshipísta banks pravi�़ionsherry bullcab aval ॑ंधप्सोचस तुदर आ मirse r 속kab ॑ंधप्सोचस्स से बागा ज्न वुशेंझ। ूञवाश्थ Ughumbhi ab Sanjani N Mahnes kod obei रबज्टी मआं्ट व्शाटु। ऐसेम। और में.. विश्टेко of... एक ल média... वैग उँलवादूउ। उडभी एक आपुटुचा। कोल को रखीु। अझी अच्टीक लुँझा। एक वाट्टवी। �ANK jagas अआश्टा। थो। नाँभ्वाए जीनीया गरे इती है. People with wireless .. गबनोक Wake Ding मारकूने मोँ � Justice मारकूने। मरखूहां पुक नाछेक सु then talks Jagira एक यत हे खेले लिहा ہے। नकनःत Truman 컬러 ननढिझे वोंटेन है YOUR HEAL तेरी रे क़ा हम �espace ऑे वों wedding लोगा श्खाries लें वोल्गष मदच्यद कि ज़िजाना योर गव्योग दिजाना लोगा क्या ख्लय़़्ाँम् अद्या तोछींगां तरब घली गव्योग डवात ख्रीश दे, अपने च्थेना स्वोग। ज़िजाने वेतिंट ही जानंगा हो भी शगाजाना आवलाना. Cause ct-art,Manuel capsule kering of os research Cross Multi-disciplinary area Few examples I will give you Human-bound communication beyond 2050 Human-bound communication beyond 2050 That is the first concept we have developed And each we have taken from human O we have taken from bond ర్టి与ధరి Юింీడ్టినోయాటాతోను. పర్మరఠిబాంీమటింింటింటాకియరి, आల్కల్алист�ిఘోదైగెగ న్భఽాఠడిల౉ likelihood. మరిమాటస్ం మురఖనిఉసు Shrimal 아ందౄనBeifall. सु सॐर्सन्मा candidates मुरेLaughs मैंस् मैंने five senses � particularly अ तžeमेने Div Осana मैंसे's मैंसे's मैंसे's ग़ारे Ley मैंसे's बादले सुli वताा वालतारे मैंसे's मैंसे the सहांउ कोंगाहा, तो वोगाने चरीट और ता वोगान मुढने कुछने और आदीं बादा वेद्चाल वादी्स ही खॉऽाएन वह नाँएन। य Hugeम्तेवल हिट्या. अभली य अश्वाल जान्टेनिस उनक्टात्या किनक्टे इसकटिस थिंझ आप घर्झाpeлек ज़िवका जर्ण ती प्री शिर्बाहों तुर्प blas कि नहीं , य सत्वोर बाज़'m व स्कौझभाबाि, से प्री ज़onomद, और वह सक्छ तो होँले, लएड़ क्यवादन तुछनोलेजा तुफाद तूयब ने, तुछना देर सुस्यो ऐसाछेट लबतुचे। क्यवादन और तुछना देर सक्छ तुछना तूछने ऱद्दे। कि शब तूगादा का थे लगम बनुचे शिस्फीले लिए. असे बदियाए सान्झिन कोड़े ज़ोट ओ़े नहीं प्रेश्टादा। दोंगे है, वरीस किश्सागता, आप भी शकद बहुत है ठकारि एक वो भी ठा पआजगा है. तेरेवाद, क्लाईण, निच्ट्टेआ, भी च्ट्टेवाज़े तुगटे आप छोभगा, त嗎 का lung eva pur mahak Turun ओ़ हो शाएकि Jeffrey तक प्रसिस दार कि मुननी मुअ श्आसाएक हूँ मैंग्माता थिप्रेस्टा काई संजली काई मैंग्माता से यें जी तुप टेरी और आपतार. क्यश्टी तुप क्यश्टी काई साभन और ज्यद के आप Kelli kya sabh kya ke aaple. क्यश्टी तुप देताई, भैवार को स्थायी थान बानक्वेक मेंग्वेक यें. तो भी आभ़ुत कि एक ग़ी टीट्नाग, जोड़ाश के शवाद की कीगा ग़ी च्छाईदा। जोड़ाशी बच्छाईदझा, भच्छाईच, तिद्ठिजीजीच जिभानाव्तिनाऻ कि गरेद रुद और करीचता, बदँमएत दिरी आचज, मुँँँँँँँँँँँँँँँँँँँ at the same time we are creating platform for the knowledge. अनवेक यक अद्श्वाद के लगँँँँँँँँँँँँँँँँँँ, अच्वेँँँँँँँँँँँँ, ज्छिए लगाई प्यम audiences are allowed to come, keep us alive, not more than twenty-five people. स demand after later giving records. जoft.. और है क्यझिएoons जु हिटीराँई दोस. जी वहiyim, लिकस till n homes. काई याच आद्चाश कृता основ कर Dude, जातस् Yuri's style is a change as children present in school. अदी औगा जी ati nal peepar. I have seen many important keynote speakers and invited speakers from all over the world and contributed papers. अदी औगा च्टी बगे के रहों, तुब ऐसी नहीं करतागा।। So enjoy these three days. Lot of new things you will learn and create your own network and find some time to see the beautiful city Ohus. औगा च्टी बगे रहां। Thank you very much. And hope I have not taken more time than what I promised. आँ now i invite the gynature of the conference to say a few words about dw2016 and with this i switch off. Everybody can hear me? Yes? Okay. So dear Rexxer, dear conference participants, dear iEEE, dear sponsors, dear keynote speakers, authors, reviews, sessions, and many more dear friends. आत of me tho welcome you all 2016 summit ISCE at AUHUS University AUHUS has placed in the very harder of the central Denmark region and its called the city of smiles pleasego please go by our city and enjoy your stay here in AUHUS My research team, the Embed Research Group and I have been looking forward to hosting you all and to hosting this GWES 2016 IEEE conference. We hope this will be available and inspiring conference for you. More than 33 countries, over 100 papers are presented here for these days 200 papers were applying to get in but only 100 passed the review. There were three reviewers on each paper and tonight we will award free students and free papers and we will also reward free that have done a special work for this conference. A key field in my research field multi-business model innovation technology is to explain the strategic value of technology for business. Its users, customers, employees and networks and find out how we turn technology into business. Despite many advances in our understanding of the way in which technology contributes to business model value creation and to the betterment of humans, there are still fundamental issues, challenges and opportunities to be addressed in order for us to deal with the challenge of the 21st century landscape. My research group strongly believe we have to find some of the answers in the interdisciplinary or as Ramji told the multidisciplinary collaboration between researchers, industry, students from different fields of competence and with respect and openness to our difference in not just competences but also viewpoints and backgrounds. The hidden values business technologies and potentials lays in these. We believe that the future business models and business model ecosystem will be interdisciplinary. This conference is indeed a spin out of the interdisciplinary project funded by Opus University interdisciplinary fund and we thank them very much for supporting us and giving us this opportunity. The purpose of the GWS 2006 IEEE Summit is to explore new technologies and interdisciplinary business models related to future dynamic agile value creation independent of place, things, people and time. GWS 2016 IEEE Summit addresses some of these key topics showing and pointing to a multitude of technologies business models in the 21st century. Security, human bond communication, persuasive technology, energy and climate saving together with co-creation represent just some of the topics in a world of increasing complexity and turbulence. Please have a look into the Biogas 2020 Living Lab just outside here that are aiming at creating a future knowledge home as Ramji talked about for a collaboration of Biogas and sustainable energy technologies and businesses. The GWS 2016 Global Wireless IEEE Summit at Opus University bring resources, industry, students together from different fields and countries to present debates and reflect on creative approaches to global wireless technologies and business models. Throughout the summit the betterment of man will be looked at from an interdisciplinary perspective and will involve the viewpoints of business and social science. Technology, arts and health. We thank all faculties at Opus University to support the GWS 2016 IEEE Conference. GWS 2016 Summit Conference keynote speeches, paper presentation, special session, Living Business Model Innovation Lab on sustainable energy tutorials and many more value proposition will be given to you and given to you as an unique opportunity to create, capture, deliver, receive and consume knowledge and not least meet with old and new network partners to discuss existing and new projects. On behalf of Opus University Business Development and Technology and of my research group Mbit, I will welcome all of you to Opus and to Opus University. I thank you very much for coming. Then I will give the word to our rector but just before that just for two minutes I have some practical issues I just wanted to hand over to you. So today we are gathered at the heart of Opus University the 28th of November 2016. Tomorrow we will move to another campus just down the road so the 29 will be at the full Sanctuary and the whole conference will be at that place. So if you meet here tomorrow you will only see the living lab of Biogas 2020 all the rest of the people are on the other side. On the 30 we will be back again at the knowledge home so please remember to look into this. Then don't forget to be on time at your sessions. We will be very tough we have tough chairmans and the chairmans are already put on all the sessions so they will be ready for you when you present. Then tonight we will meet at the town hall reception where we will meet the mayor and he will speak to us at 1845 we will have the gala dinner and there is a special thing we need to have you to do. So outside here there is a small cube somebody would say why I won't go into details with that but you need to have this cube with you otherwise you cannot get into the gala dinner. Then it's a little bit special also because those of you who are vegetarian they should have a yellow cube so that at the music hall they can see who would like to have the vegetarian. Then there will be the Danish television here and they will go around and interview you and ask you for business and technology for the future. So please do not be nervous about that please tell them all the nice things that you are working with and this will be gathered in a two hour program in the Danish television. So it might be a little bit hard so with these words I will invite our president to go and welcome you thank you very much brand. So thank you very much for all the challenges in e-health, sustainable energy, big data and aerospace and that is just to name a few. If such topics does not stir one's imagination and curiosity I cannot really imagine what should do so. But before we and now excuse me for using an expression from Star Trek before we beam ourselves into the future permit me to take a brief detour back in time to be more precise back to 1930. That year the petroleum lamp had been replaced by electrical lightning, the first household appliances such as the vacuum cleaner, the washing machine were beginning to be put in use in many homes and the radio had established itself as the first ever electronic mass media. In that year 1930 the English economist John Maynard Keynes set down and wrote a letter to his at that time fictive grandchildren. In the letter he predicted that in 100 years from now was then of course 1930 but in 100 years from that time they would have to work only 15 hours a week due to the automatization of the production. This would according to Keynes eventually release workers from economic bondage, in fact some would not have to work at all. The greatest challenge he predicted would be what to do with all that spare time. Now here we are 86 years later and at least parts of Keynes visions seems to have become reality. We are as Keynes rightly predicted living in a time where automatization and technology indeed affects our society to the extent that one may seriously wonder what we actually may end up doing in the future if anything. But what Keynes articulated as a theoretical dream scenario has for a substantial part of the population become a realistic nightmare. Let me substantiate this by statements, let me substantiate this statement by putting forward another set of more contemporary predictions. Scientists from Oxford claim that in the next 10 to 20 years every other job is expected to be replaced by robots or another advanced technology. Statement number 2 coming from the US Department of Labor 65% of the jobs in the future do not even exist at present times. If we do nothing we will not just look forward to more spare time many of us may end up in the queue of unemployed without data competencies. Advances in technology put our labor markets and businesses under serious pressure and it pushes the boundaries of the markets for goods and services. From that logic arises the need for rethinking services, products and work functions. The best way to predict the future is to create it said LMK as chief scientist at Atari back in 1982 and I can only agree. So this puts quite a responsibility on your shoulders, you the audience here. We all have to ensure that the next three days become more than just informal chats about technology and just a lot of good intentions, we need to go beyond that. We need strong committed partnership that last and bridges the academic disciplines, industries and public and the private sector. Now being a rather large educational and research institution, Aarhus University is committed to play its part in this process. Hence we invite you all to collaborate with our leading researchers and our talented students. We host one of Denmark's largest IT and innovation communities at Kintrini Bia just one kilometer away from this place. Our researchers are focusing on new interesting projects within big data, cyber security and smart industrial products. At our department in Herning, a research group named multi-business model innovation and technology headed by professor Lindgren is developing new technologies for both healthcare, elderly care and food technology. A close collaboration with researchers from around the world. Unlike John Maynard Keynes, I will abstain from coming with detailed predictions about the future. However what I do know about the future is we have work to do. And the other thing I know about the future or what I know about humankind is that the will to will is superior to the ability of being able to. So standing here and looking at all the talented people gathered in this room, I think there is reason to be both hopeful and confident that we are well prepared for the future. Before I end my address I would like to note that nothing comes out of nothing. It requires hard and dedicated work to organize an event of this magnitude. So allow me to thank and sincerely congratulate our professors at the department of business development and technology. Peter Lindgren and Ramji Prasad and associate professor Anabit Oghor who together with their team have put a tremendous effort into organizing this year's summit. I do think that a nice round hand of applause will be in order so please follow me. Thank you all and thank you very much yet again a very warm and heartfelt welcome to Aarhus University. I wish you all a productive and fruitful summit and I thank you all for your attention. I would like to introduce the first keynote speaker for this conference. It's Anand Prasad from NEC Japan. Anand Prasad has come from Delphi University of Technology in Netherlands. His fellow of IETE is Chief Advanced Technologist, Executive Specialist at NEC Corporation Japan where he leads the mobile communication security activity. Anand is the chairman of Free GPP SA3 and Gispy Security and Privacy Group. He has 20 years of experience in all aspects of mobile network industry in companies around the globe. Anand has published six books, authors 50 plus peer review papers and is a passionate speaker in security. Globcom MWC RSA. He is Editor-in-Chief of the Journal of ICT Standardization published by River Publisher. He has received of the 2014 ITU-AJ Encouragement Award ICT Accomplishment Field and the 2012 ISC Asia Pacific Information Security Leadership Team and ISLA Award as a senior information security professional. I know Anand very well from many conference so I welcome you very much Anand and I hope you will take the floor and do as was said in the CV. Okay, thank you very much. Hello everyone. Am I audible? Yes, I think so. Let me see. My slides should be somewhere here. Alright, good morning everyone and thank you for being here. As Peter introduced, I am Anand and I am working at NEC and it's a great pleasure to see many known faces in the crowd here and many respectable faces here. First I would like to thank the organizers for inviting me as a keynote speaker of this prestigious conference. My talk today is on 5G IoT security. So I would like to first explain this and then go into the presentation. On purpose I am not calling it 5G or IoT or else and IoT. I think that the world is moving towards digitization. You all will say the same thing and with this digitization it means that everything will get connected and everything is getting connected. That's the case I will build in this keynote and I hope you will agree with me as we move ahead and therefore I call it 5G IoT. 5G will be IoT. IoT is a key ingredient of 5G. It's a core of 5G. That's how I think. And then security, you need to provision security to it. So security is a very nice term. We have heard about the capsule and security will take care, will be the capsule, the solution for security issues will be the capsule probably. We have heard about multidisciplinary and there again security becomes extremely important and if you have seen the recent movie where Pierce Brosnan IT, you understand the security issues there as well which is quite realistic actually when you see that movie which shows about security issues but it's all about issues and you need to resolve those issues. What do you do for that? In your computer you have antivirus or you have some firewall in the network, things like that. These are different ways to resolving your issues but that's not the only thing about security. Security has two other points. One thing that I will also try to show you about it is that security brings new business it's not just to protect your stuff. You can create new business from security. At the same time, security is the core of mobile communications business. What is the business of mobile communication? Probably we should see that first. So like any other business, you need to earn money. You get money from the customer and that's the whole business. You have to put the whole thing in very simple terms. You get money from your customer. Good. How do you get the money from your customer? The customer uses services from you. So you charge the customer for the services used. Good. But how do you know that the customer is the customer and that he has used the service or she has used the service? Well, for that you have to identify the customer and to identify the customer you need to do authentication. Without this authentication in mobile communication network you cannot charge any user anything. Yeah. And that is actually the heart of security and that heart of security is a nucleus of mobile communications business. I really want you to understand that security doesn't mean just firewall or network devices that protect your network. Yeah. So let's move ahead with that case made a bit and with the things that I expected you to hear from me. And I should watch about time as well. You will take care of that. All right. Next slide is about my company NEC orchestrating a brighter world. Yeah. Let's move ahead. The table of contents. I'll talk about three main points. I will give you a background of 3GPP and the activity is happening there. As you know the third generation partnership project is the one that is developing 5G specifications and I'll come to that a bit. And then I'll go into 5G IoT. I'll take more of IoT look, ITU look on that and then after that I'll go 5G IoT and security that's a bit where I will present my own opinion about the whole 5G IoT and security concepts. And then I'll spend a bit more time. Let's see on the 3GPP aspect. 3GPP is a group where I think most of you know about it but roughly I want to cover these three groups here. There's an essay systems aspect related. It's in the middle of the three I had shown. The radio access network, the radio part, the CT, the terminals and the other protocol details. Inside the SA part, SA you see a working group called SA Working Group 3. This is a security working group which I chair. And the security activity happening here is not just for the whole of SA part. We do security work. We do security for the whole of 3GPP system. Any new system, any issues happening, we take care of that. So that means RAN related security issues. It is an essay system related, architecture related security aspects or the protocol aspects. Everything comes here in this group. And just one sentence about what we do as 3GPP, the people in there from different companies and different industries as well as from different governments, regulators. We make specifications. We don't make standards. We make specifications that's taken by standards bodies of different parts of the world and then it becomes standards of those countries. And that's given as HCE, TTCRI, things like that. All right. With that background, let's move ahead with from 4G towards 5G and the past as well. You have seen about the past going from different data rates. There is a chart here. I've been using it for quite some while so at some point it is stopping. That's when I last made it. But anyhow it gives a good picture about how the data rates increased with time. That's how the technology and generations came up and the different releases of 3GPP standards that was developed. Now what happened is that when we moved to 4G we moved completely away from circuit switch. We had circuit switch. We went to circuit switch and then we moved to 4G that's a marketing term SAELTE more of we moved to completely packet switched. All right. So that's where we are and then from now on we are moving towards 5G and that's what we are calling release 14 onwards. A rough timeline is something like that timeline always changes with time the contents of the timeline also changes as we become more concrete we are now in release 14 where we are doing a study about 5G in 3GPP and that's going to end in June 2017 release 15 is when we start with the initial specifications the phase 1 is expected to end by September 18 and release 16 by March 2020 that's a phase 2 the details of phases and the contents of each phases there is some agreements at least the first phase for security group the SA3 we will have our discussion in the week of 12th of December to decide about what we will have in phase 1 and what are the priorities to be resolved I will not cover those points here but if you want I can discuss with you later on individually as well So now coming to from 4G to 5G a few points here it's not that we are making a jump 4G by itself was a big jump we went to higher data rate we went to packet switch solutions but besides that what we did in 4G is the first one you are seeing IOPS actually what we said is that the network can work without the core network that's something totally new after that we developed mission critical solutions we are doing public safety stuff but complete mission critical solution and covering the application part as well was a completely new thing for mobile communication standards we were saying application is separate we would support services but not provide applications and then we moved further on we said that hey you can do aggregation yes in wideband CDMA with software handover and stuff you do connect to multiple base station but what we did here is that you can connect to multiple base station at the same time and with one leg in the back hall or multiple legs in the back hall at the same time for the given device what it does is that it provides bandwidth on the front on the air interface side or bandwidth on the back depending on the need of the operator and of course in security people we provide them security for it to work properly but not only that we also developed solution so that Wi-Fi and LTE unlicensed and licensed band could be aggregated together and then we developed a communication proximity based services is what we call a calling standards term but device to device communication in the licensed band you can have two devices directly communicating to each other and that too it can happen when they are out of coverage we developed those specifications already in our 3GPP activity related to 4G mind you we have a total transformation of how the mobile communication system looks like and now what we are doing as well is developing a V2X vehicle to everything solution and here of course you come to each of them as you are seeing have very different requirements and have very different security implications I will touch them as well later in one place to explain those points but V2X again is a very big issue resource time also becomes extremely important resource for security and for your communication purposes not only the CPU and memory so the take is that we have 4G already it has gone far beyond any kind of mobile standards that we had seen till today and therefore 5G starts from there it has to take this as a base architecture to move ahead it doesn't make sense to throw out everything that's already done and start from scratch okay so that's how I think 5G start it will be much more than data rates and that's where the IoT and different kind of services falls in into 5G from the starting point itself so 5G IoT from ITU perspective I have couple of slides here you might have seen this triangle actually you have on the top very high data rates so of course you are going to you get a high data rate you might see in the left side where you have IoT devices actually and related devices which require high reliability and on the right side you have massive you have lots of IoT devices that can live with lower data rates they can live with higher delays that's a rough triangle that's drawn and if you go further I am not going to get into all the details of this you can also download the ITU document from the web but just touching a few key points which will take me to the next step of my presentation is that what you observe here is as well let's see higher data rates you are going to compare to IMT Advanced you are going to much higher data rates what you are also seeing on the bottom here is the latency aspects you are going to one millisecond you never know going to touching towards nanoseconds at some point to very high data rate very low latency and very high speed of mobility as well sorry I am going ahead with my presentation very high mobility of 500 km per hour not second which actually if you look the use cases in a different way brings you to this chart as well let me skip this chart let's move ahead with the 5G IoT and security aspect which is the main part of this presentation today so if I put the picture of mobile communication network like this which I am pretty sure agree with me then let's see what are the changes happening and expected to happen in different parts of the system this is something that will not happen tomorrow but it is progressively happening if you look at the business part there is open APIs being provided by operators so if you want to provision wise over IP services over the operator network you can do that through some of the operators who provide the API for that for example you have different kind of services over operators of course the world garden concept has long gone but then you are getting much more new things like sponsored data you have the public safety as well coming into this mobile networks operated by mobile operators instead of government agencies the end devices you are getting a variety of end devices you can see your smart phones and the different kind of OSs but also I think I will touch next but it is an open source and also IoT devices as well and then the credential part that I had told you let's go a bit deeper here you authenticate the user to authenticate the user as well as the network you need some kind of security credential and that is also seeing some changes if you go on further the spectrum variety of spectrum coming into picture radio access technology there is enhancement happening and the core network which is also touching the radio access network is going more and more open source and off the self you are seeing virtualization and radio as well coming and the user space is expanding the number of users and the type of user globally are increasing and if you see specific changes from 5G perspective is that in the business aspect more and more partners are coming you were talking about multi business aspect and that is very much true today you cannot talk about business that one company does it all you do need partners to do any kind of business it doesn't make sense to develop all the technologies by yourself it is far too wide in the mobile communication space as well for the operators perspective as we move ahead towards 5G more and more partners will come in pictures alright and then services IoT type we talked about car car can be a kind of IoT but at the same time your bicycle can have sensors in it it can also have IoT devices a soap dispenser can have sensors in it and give the information to the back somewhere to the service provider of soap dispensers and that is also IoT services and then end devices we have all our smart phones and they will be getting better and better but at the same time you will have end devices like I talked about the bicycle or a dog scholar for example they will also have your mobile devices in them and these devices will be very small requiring very long battery life and have very less resources in terms of CPU and memory and then the credentials itself the security credentials that if you go down further will change different kind of credentials will come in picture if you look at the partners there then these partners will have their own way of authentication or security and thus requiring different credentials the user space it will go very deep there will be first time ICT users who will know nothing about communication or security but there will be millennials and millennials I don't define as maybe others define but as people who are more aware of ICT will be there knowing about security understanding about privacy implications as well and then the spectrum side if you move ahead you are going into 30 GHz range which means that you stay basically inside one room and then you will have cognitive radio aspect you have primary and secondary users and in terms of network you have slicing and stuff like that so what are the security implications of all these let's look at the slicing part in the core network if you provide slicing and this will touch the whole picture that I have drawn here what you will do is that there will be a third party or the operator itself providing a slice a slice being that a network is being created potentially for a given service or for a given business purposes so this will have its own security requirements alright so if there is a car manufacturer wants to have its own slice for update of firmware then there is a slice created for that the car manufacturer is a service provider here and this service provider with its car in there will be connecting to a given slice of the network now for that to do the firmware update you need very high level of security you have very strong security requirements any kind of issue that happens will lead to the car to stop or getting hacked or getting into an accident in that case the network itself you will have higher security requirements and the security for the communication also you will have much higher so you will have strong authentication going on over there you will have proper key management and cryptographic algorithms going on over there you will provide confidentiality and integrity for sure but if you look at a case where you in the car itself if we talk you just want to provide multimedia services that might be coming out from a multimedia content provider for example in that case you want to take care that the multimedia the content itself is not distributed to others there is a different kind of security requirement here you might be okay with providing confidentiality maybe you don't need integrity but you want to provide multi-cast services and provision security for this multi-cast service and the keys for this multi-cast for two different users so there are different variations that will come in now if you look at the partners part what you see is that the partner will have to connect to the mobile operator so you need the authentication of the partner itself and then the users of the partner now the partner that the example we often say is a factory and the factory has its own system which has its own authentication mechanism now the users of this partner needs to be authenticated by the factory or would it be by the mobile network itself alright and within that for all the users you will have to give different keys for different users and purposes if you look at the virtualization part what happens here is that the mobile device that is hardware based today becomes virtual each virtual network device now has to cater for each user's security and contains all the security credentials of the user now you are making it virtual instead of storing it in hardware you are storing it in software this can create attacks when you go to cloud this virtual device can move from one hardware to other hardware and just think of the security implications that this can bring as well now if you look at the radio access part you can have very high data rate what does high data rate means in different sense if you want to see you want to decrease the delay for the traffic to get into the air you have to do very good processing on the device which doesn't mean only that you have better CPUs and faster memory accesses but you need better algorithms as well which are fast in nature you want to decrease the number of to and fro communication going on over the air over the whole communication system itself so you have to optimize over the air as well you might want to decrease the number of bits that goes on the air itself now let us look this is the high data rate side let us look at the low data rate side what happens now is the IoT devices like the dogs call or the cycle which you want a 10 years battery life you can actually only send a few bits per day in the air and still you want to provision same level of security that can be quite difficult you have to take the algorithms now are sensitive to energy as well and then they are sensitive to the resources of that low level as well and still provision security with a few bits only over the air there is a whole range of requirements coming here and then you talk about high mobility and still provisioning security it can bring its own requirement as well if you go back to the few bits per day kind of low end IoT devices you are talking about today you are providing integrity in every signaling channel of 32 bits for those few bits if you are sending just 64 bits a day and you put half of that on integrity that will kill the system now if you look at all these things the network will have to provision some level of security even if you have your mobile devices which have super CPUs in them and provision security by itself the network will have to take care that future attacks are prevented any kind of cyber attacks it keeps on coming IoT devices with very low security possibility also the network will have to provision security solutions for that and of course for the user space as well for the first time user so if you look at a list of whole thing couple of things that I did not mention you will come up with a new kind of identity you will have the authentication you will have the confidentiality you will have the integrity you will have the key management you will have the storage aspect I am sorry I didn't have so much of the storage but what will happen is that depending actually storage and credentials both of them let's look at it a bit because that's a very interesting part of the whole game over here when we move towards future you do authentication and I told you that then you store the key required for that in some storage alright and in our 3GPP system we do a specific kind of authentication we call aka and you have the key k for that that's stored there in a hardware that's called your UICC what happens if you move ahead and start storing it differently yeah what happens if you start storing in a software because you have very cheap IoT devices where you have the ARPU say a few cents a month and the device itself is few cents and if you put a hardware in there which costs a dollar or two the business model does not make sense yeah so how do you do in that case so there's quite a big issue over there and then will you provide the same kind of authentication as before or will you change it there are quite a few issues in there I am being said that I am running out of time alright let's touch that mobility aspect as well what happens when you are moving you have to take care of changing of change of keys all the time for each purpose you should have different key and you should be able to change that keys regularly now if you are moving you have to change the keys regularly as well and what the interesting part here is that if you get attacked at a given moment you should take care that you cannot be attacked in the past and you cannot be attacked in the future which means if an attacker is kind of recording your traffic on the past by knowing the key at a given moment should not be able to crack the things in the past that he has told or in the future so you provision forward and backward security at the same time there are couple of other things that I am talking here about that I didn't touch in previous slide assurance and you have life cycle security and then you should provide monitoring and it is mobile communication system so you do need lawful interception without that in many countries you cannot actually use the services let me still touch a few things before I end it one point let me skip this just say quickly one point I talk very often is network guardian where you can do from auditing all the way to testing monitoring and after that forensics that will be required by any operator any services as we move ahead even today and the other point where I say that people can make money out of security is secure network as a service here what I am showing is that there is a service provider here see over here for the car and there is a network created a slice created for the car itself which will provision specific services this is a whole mobile network the yellow one and this green one provides specific services for that given car use it so be it a multimedia be it a firmware update purpose which are different or be it a rental and inside the network then you will have to provision monitoring analysis and control and the monitoring the analysis you have different parts and in that also comes machine learning but I think we have to go beyond that as we move ahead in time and then inside the network itself you will have to provision dynamic policies as things changes you have to control depending on situation so I think we can discuss probably separately because I am running out of time one more minute to me the secure network as a service is a big change in our mobile communication business that is my honest thinking the whole value chain will have impact and security from now on can truly become a business and as a last bit three points three big points inside that smaller one take care of baseline security always take care of operating system security password and the protocol security at least a new security things will come in like virtualization cloud aspects, algorithms and the protocols itself optimization of them and many other things like authentication, key management that we are already working on and at the end do remember that security is not just the word security you used as firewall or antivirus it's far more than that security is the business driver with that thank you very much thank you very much Anand maybe I can allow for one question so nobody I hope everybody will go and have a talk with Anand in the coffee break so thank you very much Anand thank you all