Mobile networks play a critical role in our interconnected world, enabling seamless communication, data exchange and access to a wide range of services. One of the most important considerations in the area of mobile networks is security, given the increasing reliance on these networks for various aspects of our daily lives. As mobile devices become more integral to our personal and professional activities, the protection of sensitive information and the prevention of unauthorised access have become paramount. Establishing a dedicated forum where professionals from across industry, academia and government can come together to discuss the current state of mobile network security is critical to addressing emerging threats and vulnerabilities. This collaborative platform facilitates the exchange of insights, research findings and best practices, fostering a collective effort to improve the robustness of mobile network security. FUSE5G aims to foster a collaborative mobile network security community in Europe by providing a dedicated platform for researchers and industry professionals to share insights, discuss emerging threats, and collectively enhance the security measures of 5G networks.
The FUSE5G initiative will be kickstarted with a community event in The Netherlands on Friday January 19th 2024. Presenters from industry and academia will share a varied perspective on developments in mobile network security. The program is outlined below and includes ample opportunity to network with fellow security professionals. Participation is free of charge but we kindly request that you register upfront in view of limited capacity.
10:00 | Opening | |
---|---|---|
10:10 | Keynote: Silke Holtmanns, PWC Finland | |
Security Challenges for our 5G Connected Society5G is no longer used to connect only consumers, but the focus is on supporting businesses and critical infrastructure. 5G is different then the previous generations in terms of architecture. Virtualization, IoT devices and Internet technologies made a big mark on 5G. This has consequences in terms of security and how vulnerable we are as a society depending on 5G. New security challenges appear through political tensions e.g., attacks on telecommunication infrastructure in Ukraine, usage of 5G for highly critical purposes like military or through new technologies like combining 5G and satellite communication. Security for mobile network is an evolution, we will outline steps in this evolution that may help to keep us all safe. Slides |
||
11:00 | Coffee Break and Poster Session | |
11:30 | Talk 1: Adrian Dabrowski, CISPA | |
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy ResearchThe distinct services and the ability to form large complex compounds for roaming purposes make mobile networks an attractive research target in their own right. Their promise of providing a consistent service with comparable privacy and security across roaming partners falls apart at close inspection. Thus, there is a need for controlled testbeds and measurement tools for cellular access networks doing justice to the technology’s unique structure and global scope. Slides |
||
12:00 | Talk 2: Daan Planqué, Ericsson | |
OpenRAN Security in 2024In the beginning of 2022, the German BSI as well as the European commission presented separate analyses on the security of the OpenRAN standard. The result wasn’t great as many basic information security basics were barely or not present in the respective security standards. At that time, I was working as a security advisor at KPN in their CISO team and spoke publicly about these issues, now I’ve moved over to the security team of the vendor who is the co-chair of the OpenRAN working group. A fitting time to look at what has changed in the security specification since then. |
||
12:30 | Lunch Break | |
13:30 | Talk 3: David Rupprecht: Security Testing in 5G | |
Challenges and Solutions in 5G CertificationThrough a European act, commercial 5G networks must certify the security of their network components. However, in the current situation, the existing certification schemes are complex and complicated to apply. This makes it difficult to use them in a broader scope to eventually secure our communication infrastructures. In this talk I address the existing challenges of an operationalization of 5G security certification and describe possible solutions. Slides |
||
14:00 | Talk 4: Thomas Attema, TNO | |
Confidential Computing and Post-Quantum Cryptography for 6GThe Horizon Europe project CONFIDENTIAL6G develops (post-quantum) cryptographic solutions to enhance the privacy and confidentiality guarantees in 6G communication infrastructures. The project analyzes the quantum vulnerabilities of 5G networks and aims to develop a transition strategy towards post-quantum security. Additionally, to facilitate the use of sensitive and confidential information, the project works on the deployment of privacy-enhancing technologies (PETs) such as multi-party computation (MPC), homomorphic encryption (HE), and federated learning (FL). This presentation will provide a general overview of the CONFIDENTIAL6G project, with a focus on TNO’s contribution. Slides |
||
14:30 | Coffee Break and Poster Session | |
15:00 | Panel | |
A panel of experts will discuss current topics in the context of 5G security and the potential of further community collaboration. | ||
16:00 | Drinks |
Frank is a senior scientist in the cyber security technologies department at TNO. He is involved in national and EU research projects on automation of SOC & CSIRT operations, and in consultancy on a.o. security of mobile networks.
Richard is a senior consultant in cyber security technologies at TNO. His role in the telco industry involves strategic (CISO oriented) advisory work and the coordination of TNO’s annual telco security benchmark. He also co-chairs the European Telecommunications ISAC.
Katharina is an assistant professor at Radboud University in Nijmegen. Her research focuses on mobile network security and privacy, where she pointed out different flaws in our deployed mobile generations. She is a co-founder of Radix Security.
Erik Poll is associate professor in at Radboud University in Nijmegen. His research focuses on software security but also includes applied research into variety of applications such as smartcards, payment systems and smart grids.
Lenny is an event manager within TNO. In addition to organizing large, complex events, she also coordinates processes within TNO projects. Her work focuses mainly on internal as external communication.
FUSE5G is an initiative of TNO and Radboud University, all based in The Netherlands and all involved in mobile network security from an independent research and advisory perspective. We are proud to be sponsored by the INTERSCT partnership of the Dutch research council and Radix Security.