5G Wireless Networks MARKET PENETRATION AND RISK FACTORS

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

TLP: WHITE

Cybersecurity and Infrastructure Security Agency


July 2019

5G Wireless Networks 5G is the next generation of wireless networks, building upon existing 4G Long-Term Evolution (LTE) infrastructure and improving the bandwidth, capacity, and reliability
of wireless broadband services. It is intended to meet increasing data and communication requirements, including capacity for tens of billions of connected devices that

MARKET PENETRATION will make up the Internet of Things (IoT), ultra-low latency required for critical near-real time communications, and faster speeds to support emerging technologies. 5G is
expected to bring security improvements and a better user experience, but supply chain, deployment, network security, and competition and choice vulnerabilities may
AND RISK FACTORS affect the security and resilience of 5G networks.

Select Mobile Network MAJOR COMPONENTS OF 5G NETWORKING


Equipment Components Market Leaders User Equipment Radio Access Network (RAN) Core Network

Data Converter Chip Field Programmable


ADC
Gate Arrays (FPGA)
Market Leaders (2017)1
Market Leaders (2017)1
1. US Texas Instruments
2. US Analog Devices 1. US Intel
Mobile
2. US Xilinx
Mobile Backhaul/Transport
Small Cell Fronthaul Network

Ethernet Switch Chips Network Processor


Market Leaders (2015)1 Market Leaders (2016)1
1. US Broadcom 1. US Intel Macro
2. US Broadcom Towers
Baseband Core Network
3. CH HiSilicon Radio Units Unit Pool Infrastructure
4. US Qualcomm
5. US Texas Instruments
Devices such as smart phones, computers, and Industrial Control RANs connect wireless or satellite subscriber devices to The core network is the backbone of the U.S. communications
Server Small Cell Systems (ICS) generate data that is then transmitted to a base terrestrial telecommunication networks. Compromised systems infrastructure that routes and transports data and connects the
Market Leaders (2Q18)1 Antenna Array station, small cell, satellite, or Internet Exchange Points (IXP). may intercept or disrupt data flow and phone calls. different parts of the access network. Compromised core devices
1. US Dell Market Leaders (2017)1 Compromised devices may collect user data and impact local may be used to disrupt data and services on a large scale, and
2. US HPE networks and systems, but are unlikely to impact the larger impact customers who are interconnected by the access network.
1. EU Alpha Wireless
3. US IBM 2. EU Ericsson communications network.
4. CH Lenovo 3. US Galtronics
5. CH Inspur Industrial IoT Hardware Smartphone RAN Equipment Evolved Packet Core (LTE) Service Provider Router
Market Leaders (2Q18) 1
Market Leaders (2Q18) 1 Market Leaders (1Q18)1 Market Leaders (1Q18) 1 and Ethernet Switch
Small Cell 1. US Cisco 1. SK Samsung 1. CH Huawei Top four vendors Top two Market Leaders (1Q18)1
Small Cell Chipset 1. EU Ericsson
2. CH Huawei 2. CH Huawei 2. EU Ericsson account for over 90% vendors Top four
Market Leaders (2017)1 Power Amplifier 2. CH Huawei 1. US Cisco
3. EU Ericsson 3. US Apple 3. EU Nokia of the market. account for vendors
Market Leaders (2017) 1 2. CH Huawei
1. US Qualcomm 4. EU TE Connectivity 4. CH Xiaomi 4. CH ZTE 3. EU Nokia over 60% of account for
1. US Texas Instruments 3. EU Nokia over 90% of
2. US Intel 5. US Qualcomm 5. CH OPPO 5. SK Samsung 4. US Cisco the market.
2. EU NXP 4. US Juniper the market.
3. CH HiSilicon 5. CH ZTE
4. EU NXP Semiconductor US: United States CH: Chinese EU: European SK: South Korea
Semiconductor 3. US Qorvo
5. EU Ericsson 4. US Broadcom Points of Vulnerability in the 5G Network
6. US Cavium 5. US Anadigics
SUPPLY CHAIN DEPLOYMENT NETWORK SECURITY LOSS OF COMPETITION AND CHOICE
US: United States CH: Chinese EU: European ISSUE: The 5G supply chain is susceptible to ISSUE: 5G will utilize more information and ISSUE: 5G builds upon previous generations ISSUE: Despite the development of standards designed to
the malicious or inadvertent introduction communication technology (ICT) components of wireless networks and will initially be encourage interoperability, some companies (including
Market data is based on 4G LTE market share. Additionally, the network of vulnerabilities such as malicious software than previous generations of wireless networks, integrated with 4G LTE networks that contain Huawei) build proprietary interfaces into their technologies.
architecture and corresponding vendors are intended to be high level. Further and hardware; counterfeit components; and and municipalities, companies, and organizations some legacy vulnerabilities. Additionally, it This limits customers’ abilities to use other equipment, either
granularity would result in a broader list of primary vendors, including additional poor designs, manufacturing processes, and may build their own local 5G networks, potentially is unknown what new vulnerabilities will be in addition to or in replacement of Huawei technology.
American-based vendors.
maintenance procedures. increasing the attack surface for malicious actors. discovered in 5G networks.
IMPACT: Customers who are locked into one technology
The Cybersecurity and Infrastructure Security Agency (CISA)/National Risk IMPACT: 5G hardware, software, and services IMPACT: Despite security enhancements IMPACT: Some legacy vulnerabilities, or service provider may have to choose between
Management Center (NRMC) is the planning, analysis, and collaboration center
working in close coordination with the critical infrastructure community to Identify;
provided by untrusted entities could increase compared to previous generations of wireless whether accidental or maliciously inserted by continuing to use an untrusted supplier or removing
Analyze; Prioritize; and Manage the most strategic risks to National Critical Functions. the risk of network asset compromise and affect network equipment and services, 5G networks untrusted suppliers, may affect 5G equipment and replacing existing equipment; which may be both
These are the functions of government and the private sector so vital to the United data confidentiality, integrity, and availability. will need to be properly configured and and networks no matter how much additional expensive and time consuming. Lack of interoperability
States that their disruption, corruption, or dysfunction would have a debilitating Even if U.S. networks are secure, U.S. data implemented for those enhancements to be security is built in. may also make it difficult for trusted companies to
impact on security, national economic security, national public health or safety, or
any combination thereof. All NRMC products are visible to authorized users at
that travels overseas through untrusted effective. Improperly deployed, configured, or compete, potentially limiting their ability to invest in R&D
HSIN-CI and Intelink. telecommunications networks is potentially at managed 5G equipment and networks may be and eventually driving them out of the market.
risk of theft, manipulation, and destruction. vulnerable to disruption and manipulation.
For more information, contact NRMC@hq.dhs.gov
or visit https://www.dhs.gov/cisa/national-risk-management-center. 1
Lewis, James. 2018. “How Will 5G Shape Innovation and Security: A Primer.” Center for Strategic & International Studies. https://csis-prod.s3.amazonaws.com/s3fs-public/publication/181206_Lewis_5GPrimer_WEB.pdf. Accessed May 2019.

TLP: WHITE Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.

You might also like