Loading...

06 Dec 2025 04:32

Mobile & Digital

Nokia extends commitment to network security for the 5G world

Launches DFSEC 2.0: an enhanced security program to address the critical security needs of 5G wide area networks

Opens “Future X Security” Laboratory (FXSec): a new security end-to-end testing and verification lab at Nokia Bell Labs headquarters in Murray Hill, New Jersey 

Initiatives will seek to address the critical security needs of the end-to-end mission-critical networks that will define the 5G era

Espoo, Finland – Nokia today announces a significant extension of its long-held commitment to the highest standards in network security, unveiling an enhanced security program and establishing an advanced security testing and verification laboratory: both designed to address the critical security needs of 5G end-to-end (E2E) networks.

Nokia has a long-standing commitment to creating secure products via its comprehensive, industry-leading Design For Security (DFSEC) process. DFSEC ensures that security is designed into every product from the start, undergoing rigorous security testing prior to commercial release. Launched today, a new program – DFSEC 2.0 – will build on this leadership in security development by focusing on additional verification work in the areas of E2E identity management, network slicing and SDN security, virtualization, and OAM, including patch management.

To support collaborative research and development across the DFSEC 2.0 program, Nokia is opening the “Future X Security” (FXSec) Lab. Built as an extension of Nokia’s Future X network lab in Nokia Bell Labs in Murray Hill, this lab will be open to communications service providers and industries to facilitate joint testing and verification of industrial automation solutions in private local area networks (LANs) and across public wide area networks (WANs).

Marcus Weldon, Corporate Chief Technology Officer and President of Nokia Bell Labs, says: “End-to-end 5G networks will fundamentally transform societies by providing ultra-high-speed wireless connectivity allowing massive, low latency ultra-reliable streaming data that will drive intelligent automation for a wide array of infrastructure, industries and enterprises. But with great opportunity comes significant security risk that must be addressed end-to-end, using an array of novel techniques and technologies. As the most trusted end-to-end solution provider in the 5G era, Nokia is taking a leadership position in defining and building advanced security solutions that will meet mission-critical needs, leveraging the deep and extensive security research and disruptive innovations from Nokia Bell Labs.

Defining 5G security standards for the future

The E2E 5G networks that will define this new era are a significant advance from the closed systems and technologies in previous generations. Software Defined Networking (SDN) with distributed cloud infrastructure and augmented intelligent control systems will allow networks to scale in the 5G era, powering the next billion connected things, systems, machines and people.

However, open interfaces and commonly available technology also introduce new networking infrastructure security challenges, as does the addition of billons of unverified devices that will be used to sense and control the physical world.  Therefore, a new approach is warranted that goes beyond today’s security for ‘best effort’ networks, to enable security for E2E mission-critical networks.

Nokia’s 7 key research areas for secure design

In building the new security approach for LAN and WAN, Nokia will be incorporating advanced research from Nokia Bell Labs to create Network Slicing Security Solutions that will ensure security and trustworthiness of the end-to-end network slices – the critical connectivity and service fabric for industrial applications in the 5G era. These security solutions are based on 7 key research areas:

“Accountable Security” that provides failproof identification of industrial IoT devices in mobile and dynamic environments

“Physical and Virtual Device Integrity Protection” that provides scalable device attestation (hardware, firmware and software) across the supply chain

Artificial Intelligence enabled “Threat Detection and Mitigation for Network Slices”

“Fine-grained Security Policy Management” which dynamically tailors network slice elements to meet specified security requirements

“Dynamic data protection” which addresses the issue of data isolation across mobile devices, applications and slices

“Microservice Behavioral Fingerprinting” that is a unique machine learning based anomalous behavior detection of third party and open-source 5G services

Paradigm shift in design for security that provides run-time mitigation of potential security concerns with rapid feedback into development cycle using DevSecOps models

The next generation “Future X Security” for end-to-end mission critical networks will leverage Nokia Bell Labs long-standing leadership in researching and standardizing security solutions. Nokia Bell Labs has the leading patent filings in key areas of security of 5G and E2E networks – including aspects of multi-tenancy, slicing, and industrial IoT – and for trust and patch management, remote attestation, security management and orchestration. Beyond patents, Nokia has taken an active leadership role in supporting the development of key industry standards by working with 3GPP and ETSI. 

NULL
(Visited 14 times, 1 visits today)
peri hokiperihokiduta76dsiledAt-Taujih; Jurnal Bimbingan Konseling Islamabc1131 slot viralScatter Hitamslot gacor qrisslot thailandabc1131duta 76slot qris danaabc1131 slot777 lundbergdesign.comABC1131mpo slotslot gacorMPO SLOTcleaning service bug volatility starlight baccarat abc1131 emosiburuh pelabuhan rumus free spin gates roulette abc1131 tamaktaktik main mahjong wild 2 sicbo di duta76 peluang gampang menang terbuka dengan lebarstrategi langsung jackpot scatter di mahjong ways 2 pgsoft baccarat duta76 emang gilaalgoritma paling viral panduan mudah bermain mahjong wins 3 blackjack dari duta76petualangan game paling gila di mahjong wild deluxe sicbo auto cuan besar perihokikekuatan wild mahjong ways 2 pgsoft baccarat jam gacor perihoki rtp live gampang maxwinpengalaman paling profit dari mahjong wins 3 blackjack dari perihoki tanpa pakai auto spins algoritma misterius mw2s analisis ritme reel tekniks formula menang mahjong ways 2 modals guide terbaru mw 2s menafsir gerak reels mahjong wayss menggubah kejutan mega win mahjong wayss panduan rahasia pola mahjong ways 2 modals pengurai pola scatter cara menentukans pulse reader mahjong ways 2 hitungs rahasia pola gacor mahjong ways 2 dibocorkans rumus panas teknologi ais saat alur mahjong ways berpadu dengan zenbaca rtp mahjong pemulaspam spin pak jono mahjongstrategi toni mahjong profitlangkah cerdas panji scattertaktik spam spin soniteknik baca rtp aguskejar kesempatan strategi memancing wild emas pengganda tinggi di mahjong wins3menangkan tanpa rungkad panduan anti rungkad menguasai pola tarikan liar game dan analisis cepat rtp game pgsoftobsesi animasi mahjong ways yang ubah hidup menjadi developer andalrahasia ritme stabil pattern manja baccarat casino yang mengubah cara bermainraih kemenangan maksimal dengan strategi auto gacor rahasia setting pola mudah yang terbukti ampuhdata analyst bongkar rahasia probabilitas cerdas di mahjong ways 2 strategi unggul di 2025data rtp pragmatic play rahasia zona stabil yang mengungkap kemenanganledakan inovasi pragmatic play saksikan tren utama yang menggemparkan industrirevolusi strategi mahjong pgsoft berhasil atasi deadspin pada mode regulerterungkap rahasia cara membaca pola wild dan multiplier lucky neko untuk permainan lebih terarahgelombang tipis mahjong wins 3 hancurkan simbol tengah tanpa animasi fakta mengejutkan terpantaurahasia spin digital teknik memancing fitur bonus dengan ritme spin tertenturahasia terungkap strategi sistematis menentukan momentum sweet bonzna candyland untuk mengelola risikoraih kemenangan dengan sic bo live temukan skill pengaman terbaik untuk strategi andalan andarumus rahasia main mahjong wild 2 sicbo yang dibagikan gratis oleh admin duta76duta76 fomo algoritma mahjong wins 3 scatter hitam bisa dapatkan kemenangan besar baccaratjalan menuju sukses di mahjong ways 2 pgsoft sicbo dengan gampang di perihokiperihoki bongkar rahasia mahjong wins 3 auto profit besar rtp live tertinggimontir bengkel kompresi data mahjong pgsoft abc1131 baccaratpenjual pasar malam cluster sweet bonanza abc1131 bluffing pokertukang cukur cold chip mahjong wins 3 abc1131 bahasa tubuhevaluasi strategi mahjong awsbetide inspirasi mahjong wins3ledakan profit tanpa henti terjadi saat scatter hitam mengendalikan jalannya putaran mahjong wins 3putaran mahjong wins 3 tidak pernah sama ketika scatter hitam menyulut efek keberuntungan berantaimomentum scatter wild di mahjong ways 2 menjadi titik balik menuju ledakan keuntungan besarkombinasi scatter wild mahjong ways 2 membuka jalan cepat menuju perkalian tinggi yang menguntungkanmomentum perkalian gilagilaan terjadi ketika scatter hitam muncul sebagai simbol paling menakutkanlayar mahjong wins 3 langsung bergemuruh saat scatter hitam menyalakan perkalian besar secara beruntunperan scatter wild di mahjong ways 2 hadir sebagai kunci strategis untuk meledakkan potensi profitscatter wild mahjong ways 2 menjadi pemicu awal terbukanya jalur cuan besar dalam waktu singkatketika scatter hitam turun setiap detik putaran mahjong wins 3 menjadi ajang ledakan profit tanpa batasmomen putaran mahjong wins 3 berubah dahsyat saat scatter hitam memicu gelombang cuan tanpa hentirevolusi gameplay pgsoft pangkas deadspin di mode regular mahjong Top