Loading...

20 Mar 2026 13:32

Mobile & Digital

Nokia extends commitment to network security for the 5G world

Launches DFSEC 2.0: an enhanced security program to address the critical security needs of 5G wide area networks

Opens “Future X Security” Laboratory (FXSec): a new security end-to-end testing and verification lab at Nokia Bell Labs headquarters in Murray Hill, New Jersey 

Initiatives will seek to address the critical security needs of the end-to-end mission-critical networks that will define the 5G era

Espoo, Finland – Nokia today announces a significant extension of its long-held commitment to the highest standards in network security, unveiling an enhanced security program and establishing an advanced security testing and verification laboratory: both designed to address the critical security needs of 5G end-to-end (E2E) networks.

Nokia has a long-standing commitment to creating secure products via its comprehensive, industry-leading Design For Security (DFSEC) process. DFSEC ensures that security is designed into every product from the start, undergoing rigorous security testing prior to commercial release. Launched today, a new program – DFSEC 2.0 – will build on this leadership in security development by focusing on additional verification work in the areas of E2E identity management, network slicing and SDN security, virtualization, and OAM, including patch management.

To support collaborative research and development across the DFSEC 2.0 program, Nokia is opening the “Future X Security” (FXSec) Lab. Built as an extension of Nokia’s Future X network lab in Nokia Bell Labs in Murray Hill, this lab will be open to communications service providers and industries to facilitate joint testing and verification of industrial automation solutions in private local area networks (LANs) and across public wide area networks (WANs).

Marcus Weldon, Corporate Chief Technology Officer and President of Nokia Bell Labs, says: “End-to-end 5G networks will fundamentally transform societies by providing ultra-high-speed wireless connectivity allowing massive, low latency ultra-reliable streaming data that will drive intelligent automation for a wide array of infrastructure, industries and enterprises. But with great opportunity comes significant security risk that must be addressed end-to-end, using an array of novel techniques and technologies. As the most trusted end-to-end solution provider in the 5G era, Nokia is taking a leadership position in defining and building advanced security solutions that will meet mission-critical needs, leveraging the deep and extensive security research and disruptive innovations from Nokia Bell Labs.

Defining 5G security standards for the future

The E2E 5G networks that will define this new era are a significant advance from the closed systems and technologies in previous generations. Software Defined Networking (SDN) with distributed cloud infrastructure and augmented intelligent control systems will allow networks to scale in the 5G era, powering the next billion connected things, systems, machines and people.

However, open interfaces and commonly available technology also introduce new networking infrastructure security challenges, as does the addition of billons of unverified devices that will be used to sense and control the physical world.  Therefore, a new approach is warranted that goes beyond today’s security for ‘best effort’ networks, to enable security for E2E mission-critical networks.

Nokia’s 7 key research areas for secure design

In building the new security approach for LAN and WAN, Nokia will be incorporating advanced research from Nokia Bell Labs to create Network Slicing Security Solutions that will ensure security and trustworthiness of the end-to-end network slices – the critical connectivity and service fabric for industrial applications in the 5G era. These security solutions are based on 7 key research areas:

“Accountable Security” that provides failproof identification of industrial IoT devices in mobile and dynamic environments

“Physical and Virtual Device Integrity Protection” that provides scalable device attestation (hardware, firmware and software) across the supply chain

Artificial Intelligence enabled “Threat Detection and Mitigation for Network Slices”

“Fine-grained Security Policy Management” which dynamically tailors network slice elements to meet specified security requirements

“Dynamic data protection” which addresses the issue of data isolation across mobile devices, applications and slices

“Microservice Behavioral Fingerprinting” that is a unique machine learning based anomalous behavior detection of third party and open-source 5G services

Paradigm shift in design for security that provides run-time mitigation of potential security concerns with rapid feedback into development cycle using DevSecOps models

The next generation “Future X Security” for end-to-end mission critical networks will leverage Nokia Bell Labs long-standing leadership in researching and standardizing security solutions. Nokia Bell Labs has the leading patent filings in key areas of security of 5G and E2E networks – including aspects of multi-tenancy, slicing, and industrial IoT – and for trust and patch management, remote attestation, security management and orchestration. Beyond patents, Nokia has taken an active leadership role in supporting the development of key industry standards by working with 3GPP and ETSI. 

NULL
(Visited 17 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBETkincir88ABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/mengkaji cognitive load pemain mahjong wild deluxe di balik setiap keputusan dadu sicbo gates of olympus perihokifenomena baru yang membuat mahjong ways 2 pgsoft kembali muncul dalam percakapan pembaca online baccarat starlight princess perihokicara menang mahjong wins 3 pragmatic berdasarkan analisis data scatter player blackjack sweet bonanza perihokimahjong ways 2 pgsoft perihoki telah memperlihatkan akselerasi free spin yang tidak umum roulette wild west gold perihokirahasia pola scatter mahjong wins 3 pragmatic rtp live terakurat blackjack wild bandito sv388 perihokianalisis terbaru mahjong wild deluxe tentang pola bermain dan strategi spin yang ramai dibahas komunitas slot online baccarat starlight princess duta76dekonstruksi isyarat animasi mikro mahjong ways 2 pgsoft dalam momen symbol drift anomaly baccarat starlight princess duta76observasi slot mahjong 3 pragmatic dari catatan aktivitas player blackjack sweet bonanza duta76strategi mudah menang mahjong ways 2 pgsoft dari data rtp real time roulette wild bounty showdownanalisis data mahjong wins 3 pragmatic berdasarkan frekuensi scatter game blackjack sugar rush sv388 duta76aws rtp pgsoft pragmatic mahjongaws super scatter vs hitamaws transformasi modal receh naga emasaws waktu malam rtp tertinggiaws wild bandito pgsoft teratasaws data variable mahjong ways2aws lucky neko malam teratasaws mahjong wins3 profit optimalaws momentum pinata wins scatteraws waktu emas starlight polae4 teknik bermain rtp stabil yang disebut lebih realistise4 teknik disiplin mahjong wins 3 yang jarang dibahase4 teknik evaluasi rtp yang jadi sorotane4 teknik konsisten mahjong wins 2 berbasis kontrol emosie4 teknik kontrol modal mahjong wins 3 untuk durasi stabile4 teknik profesional menuju 33 juta dengan disipline4 teknik seimbang mahjong wins 3 dengan kontrol saldoe4 terbukti keliru strategi bermain cepat di mahjong wins justru menghambat trigger bonusaws lucky neko evaluasi winrate rtpaws mahjong ways2 analisis modalaws rekayasa algoritmik mahjong strategiaws statistik adaptif winrate pragmaticaws strategi rtp risiko freeaws analitik cerdas wild banditoaws observasi data mahjong visualaws observasi reel mahjong waysaws pengamatan digital mahjong simbolaws statistik player mahjong trenaws komunitas mahjong scatter konsistenaws metrik rtp performa konsistenaws minat pembaca mahjong topikaws riset wildbounty pola efektifaws scatter hitam variansi realtime Top