Loading...

10 May 2026 17:21

Global

Nokia extends commitment to network security for the 5G world

Nokia extends commitment to network security for the 5G world

Nokia extends commitment to network security for the 5G world

Nokia extends commitment to network security for the 5G worldLaunches DFSEC 2.0: an enhanced security program to address the critical security needs of 5G wide area networks

Opens “Future X Security” Laboratory (FXSec): a new security end-to-end testing and verification lab at Nokia Bell Labs headquarters in Murray Hill, New Jersey

Initiatives will seek to address the critical security needs of the end-to-end mission-critical networks that will define the 5G era

Espoo, Finland – Nokia today announces a significant extension of its long-held commitment to the highest standards in network security, unveiling an enhanced security program and establishing an advanced security testing and verification laboratory: both designed to address the critical security needs of 5G end-to-end (E2E) networks.

Nokia has a long-standing commitment to creating secure products via its comprehensive, industry-leading Design For Security (DFSEC) process. DFSEC ensures that security is designed into every product from the start, undergoing rigorous security testing prior to commercial release. Launched today, a new program – DFSEC 2.0 – will build on this leadership in security development by focusing on additional verification work in the areas of E2E identity management, network slicing and SDN security, virtualization, and OAM, including patch management.

To support collaborative research and development across the DFSEC 2.0 program, Nokia is opening the “Future X Security” (FXSec) Lab. Built as an extension of Nokia’s Future X network lab in Nokia Bell Labs in Murray Hill, this lab will be open to communications service providers and industries to facilitate joint testing and verification of industrial automation solutions in private local area networks (LANs) and across public wide area networks (WANs).

Marcus Weldon, Corporate Chief Technology Officer and President of Nokia Bell Labs, says: “End-to-end 5G networks will fundamentally transform societies by providing ultra-high-speed wireless connectivity allowing massive, low latency ultra-reliable streaming data that will drive intelligent automation for a wide array of infrastructure, industries and enterprises. But with great opportunity comes significant security risk that must be addressed end-to-end, using an array of novel techniques and technologies. As the most trusted end-to-end solution provider in the 5G era, Nokia is taking a leadership position in defining and building advanced security solutions that will meet mission-critical needs, leveraging the deep and extensive security research and disruptive innovations from Nokia Bell Labs.

Defining 5G security standards for the future

The E2E 5G networks that will define this new era are a significant advance from the closed systems and technologies in previous generations. Software Defined Networking (SDN) with distributed cloud infrastructure and augmented intelligent control systems will allow networks to scale in the 5G era, powering the next billion connected things, systems, machines and people.

However, open interfaces and commonly available technology also introduce new networking infrastructure security challenges, as does the addition of billons of unverified devices that will be used to sense and control the physical world. Therefore, a new approach is warranted that goes beyond today’s security for ‘best effort’ networks, to enable security for E2E mission-critical networks.

Nokia’s 7 key research areas for secure design

In building the new security approach for LAN and WAN, Nokia will be incorporating advanced research from Nokia Bell Labs to create Network Slicing Security Solutions that will ensure security and trustworthiness of the end-to-end network slices – the critical connectivity and service fabric for industrial applications in the 5G era.

These security solutions are based on 7 key research areas:

“Accountable Security” that provides failproof identification of industrial IoT devices in mobile and dynamic environments

“Physical and Virtual Device Integrity Protection” that provides scalable device attestation (hardware, firmware and software) across the supply chain

Artificial Intelligence enabled “Threat Detection and Mitigation for Network Slices”

“Fine-grained Security Policy Management” which dynamically tailors network slice elements to meet specified security requirements

“Dynamic data protection” which addresses the issue of data isolation across mobile devices, applications and slices

“Microservice Behavioral Fingerprinting” that is a unique machine learning based anomalous behavior detection of third party and open-source 5G services

Paradigm shift in design for security that provides run-time mitigation of potential security concerns with rapid feedback into development cycle using DevSecOps models

The next generation “Future X Security” for end-to-end mission critical networks will leverage Nokia Bell Labs long-standing leadership in researching and standardizing security solutions. Nokia Bell Labs has the leading patent filings in key areas of security of 5G and E2E networks – including aspects of multi-tenancy, slicing, and industrial IoT – and for trust and patch management, remote attestation, security management and orchestration. Beyond patents, Nokia has taken an active leadership role in supporting the development of key industry standards by working with 3GPP and ETSI.

(Visited 7 times, 1 visits today)
peri hokiperihokiduta76duta 76AWSBEThttps://sintnicolaasschool.com/https://abc1131aa.com/kincir88cakar76Slot mahjonghttps://www.abc1131.it.com/stc76006 sinkronisasi momentum strategi hibrida pola scatter mahjong wild deluxe gates of olympus manajemen risiko dadu sicbo007 rekayasa taktik hibrida pola transformasi gold simbol mahjong ways 2 pgsoft baccarat prediksi starlight princess008 arsitektur kemenangan terpadu navigasi strategi blackjack optimasi peluang sweet bonanza mahjong wins 3 pragmatic009 dekonstruksi momentum strategi eksploitasi pola scatter mahjong ways 2 pgsoft teknik unit roulette wild west gold010 manifesto ekspertis navigasi rtp live sugar rush pola statis sv388 taktik kalkulasi blackjack mahjong wins 3 pragmatic011 rekayasa taktik lintas platform optimasi teknik analisa statistik mahjong wild deluxe gates of olympus dadu sicbo012 sinkronisasi data teknik rtp live mahjong ways 2 pgoft strategi baccarat statis dan dinamis starlight princess013 sinergi operasional integrasi teknik analisa statis blackjack dinamika sweet bonanza mahjong wins 3 pragmatic014 manifesto ekspertis rekayasa peluang algoritma pgsoft mahjong ways 2 pgsoft dinamika roulette wild west gold015 protokol strategis optimasi teknik analisa mahjong wins 3 pragmatic sugar rush sv388 blackjack proeksekusi taktik analisa pola gates of olympus dadu sicbo mahjong wild deluxetaktik peluang baccarat teknik analisa pola rtp live starlight princess mahjong ways 2 pgsoftsinergi strategi analisa peluang blackjack taktik teknik pola rtp live mahjong wins 3 pragmatic sweet bonanzaanalisa teknik peluang roulette taktik pola strategi rtp live mahjong ways 2 pgsoft wild west goldstrategi peluang blackjack analisa sv388 teknik taktik pola rtp live mahjong wins 3 pragmatic sugar rushaws algoritma mahjong ways fluktuasi simbol teknisaws cara ukur efisiensi pola mahjongaws integrasi otomatis manual mahjong waysaws kalibrasi strategi mahjong wild rtp gates olympusaws kalkulasi rtp mahjong wins tiga teknisaws observasi teknis simbol mahjong winsaws pola trik rtp mahjong waysaws strategi awet mahjong black scatteraws tren dominasi fitur black scatteraws trik pola naga emas mahjongreview lengkap fitur mahjong wild deluxe ketegangan dadu sicbo keajaiban gates of olympusteknik profesi pola transformasi mahjong ways 2 pgsoft sistem taruhan roulette sticky wild west goldalasan mahjong wins 3 pragmatic blackjack sugar rush menjadi game viral platform sv388 terbarue5 peran strategis rtp live evolusi onlinee5 pola mahjong wins terlihat mengandung scattere5 rahasia alur simbol mahjong winse5 rahasia mahjong simbol scatter mahjonge5 rtp live pilar penting kasino onlinee5 teknik cerdas pola algoritma waktuaws analisis jam hoki rtp olympusaws era multiplier turbo starlight olympusaws fase transisi mahjong pgsoft algoritmaaws komputasi data rtp mahjong waysaws mitos fakta jam hoki olympusaws momentum scatter merah mahjong waysaws rekapitulasi data log mahjong waysaws rotasi fitur captains bounty analisisaws strategi transparan rtp starlight princessaws visual turbo lucky neko starlightstrategi masterclass bedah algoritma mahjong wild deluxe rumus dadu sicbo pola petir gates of olympusteknik rahasia pro player ritme taruhan mahjong ways 2 strategi baccarat multiplier starlight princesspanduan manajemen saldo taruhan mahjong wins 3 pramgatic teknik martingale blackjack sweet bonanza256257258259260261262263264265logika scatter hitam mahjong winsanalisis algoritma mahjong ways 2dinamika frame emas mahjong waysmisteri frekuensi scatter hitamkomparatif mahjong wins vs waysnavigasi sesi stabil mahjong waystransformasi intensitas tumble mahjongprobabilitas scatter hitam 2026pengaruh latensi server mahjong waysevaluasi mekanik mahjong winspola wild bandito rtp livemahjong wins pola scatter wildssssss1sss2sss3sss4sss5sss6sss7 Top