Are you concerned about the security threat?
After years of deliberation, the UK has finally confirmed Huawei will be allowed to be part of its 5G networks – but with restrictions.
One of those is that the Chinese firm’s equipment must be limited to “non-core” parts of the system.
What is the core and why is Huawei being kept out of it?
A mobile phone network’s core is sometimes likened to its heart or brain.
It is where voice and other data is routed across various sub-networks and computer servers to ensure it gets to its desired destination.
- authenticating subscribers so that specific users only get access to the services they have paid for and opted into
- sending a call to the right radio tower to connect to another person’s mobile phone
- managing facilities such as call-forwarding and voicemail
- delivering SMS messages and multimedia from one handset to another
- routing data back and forth to third-party services such as apps and websites
- keeping track of usage to calculate an individual’s bill
While once, a lot of this involved physical equipment known as routers and switches, in the 5G world much of this kit has been “virtualised”. That means software rather than specialised hardware now takes care of much of the job.
This opens the door to new capabilities such as “network slicing”, in which operators can offer the emergency services and other priority clients dedicated bandwidth, for example, letting them avoid sluggish speeds during periods of peak demand.
It also lets some network activity be physically carried out closer to users’ devices, helping reduce latency. That should help cloud gaming services run with less lag time between a user pressing a gamepad button and the on-screen character responding. Self-drive cars should also benefit, in theory, from being able to co-ordinate their movements more fluidly.
But a perceived risk is that this shift to virtualisation could open the system up to new kinds of attack. And even if encryption means the information being handled cannot be spied upon, the fear is that a rogue participant could still crash the network – or at least disrupt the data flow.
How does this differ from the rest of the network?
The core is distinct from the Radio Access Network (RAN), which is sometimes referred to as the “periphery”.
It includes the base stations and antennas used to provide a link between individual mobile devices and the core.
So why are the Americans still worried?
The Trump administration’s cyber-security chiefs, along with their Australian counterparts, contend that over time the “edge” – the name given to the boundary between the core and periphery – will disappear, as more and more sensitive operations are carried out closer to users.
As a result, it will no longer be possible to keep Huawei, and by extension the Chinese state, out of the network’s most sensitive areas, they claim.