Do you recognize these challenges

Telecommunications companies face challenges when they implement security functions in LTE and 5G networks.

They need to:

  • Protect base stations from threats like device tracking, call interception, frequency jamming, physical base stations attacks, and flooding.
  • Adapt to new security requirements for 5G, where base stations need to be more closely spaced and placed in easier to reach locations.
  • Guarantee high availability of the telecom networks.
  • Authenticate users, base stations and other devices to prevent unauthorized access to the backend services.
  • Prevent malware from executing in the associated backend or applications.

Want to know more?

Customer case

How Vodafone Turkey keeps its rapidly growing network secure with PKI

With thousands of base stations and a rapidly growing network, Vodafone Turkey made a transition from GSM to LTE technology, using public key infrastructure (PKI) to manage the important encyption of the mobile traffic.

Read full case here

 

Vodafone
Nexus-LTE PKI

Backhaul Protection

Giving trusted identities to LTE and 5G base stations provides end-to-end security to help guarantee high availability of the telecom network.

Nexus LTE PKI is based on mature, scalable, highly reliable, continuously tested and maintained products. The multi-CA and multitenancy solution helps you adapt the PKI hierarchy, administration, and reporting, to your needs. Nexus' solution offers automation features and a solid track record. 

Read more on Docs

CPE Protection

Customer Premises equipment (CPE), i.e., broadband routers, are located at the customer's physical location rather than the ISP's (Internet Service Provider), which makes them a part of the malicious third-party attack surface. To secure them against security breaches, remote management and communication must be authenticated and secured using digital certificates as per broadband-forum specification TR-369.

ISPs can enroll their operator certificate to the CPEs by having the CPEs request the certificate from the Certificate Authority based on Enrolment over Secure Transport (EST) protocol, authenticating with their birth certificates.

Manufacturers of CPE can inject birth certificates from a Factory CA at the time of production, enabling a trusted device identity and allowing them to securely authenticate to the ISP’s Operational CA.

READ OUR BLOG TO LEARN MORE

 

Need support for 5G networks?

As mobile network operators around the world develop and roll out their 5G networks, enabling better connectivity and facilitating IoT, there are several security aspects to consider.

Smart ID supports multiple use cases.

LEARN MORE

 

Why Nexus

Nexus’ platform for LTE and 5G PKI has the following key benefits:

Proven worldwide

Is used in critical, large-scale installations by several of the biggest mobile operators world-wide.

High security

Offers proven high security as Nexus’ quality-assured PKI platform is being certified according to Common Criteria EAL4+, and Nexus’ organization comply with ISO 27001 and TISAX.

Offered as a service

Is offered as a service, with guaranteed SLA and capacity as you grow. 

Want to know more about how we can help you?

Book a free demo

IoT research projects

Connected vehicles Research

Nexus secures V2X communication in SECREDAS project

11 January, 2022
Nexus secures V2X communication in SECREDAS project The Electronic Components and Systems for European Leadership (ECSEL) SECREDAS project, launched in 2018, has been completed successfully. The project which has funding of €50+ million is aimed at devel...
Blog Research

SecureCare: IoT research project aims to provide trusted high-quality elderly care

28 March, 2019
“We have initiated a new research project that we hope will result in a truly secure smart-healthcare system for elderly as well as younger and healthier people,” says Helen Holst, CIO at the Swedish municipality City of Solna.
Blog Research

SecureIoT: Making PKI security available for resource-constrained IoT devices

9 March, 2017
The internet of things (IoT) applications have started to hit the market in big numbers – but security is lagging behind.