分享
CISA-美国5G市场份额和风险分析简报(英文)-2019.8-1页.pdf
下载文档

ID:3041797

大小:440.91KB

页数:2页

格式:PDF

时间:2024-01-18

收藏 分享赚钱
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,汇文网负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
网站客服:3074922707
CISA 美国 市场份额 风险 分析 简报 英文 2019.8
MAJOR COMPONENTS OF 5G NETWORKINGField Programmable Gate Arrays(FPGA)Market Leaders(2017)11.US Intel2.US XilinxSmall Cell ChipsetMarket Leaders(2017)11.US Qualcomm2.US Intel3.CH HiSilicon4.EU NXP Semiconductor5.EU Ericsson6.US CaviumSmall Cell Power AmplifierMarket Leaders(2017)11.US Texas Instruments2.EU NXP Semiconductor3.US Qorvo4.US Broadcom5.US AnadigicsNetwork ProcessorMarket Leaders(2016)11.US Intel2.US Broadcom3.CH HiSilicon4.US Qualcomm5.US Texas InstrumentsServerMarket Leaders(2Q18)11.US Dell2.US HPE3.US IBM4.CH Lenovo5.CH InspurData Converter ChipMarket Leaders(2017)11.US Texas Instruments2.US Analog DevicesEthernet Switch Chips Market Leaders(2015)11.US BroadcomSmall Cell Antenna ArrayMarket Leaders(2017)11.EU Alpha Wireless2.EU Ericsson3.US Galtronics 1Lewis,James.2018.“How Will 5G Shape Innovation and Security:A Primer.”Center for Strategic&International Studies.https:/csis- May 2019.ADCThe Cybersecurity and Infrastructure Security Agency(CISA)/National Risk Management Center(NRMC)is the planning,analysis,and collaboration center working in close coordination with the critical infrastructure community to Identify;Analyze;Prioritize;and Manage the most strategic risks to National Critical Functions.These are the functions of government and the private sector so vital to the United States that their disruption,corruption,or dysfunction would have a debilitating impact on security,national economic security,national public health or safety,or any combination thereof.All NRMC products are visible to authorized users at HSIN-CI and Intelink.For more information,contact NRMChq.dhs.gov or visit https:/www.dhs.gov/cisa/national-risk-management-center.Market data is based on 4G LTE market share.Additionally,the network architecture and corresponding vendors are intended to be high level.Further granularity would result in a broader list of primary vendors,including additional American-based vendors.5G is the next generation of wireless networks,building upon existing 4G Long-Term Evolution(LTE)infrastructure and improving the bandwidth,capacity,and reliability of wireless broadband services.It is intended to meet increasing data and communication requirements,including capacity for tens of billions of connected devices that will make up the Internet of Things(IoT),ultra-low latency required for critical near-real time communications,and faster speeds to support emerging technologies.5G is expected to bring security improvements and a better user experience,but supply chain,deployment,network security,and competition and choice vulnerabilities may affect the security and resilience of 5G networks.5G Wireless Networks MARKET PENETRATION AND RISK FACTORSSelect Mobile Network Equipment Components Market LeadersCybersecurity and Infrastructure Security AgencyJuly 2019TLP:WHITETLP:WHITESubject to standard copyright rules,TLP:WHITE information may be distributed without restriction.Points of Vulnerability in the 5G NetworkSUPPLY CHAINISSUE:The 5G supply chain is susceptible to the malicious or inadvertent introduction of vulnerabilities such as malicious software and hardware;counterfeit components;and poor designs,manufacturing processes,and maintenance procedures.IMPACT:5G hardware,software,and services provided by untrusted entities could increase the risk of network asset compromise and affect data confidentiality,integrity,and availability.Even if U.S.networks are secure,U.S.data that travels overseas through untrusted telecommunications networks is potentially at risk of theft,manipulation,and destruction.DEPLOYMENTISSUE:5G will utilize more information and communication technology(ICT)components than previous generations of wireless networks,and municipalities,companies,and organizations may build their own local 5G networks,potentially increasing the attack surface for malicious actors.IMPACT:Despite security enhancements compared to previous generations of wireless network equipment and services,5G networks will need to be properly configured and implemented for those enhancements to be effective.Improperly deployed,configured,or managed 5G equipment and networks may be vulnerable to disruption and manipulation.NETWORK SECURITYISSUE:5G builds upon previous generations of wireless networks and will initially be integrated with 4G LTE networks that contain some legacy vulnerabilities.Additionally,it is unknown what new vulnerabilities will be discovered in 5G networks.IMPACT:Some legacy vulnerabilities,whether accidental or maliciously inserted by untrusted suppliers,may affect 5G equipment and networks no matter how much additional security is built in.LOSS OF COMPETITION AND CHOICEISSUE:Despite the development of standards designed to encourage interoperability,some companies(including Huawei)build proprietary interfaces into their technologies.This limits customers abilities to use other equipment,either in addition to or in replacement of Huawei technology.IMPACT:Customers who are locked into one technology or service provider may have to choose between continuing to use an untrusted supplier or removing and replacing existing equipment;which may be both expensive and time consuming.Lack of interoperability may also make it difficult for trusted companies to compete,potentially limiting their ability to invest in R&D and eventually driving them out of the market.The core network is the backbone of the U.S.communications infrastructure that routes and transports data and connects the different parts of the access network.Compromised core devices may be used to disrupt data and services on a large scale,and impact customers who are interconnected by the access network.Core NetworkUser EquipmentDevices such as smart phones,computers,and Industrial Control Systems(ICS)generate data that is then transmitted to a base station,small cell,satellite,or Internet Exchange Points(IXP).Compromised devices may collect user data and impact local networks and systems,but are unlikely to impact the larger communications network.Radio Access Network(RAN)RANs connect wireless or satellite subscriber devices to terrestrial telecommunication networks.Compromised systems may intercept or disrupt data flow and phone calls.Industrial IoT HardwareMarket Leaders(2Q18)11.US Cisco2.CH Huawei3.EU Ericsson4.EU TE Connectivity5.US QualcommRAN EquipmentMarket Leaders(1Q18)11.CH Huawei2.EU Ericsson3.EU Nokia4.CH ZTE5.SK SamsungEvolved Packet Core(LTE)Market Leaders(1Q18)11.EU Ericsson2.CH Huawei3.EU Nokia4.US Cisco5.CH ZTESmartphoneMarket Leaders(2Q18)11.SK Samsung2.CH Huawei3.US Apple4.CH Xiaomi5.CH OPPOService Provider Router and Ethernet SwitchMarket Leaders(1Q18)11.US Cisco2.CH Huawei3.EU Nokia4.US JuniperTop two vendors account for over 60%of the market.Top four vendors account for over 90%of the market.Top four vendors account for over 90%of the market.Baseband Unit PoolRadio UnitsCore Network InfrastructureMobile Backhaul/Transport NetworkMobile FronthaulUS:United States CH:Chinese EU:European US:United States CH:Chinese EU:European SK:South KoreaSmall CellMacro Towers扫码关注:金融干货精选获取更多干货资料

此文档下载收益归作者所有

下载文档
你可能关注的文档
收起
展开