Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

Private 5G Deployment   • Private 5G Frequency Allocation Status in Korea  South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
Securing zero touch for uCPE deployments
June 07, 2018 | By Prayson Pate @ ADVA (PPate@advaoptical.com)
Online viewer:
Comments (0)

We are pleased to share with you all an interesting article contributed by Prayson Pate.


Prayson Pate

Chief Technology Officer for Ensemble at ADVA Optical Networking


All Articles by Prayson Pate

  How to contribute your article to Netmanias.com !  
  List of Contributors  




Service providers are working to replace customer premises equipment (CPE) appliances with software running on a standard platform referred to as universal CPE (uCPE). They also want to minimize the steps required for setting up uCPE, both in the supply chain and at the customer site. In an ideal situation, the deployed uCPE would not require user intervention, and there would be no need for a technician on site. This is what we refer to as zero touch.


But the real world is not that simple, and there are some open questions about how to achieve zero touch on uCPE while maintaining both service and network security:

  • How can we minimize the number of manual steps required?
  • What steps are reasonable for a non-technical end user to take?
  • How can we simplify the supply chain to allow direct shipments to the end user site, without needing per-site staging?
  • Can the customer provider the uCPE equipment, i.e. bring your own hardware (BYOH)?

I was discussing these questions at a recent conference. Some of my discussion partners glibly asserted that it was already possible to provide a zero touch model that met the needs of operators. When I started asking questions, it became clear that they had not considered all of the variables. Let’s look at some of those variables for uCPE deployments.


Multiple access models

The first complicating factor is the network access model. Operators need secure zero touch solutions that can work in a wide variety of network situations:

  • Wired and wireless. The advent of 5G raises the importance of wireless access, which introduces a new set of security considerations. Besides, wireless connectivity in any given area may be spotty, which emphasizes the importance of resilience and retries in any zero touch algorithm.
  • Private line / Carrier Ethernet (CE), Direct Internet Access (DIA) and public internet. Consumer-grade broadband is becoming very good and very fast. It is an important factor in reaching all locations, but it is not secure.
  • Layer 2 / CE and Layer 3 / DIA, internet. Layer 2 and Layer 3 access networks have their own strengths and weaknesses. Any access strategy must account for both.
  • Operator-supplied and bring your own hardware (BYOH). An operator-supplied box can be considered secure, but operators will have to apply scans and configuration to secure user-supplied devices.
  • Appliance and universal CPE (uCPE). Appliances have the advantage of minimizing attack surface but at the cost of service flexibility and innovation.
  • Access ports – labeled and unlabeled. Normally the ports on an appliance are distinctly colored and labeled as WAN, LAN, VPN. They may not be labeled as such on a white box server, especially in a BYOH deployment. There may be a need to auto-discover and auto-verify port selection and wiring.

Multiple authentication models

The next question is how to authenticate the uCPE device. Consider the case of a uCPE server that is shipped directly to a customer. How do we know it got to the right place? What if it is stolen and connected to the network by a third party? Do we have to incur the cost of an on-site technician?


Operators need solutions that can work in a variety of authentication models, with varying tradeoffs between cost, security and activation steps. The possibilities include the following:

  • Technician-installed. This approach has extra cost but is the lowest risk regarding security and mistakes.
  • Self-serve. While lowering cost, this approach also raises the cost of manual steps.
  • Authentication code. An emailed code entered at the customer site is a simple path to ensuring the right device was delivered to the right location. Its entry does add a step to the process.
  • USB stick. The operator could send a USB stick instead of a code. This removes the complexity of attaching a laptop to the uCPE device, at the expense of generating and shipping a physical key.
  • Smartphone app. The complexity of entering a key or inserting a USB stick could be replaced by installing an app and logging in to it and then allowing the app to access the uCPE device.
  • Geolocation. Many uCPE devices will have LTE or 5G access, and as a result, will have location services. Using that location is a good way to ensure the device is at the correct location, at the cost of having to have a radio interface installed. In addition, location is based on GPS, which may not always be available inside a building.
  • Specified attachment circuit (CE or MPLS). For devices with private wireline access, the location of the end of the access circuit is known and is considered to be secure.
  • Time-based window for connection. The operator opens a specific time window for uCPE access. This window would be based on the confirmed delivery of the uCPE to the customer. Once the window was closed, there would be no attachment allowed, at least until the customer called to confirm possession of the device and request a new window.
  • Device-specified (Ethernet MAC, serial number or X.509 certificate). These approaches verify the identity of the uCPE device. They don’t verify that the device is at the correct location.

Of course, some of these options are orthogonal, and they could be combined for increased security.


We need a framework

Based on the previous examples, we can see that there is no one-size-fits-all solution. What we need instead is a framework or architecture. Ideally, it would include the following:

  • Standards and best practices
  • Protocols and APIs
  • Solutions for authentication and encryption
  • Support for open source and commercial solutions


For more articles by Prayson Pate on Technically Speaking, please see: http://blog.advaoptical.com/en/About/prayson-pate.aspx

Thank you for visiting Netmanias! Please leave your comment if you have a question or suggestion.

[HFR Private 5G: my5G]


Details >>







Subscribe FREE >>

Currently, 55,000+ subscribed to Netmanias.

  • You can get Netmanias Newsletter

  • You can view all netmanias' contents

  • You can download all netmanias'

    contents in pdf file







View All (858)
4.5G (1) 5G (102) AI (8) AR (1) ARP (3) AT&T (1) Akamai (1) Authentication (5) BSS (1) Big Data (2) Billing (1) Blockchain (3) C-RAN/Fronthaul (18) CDN (4) CPRI (4) Carrier Ethernet (3) Charging (1) China (1) China Mobile (2) Cisco (1) Cloud (5) CoMP (6) Connected Car (4) DHCP (5) EDGE (1) Edge Computing (1) Ericsson (2) FTTH (6) GSLB (1) GiGAtopia (2) Gigabit Internet (19) Google (7) Google Global Cache (3) HLS (5) HSDPA (2) HTTP Adaptive Streaming (5) Handover (1) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (21) IoST (3) IoT (56) KT (43) Korea (20) Korea ICT Market (1) Korea ICT Service (13) Korea ICT Vendor (1) LG U+ (18) LSC (1) LTE (78) LTE-A (16) LTE-B (1) LTE-H (2) LTE-M (3) LTE-U (4) LoRa (7) MEC (4) MPLS (2) MPTCP (3) MWC 2015 (8) NB-IoT (6) Netflix (2) Network Protocol (21) Network Slice (1) Network Slicing (4) New Radio (9) Nokia (1) OSPF (2) OTT (3) PCRF (1) Platform (2) Private 5G (11) QoS (3) RCS (4) Railway (1) Roaming (1) SD-WAN (17) SDN/NFV (71) SIM (1) SK Broadband (2) SK Telecom (35) Samsung (5) Security (16) Self-Driving (1) Small Cell (2) Spectrum Sharing (2) Switching (6) TAU (2) UHD (5) VR (2) Video Streaming (12) VoLTE (8) VoWiFi (2) Wi-Fi (31) YouTube (6) blockchain (1) eICIC (1) eMBMS (1) iBeacon (1) security (1) telecoin (1) uCPE (2)
Password confirmation
Please enter your registered comment password.