1、MAJOR COMPONENTS OF 5G NETWORKINGField Programmable Gate Arrays(FPGA)Market Leaders(2017)11.US Intel2.US XilinxSmall Cell ChipsetMarket Leaders(2017)11.US Qualcomm2.US Intel3.CH HiSilicon4.EU NXP Semiconductor5.EU Ericsson6.US CaviumSmall Cell Power AmplifierMarket Leaders(2017)11.US Texas Instrumen
2、ts2.EU NXP Semiconductor3.US Qorvo4.US Broadcom5.US AnadigicsNetwork ProcessorMarket Leaders(2016)11.US Intel2.US Broadcom3.CH HiSilicon4.US Qualcomm5.US Texas InstrumentsServerMarket Leaders(2Q18)11.US Dell2.US HPE3.US IBM4.CH Lenovo5.CH InspurData Converter ChipMarket Leaders(2017)11.US Texas Inst
3、ruments2.US Analog DevicesEthernet Switch Chips Market Leaders(2015)11.US BroadcomSmall Cell Antenna ArrayMarket Leaders(2017)11.EU Alpha Wireless2.EU Ericsson3.US Galtronics 1Lewis,James.2018.“How Will 5G Shape Innovation and Security:A Primer.”Center for Strategic&International Studies.https:/csis
4、- May 2019.ADCThe Cybersecurity and Infrastructure Security Agency(CISA)/National Risk Management Center(NRMC)is the planning,analysis,and collaboration center working in close coordination with the critical infrastructure community to Identify;Analyze;Prioritize;and Manage the most strategic risks
5、to National Critical Functions.These are the functions of government and the private sector so vital to the United States that their disruption,corruption,or dysfunction would have a debilitating impact on security,national economic security,national public health or safety,or any combination thereo
6、f.All NRMC products are visible to authorized users at HSIN-CI and Intelink.For more information,contact NRMChq.dhs.gov or visit https:/www.dhs.gov/cisa/national-risk-management-center.Market data is based on 4G LTE market share.Additionally,the network architecture and corresponding vendors are int
7、ended to be high level.Further granularity would result in a broader list of primary vendors,including additional American-based vendors.5G is the next generation of wireless networks,building upon existing 4G Long-Term Evolution(LTE)infrastructure and improving the bandwidth,capacity,and reliabilit
8、y of wireless broadband services.It is intended to meet increasing data and communication requirements,including capacity for tens of billions of connected devices that will make up the Internet of Things(IoT),ultra-low latency required for critical near-real time communications,and faster speeds to
9、 support emerging technologies.5G is expected to bring security improvements and a better user experience,but supply chain,deployment,network security,and competition and choice vulnerabilities may affect the security and resilience of 5G networks.5G Wireless Networks MARKET PENETRATION AND RISK FAC
10、TORSSelect Mobile Network Equipment Components Market LeadersCybersecurity and Infrastructure Security AgencyJuly 2019TLP:WHITETLP:WHITESubject to standard copyright rules,TLP:WHITE information may be distributed without restriction.Points of Vulnerability in the 5G NetworkSUPPLY CHAINISSUE:The 5G s
11、upply chain is susceptible to the malicious or inadvertent introduction of vulnerabilities such as malicious software and hardware;counterfeit components;and poor designs,manufacturing processes,and maintenance procedures.IMPACT:5G hardware,software,and services provided by untrusted entities could
12、increase the risk of network asset compromise and affect data confidentiality,integrity,and availability.Even if U.S.networks are secure,U.S.data that travels overseas through untrusted telecommunications networks is potentially at risk of theft,manipulation,and destruction.DEPLOYMENTISSUE:5G will u
13、tilize more information and communication technology(ICT)components than previous generations of wireless networks,and municipalities,companies,and organizations may build their own local 5G networks,potentially increasing the attack surface for malicious actors.IMPACT:Despite security enhancements
14、compared to previous generations of wireless network equipment and services,5G networks will need to be properly configured and implemented for those enhancements to be effective.Improperly deployed,configured,or managed 5G equipment and networks may be vulnerable to disruption and manipulation.NETW
15、ORK SECURITYISSUE:5G builds upon previous generations of wireless networks and will initially be integrated with 4G LTE networks that contain some legacy vulnerabilities.Additionally,it is unknown what new vulnerabilities will be discovered in 5G networks.IMPACT:Some legacy vulnerabilities,whether a
16、ccidental or maliciously inserted by untrusted suppliers,may affect 5G equipment and networks no matter how much additional security is built in.LOSS OF COMPETITION AND CHOICEISSUE:Despite the development of standards designed to encourage interoperability,some companies(including Huawei)build propr
17、ietary interfaces into their technologies.This limits customers abilities to use other equipment,either in addition to or in replacement of Huawei technology.IMPACT:Customers who are locked into one technology or service provider may have to choose between continuing to use an untrusted supplier or
18、removing and replacing existing equipment;which may be both expensive and time consuming.Lack of interoperability may also make it difficult for trusted companies to compete,potentially limiting their ability to invest in R&D and eventually driving them out of the market.The core network is the back
19、bone of the U.S.communications infrastructure that routes and transports data and connects the different parts of the access network.Compromised core devices may be used to disrupt data and services on a large scale,and impact customers who are interconnected by the access network.Core NetworkUser E
20、quipmentDevices such as smart phones,computers,and Industrial Control Systems(ICS)generate data that is then transmitted to a base station,small cell,satellite,or Internet Exchange Points(IXP).Compromised devices may collect user data and impact local networks and systems,but are unlikely to impact
21、the larger communications network.Radio Access Network(RAN)RANs connect wireless or satellite subscriber devices to terrestrial telecommunication networks.Compromised systems may intercept or disrupt data flow and phone calls.Industrial IoT HardwareMarket Leaders(2Q18)11.US Cisco2.CH Huawei3.EU Eric
22、sson4.EU TE Connectivity5.US QualcommRAN EquipmentMarket Leaders(1Q18)11.CH Huawei2.EU Ericsson3.EU Nokia4.CH ZTE5.SK SamsungEvolved Packet Core(LTE)Market Leaders(1Q18)11.EU Ericsson2.CH Huawei3.EU Nokia4.US Cisco5.CH ZTESmartphoneMarket Leaders(2Q18)11.SK Samsung2.CH Huawei3.US Apple4.CH Xiaomi5.C
23、H OPPOService Provider Router and Ethernet SwitchMarket Leaders(1Q18)11.US Cisco2.CH Huawei3.EU Nokia4.US JuniperTop two vendors account for over 60%of the market.Top four vendors account for over 90%of the market.Top four vendors account for over 90%of the market.Baseband Unit PoolRadio UnitsCore Network InfrastructureMobile Backhaul/Transport NetworkMobile FronthaulUS:United States CH:Chinese EU:European US:United States CH:Chinese EU:European SK:South KoreaSmall CellMacro Towers扫码关注:金融干货精选获取更多干货资料