• Gemalto is now part of the Thales Group, find out more.

Understanding what a 5G SIM is and its benefits


Definition & benefits of a 5G SIM for 5G virtualized networks

Definition of a 5G SIM

5G SIMA 5G SIM is a tamper-proof secure element which is the only solution allowed to secure 5G network access. It has been specified by the 5G standardization body ETSI-3GPP in Release 15 UICC specifications (UICC: Universal Integrated Circuit Card, better known as a SIM).

It aims at directly addressing the key 5G attributes: enhanced mobile broadband, massive IoT, critical communications. Launched commercially in 2019, 5G will reach 1.9 billion subscriptions worldwide in 2024 (i.e. 20% of all mobile subscriptions), making it the fastest generation ever to be rolled out on a global scale. 

A 5G SIM encompasses all form factors available (removable SIM, M2M SIM, 5G eSIM).

Challenges for 5G operators

In order to help to deliver the full 5G promise to enterprises and users, trust is increasingly perceived as a pervasive transversal factor to be added to a mandatory trust-by-design virtualized 5G architecture.

But a certain number of legal and security concerns arise:

  1. User privacy management is nowadays increasingly seen as crucial in a digitalized society. This reality hurts mobile operators in the thing most dear to them with respect to their relationship with their users: reputation, and thus trust. In particular, mobile subscriber identity is at stake (i.e. International Mobile Subscriber Identity, aka IMSI, used to identify the user of a mobile network and a unique identification associated with all mobile networks): thanks to IMSI catcher equipment, IMSIs can be easily misused to locate, trace individuals and collect data.   
    → Definition: An IMSI catcher (or Stingray) is an intrusive piece of technology, that acts as a false base station, able to locate and track all mobile phones that are switched on in a certain area. It does this by ‘pretending’ to be a mobile phone tower - tricking your phone into connecting to the IMSI catcher, and then revealing your personal details without your knowledge. Source: Privacy International
    The full anonymization of the end-to-end subscriber identity is required (i.e. from mobile equipment to core network): it can be imposed on mobile operators by stringent regulations (e.g. GDPR, ePrivacy Regulation) or implemented by mobile operators as part of their own security policy or strategy.  

  2. Current mobile security architectures mainly rely on the secrecy of mobile operators’ network authentication elements (i.e. the operator’s network access authentication algorithm and long term secret-key credentials used for mutual authentication of users onto their mobile networks). Such information can be unexpectedly exposed via hacking attacks (e.g. by state intelligence agencies or other actors) or accidental breaches during exchanges between the mobile operators and their providers. This vulnerability can sometimes lead to communication spying, SIM cloning and other unwanted activities. Should the mobile operator believe that this sensitive data is compromised or suspected of being compromised, it can be forced to change its network authentication algorithm and/or physically replace end-users’ SIM cards. Such actions are damaging to the user experience, they result in SIM card renewal costs, and eventually lead to loss of trust and reputation of the mobile operator. Hence mobile operators must be able to maintain a cyber-resilient environment in case of attack by restoring a trusted security level over the entire SIM lifecycle.

Then 5G roaming is on the agenda too.

While traveling abroad, 5G users –particularly the early 5G adopters– logically expect to continue to roam on other 5G networks. They would not understand that while roaming they could be connected to a 3G or 4G network, thus losing the 5G enhanced mobile experience. Mobile operators must be able to ensure that their roaming policy across 5G / 4G and 3G is correctly applied in any country.

Benefits of Gemalto’s 5G SIM

Gemalto’s 5G SIM can help to address these challenges. 

Subscriber identity privacy 5G_SIM_ISO.png

Mobile operators can now ensure user data anonymization thanks to IMSI encryption made possible by the highly customizable onboard identity encryption capabilities built in to our 5G SIMs.

Cyber resilience

Mobile operators can securely and remotely swap on demand the authentication algorithm contained in the SIM thanks to key rotation management, thus maintaining a trusted environment.

Seamless 5G roaming experience

The 5G SIM ensures that mobile operators can offer users a seamless & optimal 5G roaming experience while maximizing their roaming revenues, thanks to 5G SIM-based over-the-air 5G steering of roaming capabilities.

Gemalto's 5G SIM supported by the world's first 5G chipset for smartphones

5G-SIM-5G-Chipset.pngAll the world's first 5G smartphones rely on Qualcomm®'s SnapdragonTM 855 Mobile Platform chipset.

Gemalto has been working closely with the world's leading mobile chipset and modem leader Qualcomm Technologies to ensure full support of its 5G SIM with the Qualcomm flagship mobile platform. 

"Qualcomm Technologies has a longstanding relationship with Gemalto focused on delivering mobile solutions with robust security," said Gautam Sheoran, Senior Director, Product Management, Qualcomm Technologies, Inc. "We are now extending this collaboration to allow OEMs to easily develop exciting 5G devices with strong security, using both Gemalto 5G SIM and our next generation flagship Qualcomm® Snapdragon™ 855 Mobile Platform to pave the path for 5G commercialization in 2019."





 5G WHITE PAPER

  • A New Trust Model For The 5G Era

    5G use cases will bring new requirements on the storage, compute and network domains and will introduce new risks to the confidentiality, integrity and availability of enterprise & user data. This White Paper provides Gemalto’s recommendations to address these new challenges and build a new trust model for the 5G era.

    Building a new trust model in the 5G era

 DOWNLOAD THE Q&A

  • 5G Networks Q & A

    Introducing 5G networks – Characteristics and usages

    The fifth generation networks (5G) is currently under development and will hit the market at the horizon 2020. Compared with the current 4G LTE technology, 5G is targeting to reach both high speed (1 Gbps), low power and low latency (1ms or less), for massive IoT, tactile internet and robotics.

    Introducing 5G networks – Characteristics and usages

 5G TRAINING

  • 5G overview & subscriber security essentials for next-generation networks

    A comprehensive insight into 5G evolutions for digital transformation

    Training agenda