Skip navigation
Industry robot in a factory.

Resilient 5G systems

Security and privacy in resilient 5G systems.

Critical infrastructure relies on 5G network resilience and security

Governments and enterprises are adopting advanced technologies through 5G, relying on predictable performance and security assurance of mission and business critical processes. 5G is powering everything, from factory automation to remote control of assets and more. When it comes to security and high performance, the 5G platform is a truly resilient system.

What makes a resilient 5G system

Resilient 5G gif


A resilient 5G system is always available, reliable, performs as expected, and recovers quickly when facing disturbances or attacks. The technical capabilities of a resilient 5G system include a combination of reliability, availability, robustness and security, whilst protecting privacy. These fundamental properties are inherent within telecom networks today and are extended even further with new technologies and capabilities.

Day by day, existing critical functions in society are being moved into the digital domain, becoming dependent on telecom networks. At the same time, new capabilities are enabling new use-cases to be realized. This is driving the evolution of traditional telecom networks into the primary innovation platform for both industry and society. This has led to various new demands on the 5G system, particularly mission and business critical use cases.

For example, remote-controlled machines that operate on time-critical communication. If a person is obstructing a machine and due to that is in physical danger, the machine needs to stop instantly. In such a scenario, the availability and predictability of the 5G performance must be maintained.

To continually meet the needs of the constantly evolving threat and risk landscape, four key development components are critical for building trustworthy systems.

Reimagining the value of digital

High-performance networks allow us to reimagine the value of digital.

Read the blogpost

Key components

Service availability
Increased focus on robustness, availability, and resilience of the 5G platform to support new business-and mission-critical use cases.
Confidential computing
Confidential computing technologies will allow us to protect data when it is being processed, providing assurance to both users and regulators.
Secure identities and protocols
Secure identities are critical to protecting communication at every layer between humans, devices, and applications across every industry segment.
Security assurance and defense
Our long-term vision is to create solutions with built-in assurance and proof-of-compliance mechanisms.

Resilient systems in action

Explore how key capabilities of a resilient 5G system are realized

Key reading

Ericsson Technology Review Magazine 2021 – Spotlight on high-performance networks

Already at this early phase in the era of 5G high-performance networks, advanced edge and cloud technologies are opening up massive opportunities for communication service providers (CSPs) across industry segments ranging from manufacturing to retail, banking, health care and travel.

Engineer in a dock monitoring via digital twin of ship propeller.

Building trustworthiness into future mobile networks

AI and secure computing enable trustworthy 5G mobile networks.

The most secure foundation for digitalizing enterprises

Communication service providers are ideally positioned to become security champions for digital business, thanks to their ability to provide the best possible foundation for secure network services and critical infrastructure – both today and in the future.

Zero trust and 5G – Realizing zero trust in networks

Modern telecommunications infrastructure is heterogeneous, which makes it increasingly difficult to protect network resources with conventional perimeter-oriented approaches to network security.

Related content

Stay updated

Follow Ericsson Networks