Security Archives | Ericsson Research Blog

Ericsson Research Blog

Research, insights and technology reflections

Smart Contracts for Identities

In the digitally connected world of Internet-of-Things (IoT), secure identities are crucial to achieve trustworthy generation and management of information. When facing tens of billions of devices, though, we can no longer rely on the means for managing devices and identities that are used today, where a substantial amount of manual intervention is required.

In our latest post in a series on secure identities, we will talk about smart contracts and digital identities and show how identity brokering facilitates identity and trust management for IoT devices.

Read more

5 tech trends you need to know about

Being an engineer has probably never been more interesting than it is today, with such rapid advances in technology and how this impacts both our daily life and our work at Ericsson. New devices, inventions, solutions, and tools appear every day alongside the ongoing digitization of all kinds of industries.
It’s hard for anyone to be updated, but to help, our CTO, Erik Ekudden, has just published a new article examining what he sees as the five most significant trends in technology evolution.

Inspired by his list, I have some personal reflections on technology evolution.

Read more

High Assurance Virtualization for ARMv8

To save cost and increase usability and capability, there is an increased demand for reusing the same ICT hardware for multiple functionalities. A fundamental security requirement is to provide isolation between the components providing these functionalities, including the associated data.

Ericsson has co-developed a high-assurance hypervisor and secure boot, codenamed HASPOC, for the latest ARM architecture, ARMv8. In this post, we provide details about the technologies of our platform.

The requirement to provide isolation has become relevant for most types of ICT devices. Not only for mainframes in data centers, but also for smart phones and computationally very limited devices such as embedded systems and sensors.

Read more

Improving mobile communication security – Summer in the Labs

As quantum computers are being developed, the research regarding post quantum cryptography is being intensified. In this post you can read about Iggy and how he, with the use of his studies in mathematics, got to take a closer look at cryptography improvements.

Students from many different fields join Ericsson Research for internships or thesis work. You could be next. Follow our blog to learn about the students at Ericsson Research this summer.

Read more

Learnings from Finland’s NomadicLab – Summer in the Labs

Security plays an important role in technical development and automation. Albert has been working on various security projects this summer together with the network society team at NomadicLab, which provides research and standardization results both for Business Units and for Group Function technology.

Students from many different fields join Ericsson Research for internships or thesis work. You could be next. Follow our blog to learn about the students at Ericsson Research this summer.

Read more

Secure brokering of digital identities

Secure digital identities are critical to achieving trust in our increasingly connected world – both for sending and receiving information but also to manage the devices. As the number of mobile devices enters the billions, we can no longer manage devices the way we do today, with a lot of manual intervention required.

In this post, we examine digital identities and offer a glimpse into how an Ericsson Research solution dynamically controlled access to WiFi networks by combining traditional identity management for SIM cards with blockchain-based management of device identities.

Read more

Protecting 5G against IMSI catchers

IMSI catchers are devices used to intercept wireless traffic and trace subscribers by their long-term identifiers (IMSIs). While the phenomenon is often exaggerated, IMSI catchers do pose a threat to subscriber privacy. On-going 5G standardization done in 3GPP is a golden opportunity to improve subscribers’ privacy by constructing a protocol architecture that protects against IMSI catchers.

Read more