Today’s telecommunication networks serve far more use cases than they did decades ago. An increasing number of connected digital identities such as mobile end-user devices, cars, or entities of the critical infrastructure, are now utilizing the networks.
Telecommunications networks are therefore one of the major pillars of modern society and, consequently, of our daily lives. As the foundation for constant connectivity for millions and billions of digital entities, it enables communication and data exchange in a variety of fields. Therefore, it is crucial for the security of the entire network that all participants are given a uniquely, identifiable identity, which in turn can be verified for authenticity by all other parties.
These connected devices play a part in use cases that are evident, such as digital end-user applications (e. g. mobile messaging and applications or music and video streaming), connected mobility and industrial IoT environments, but they also involved in the critical infrastructure, such as the supply of power and water, smart city components, and the telecommunication networks themselves.
For the security and stability of any use cases executed throughout the telecommunication networks, it is paramount to protect all connected digital identities involved in these connected endpoint use cases.