Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2025, 8(11); doi: 10.25236/AJCIS.2025.081111.

Research on the Progress and Trends of Mobile Communication Network Equipment Security Standardization

Author(s)

Dan Lu1, Zelong Ma1, Yizhou He1

Corresponding Author:
Dan Lu
Affiliation(s)

1Security Research Department, China Academy of Information and Communications Technology, Beijing, China

Abstract

In October 2025, the Security Working Group (SA3) of the 3rd Generation Partnership Project (3GPP) officially initiated the study on security use cases and requirements for 6G within Release 20 (R20). Against this backdrop, this paper begins by systematically reviewing the experience gained in building device security capabilities during the 5G era. It then provides an in-depth analysis of the new device security risks emerging from the evolution towards 6G networks, which stem from challenges such as massive heterogeneous terminals, the authentication of new network elements, and cross-domain trust mechanisms. Furthermore, the paper proposes a development framework and specific countermeasures for the 6G device security standards system. These proposals encompass the construction of an endogenous security baseline, the classification and grading of terminal security, and the design of cross-domain mutual trust mechanisms. The insights presented aim to provide valuable references for establishing a globally unified security assurance system for mobile communication equipment.

Keywords

6G security, 5G security, equipment security, standardization

Cite This Paper

Dan Lu, Zelong Ma, Yizhou He. Research on the Progress and Trends of Mobile Communication Network Equipment Security Standardization. Academic Journal of Computing & Information Science (2025), Vol. 8, Issue 11: 99-106. https://doi.org/10.25236/AJCIS.2025.081111.

References

[1] P. Jain, "Rel-20 planning and progress in TSG SA," 3GPP Highlights, no. 9, Dec. 2024. [Online]. Available: https://www.3gpp.org

[2] GSMA, Network Equipment Security Assurance Scheme (NESAS), GSMA FS.13, Feb. 2025. [Online]. Available: https://www.gsma.com/nesas

[3] L. Dan et al., "6G security requirements and key technologies discussion," Information and Communications Technology and Policy, vol. 51, no. 1, pp. 52-55, Jan. 2025. DOI: 10.12267/j.issn.2096-5931.2025.01.008

[4] X. Ji, J. Wu, L. Jin et al., "Discussion on a New Paradigm of Endogenous Security Towards 6G Networks," Frontiers of Information Technology & Electronic Engineering, 2022. DOI: https://doi.org/10.1631/FITEE.2200060.

[5] W. Zijun, Z. Haijun, M. Xu, and R. Yuzheng, "System architecture and key technologies of 6G integrated sensing, communication, and computing," J. Univ. Sci. Technol. Beijing, vol. 48, no. 3, pp. 26-39, 2024, doi: 10.3969/j.issn.1006-1010.20240125-0004.

[6] ITU-T Y.3601, "Framework for 6G Security Standardization," Jan. 2025.