{"id":2003,"date":"2019-04-24T14:40:37","date_gmt":"2019-04-24T13:40:37","guid":{"rendered":"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/?p=2003"},"modified":"2019-04-24T14:40:37","modified_gmt":"2019-04-24T13:40:37","slug":"expert-comment-banning-huawei-from-uk-5g-network-build-would-never-work","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2019\/04\/24\/expert-comment-banning-huawei-from-uk-5g-network-build-would-never-work\/","title":{"rendered":"Expert Comment: Banning Huawei from UK 5G network build would never work"},"content":{"rendered":"<p>Professor of Cyber Security Shujun Li from the School of Computing says the government&#8217;s decision to approve the use of Huawei equipment in the construction of new 5G networks is to be welcomed.<\/p>\n<p style=\"text-align: left\" align=\"center\">\u2018As a cyber-security researcher, I welcome the UK government\u2019s decision on Huawei\u2019s involvement in building future 5G networks in the UK. I urge the governmental officials, politicians and the general public <strong>to look at the Huawei \u201crisks\u201d from a technical angle, not a political one<\/strong>.<\/p>\n<p>\u2018Technically speaking, banning any particular vendor will never work as a real solution to cyber security as the supply chain is very complicated and there are simply too many potential risks one has to consider. I would therefore argue that i<strong>f the UK\u2019s national security depends on a single company (Huawei or any other firm) always doing the \u201cright\u201d thing,<\/strong>then we have failed the cybersecurity assurance in the first place.<\/p>\n<p>\u2018What should be looked at more is how a technical solution or product can be scrutinised and verified by independent experts and automated tools, which can detect not only risks <strong>from a particular vendor like Huawei but also those caused by any malicious parties in the supply chain.<\/strong><\/p>\n<p>\u2018In addition, in the cyber security research community, the widely-accepted <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kerckhoffs%27s_principle\">Kerckhoffs\u2019s principle<\/a> and Shannon\u2019s maxim tell us that the security of a system should <strong>not depend on hiding details of how the system works (as the attacker will learn the system)<\/strong> but other things (e.g., a secret password chosen by the user). Applying these rules to the Huawei case, it would be strange if Huawei were to <strong>base their system\u2019s security on hiding details of how it operates (and therefore not being detected doing something it should not).\u2019<\/strong><\/p>\n<p>The University\u2019s Press Office provides the media with\u00a0<a href=\"https:\/\/www.kent.ac.uk\/news\/tags\/comment\/\">expert comments<\/a>\u00a0in response to topical news events. Colleagues who would like to learn more about how to contribute their expertise or how the service works should contact the Press Office on 3985 or\u00a0pressoffice@kent.ac.uk<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Professor of Cyber Security Shujun Li from the School of Computing says the government&#8217;s decision to approve the use of Huawei equipment in the construction &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2019\/04\/24\/expert-comment-banning-huawei-from-uk-5g-network-build-would-never-work\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":5321,"featured_media":1412,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[57908,122],"tags":[37339,178062,178021],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/2003"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/users\/5321"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/comments?post=2003"}],"version-history":[{"count":1,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/2003\/revisions"}],"predecessor-version":[{"id":2004,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/2003\/revisions\/2004"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media\/1412"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media?parent=2003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/categories?post=2003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/tags?post=2003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}