A Security Architecture for 5G Networks
Autor: | Arfaoui, Ghada, Bisson, Pascal, Blom, Rolf, Borgaonkar, Ravishankar, Englund, Håkan, Félix, Edith, Klaedtke, Felix, Nakarmi, Prajwol Kumar, Näslund, Mats, O’Hanlon, Piers, Papay, Juri, Suomalainen, Jani, Surridge, Mike, Wary, Jean-Philippe, Zahariev, Alexander |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2018 |
Předmět: |
architecture
Telecommunication networks security SDG 11 - Sustainable Cities and Communities Electronic mail 5G mobile communication Architecture Security Business lcsh:Electrical engineering. Electronics. Nuclear engineering Computer architecture lcsh:TK1-9971 Telecommunication Networks 5G Network slicing Smart cities |
Zdroj: | Arfaoui, G, Bisson, P, Blom, R, Borgaonkar, R, Englund, H, Felix, E, Klaedtke, F, Nakarmi, P K, Naslund, M, O'Hanlon, P, Papay, J, Suomalainen, J, Surridge, M, Wary, J P & Zahariev, A 2018, ' A Security Architecture for 5G Networks ', IEEE Access, vol. 6, pp. 22466-22479 . https://doi.org/10.1109/ACCESS.2018.2827419 IEEE Access, Vol 6, Pp 22466-22479 (2018) |
Popis: | 5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation. |
Databáze: | OpenAIRE |
Externí odkaz: |