Publication | Open Access
A Security Architecture for 5G Networks
88
Citations
9
References
2018
Year
5G Network SlicingMobile SecurityEngineeringInformation SecurityIot SecuritySecurity RequirementsSoftware Defined SecuritySecure Network AccessSecurity ArchitectureSecure CommunicationInternet Of ThingsNetwork SecurityNetwork SlicingMobile ComputingData SecurityCryptography5G NetworksEdge ComputingNetwork Softwarization
5G will enable new services, business models, and entrants, supporting cost‑effective, vertical‑market deployments that require diverse security, driven by network slicing, softwarization, NFV, and SDN. The authors propose a security architecture that extends 3G/4G designs to meet 5G’s unique requirements. The architecture includes a modeling toolbox, design principles, and security functions and mechanisms to realize the stated objectives. In a smart‑city IoT scenario, the architecture demonstrates its utility by addressing high‑level security challenges arising from large‑scale device deployment and softwarization.
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.
| Year | Citations | |
|---|---|---|
Page 1
Page 1