The University of Southampton
University of Southampton Institutional Repository

5G-ENSURE - D2.2 Trust model (draft)

5G-ENSURE - D2.2 Trust model (draft)
5G-ENSURE - D2.2 Trust model (draft)
Trust is a response to risk. A decision to trust someone (or something) is a decision to accept the risk that they will not perform as expected. To manage risk in a socio-technical system such as a mobile network we need to understand what trust decisions are being made, the consequences of those trust decisions and we need information on the trustworthiness of other parties in order to make better decisions.

New business models and new domains of operation in 5G networks facilitated by network function virtualisation and software defined networking bring increased dynamicity compared to 4G and an increase in the number of stakeholders and associated trust relationships. New relationships bring new risks that must be understood and controlled and in a system as complex as 5G this implies the need for a trust model which can model the system, highlight potential risks and demonstrate the effect of adding controls or changing the design.

This document takes the first steps towards such a trust model. Firstly we discuss and define terminology. This is essential, as in common speech terminology can be quite muddled but in trust modelling we must be precise. We then review the state of the art in trust modelling, firstly looking at human trust factors (as humans are essential components of 5G network scenarios), understanding how humans make decisions on whether to trust or not when dealing with other humans and when dealing with machines. Secondly we review work on machine trust: machines of course only follow the instructions given to them through their software code by humans, but we review what the options are and the indicators for trustworthiness of other entities, whether they are humans or machines. Finally we look at trust and trustworthiness by design techniques which we recommend for use both during the design of 5G and when changing the design of a 5G deployment by adding or removing elements.

To understand 5G networks we must first understand 4G networks, and this is what is covered in the next chapter, looking first at the actors and business models of 4G (including where they touch on satellite services) and then extracting the trust aspects of the 4G network. Following this we review how the actors and business models are expected to change as we move to 5G, bringing in new domains and new opportunities for operators (both terrestrial and satellite). Here we also review the majority of the 5G use cases identified by 5G-ENSURE in an earlier document, identifying the entities involved and the trust issues in each one.

The final chapter brings all this information together to firstly discuss privacy aspects, then analyse the relationships between 4G stakeholders (demonstrating surprising complexity even there) and finally lay out a proposed approach for the work in 5G-ENSURE which will culminate in a machine understandable trust model able to assist stakeholders in managing risk.

As this document is a “draft” trust model, the next steps to be done are set out alongside the conclusions.
5G-ENSURE Consortium
Phillips, Stephen
47610c30-a543-4bac-a96a-bc1fce564a59
Correndo, Gianluca
fea0843a-6d4a-4136-8784-0d023fcde3e2
Surridge, Michael
3bd360fa-1962-4992-bb16-12fc4dd7d9a9
Sanchez Vilchez, Jose Manuel
0797be00-cbaf-41a9-91d8-f615bd12e87c
Arfaoui, Ghada
e4b30eb4-e683-40c9-a846-c90be56affc8
Heikkinen, Seppo
fe07a79d-42c8-40b6-b385-8a8bd415e906
Liinasuo, Marja
22adc901-3771-4220-a5f2-5fd2068bea0d
Ruuska, Pekka
348fb1fc-9c6d-4a1c-992f-c41b34d8036a
Schaefer, Christian
5cc334a4-973d-4697-9592-2919e64e002a
Nasland, Mats
169577ba-06dd-49e3-9000-1cb319b41bc6
Borgaonkar, Ravishankar
e85420d7-e88c-45d1-af9a-f695a86a8b5b
O'Hanlon, Piers
a61dbe4d-27de-47cd-8e1f-7643595e48ba
Lendrino, Gorka
1b792ddd-38d6-48f6-a127-a8b0b7e13aa0
Salas, Carla
3e210726-9d79-4917-94b7-259bc87c7fda
Zaccanoe, Pier Luigi
1c112eea-5f70-4de9-b81c-e78201ee690d
Costa, Luciana
eaade814-5e11-4e6a-97e2-57f8decf9322
Phillips, Stephen
47610c30-a543-4bac-a96a-bc1fce564a59
Correndo, Gianluca
fea0843a-6d4a-4136-8784-0d023fcde3e2
Surridge, Michael
3bd360fa-1962-4992-bb16-12fc4dd7d9a9
Sanchez Vilchez, Jose Manuel
0797be00-cbaf-41a9-91d8-f615bd12e87c
Arfaoui, Ghada
e4b30eb4-e683-40c9-a846-c90be56affc8
Heikkinen, Seppo
fe07a79d-42c8-40b6-b385-8a8bd415e906
Liinasuo, Marja
22adc901-3771-4220-a5f2-5fd2068bea0d
Ruuska, Pekka
348fb1fc-9c6d-4a1c-992f-c41b34d8036a
Schaefer, Christian
5cc334a4-973d-4697-9592-2919e64e002a
Nasland, Mats
169577ba-06dd-49e3-9000-1cb319b41bc6
Borgaonkar, Ravishankar
e85420d7-e88c-45d1-af9a-f695a86a8b5b
O'Hanlon, Piers
a61dbe4d-27de-47cd-8e1f-7643595e48ba
Lendrino, Gorka
1b792ddd-38d6-48f6-a127-a8b0b7e13aa0
Salas, Carla
3e210726-9d79-4917-94b7-259bc87c7fda
Zaccanoe, Pier Luigi
1c112eea-5f70-4de9-b81c-e78201ee690d
Costa, Luciana
eaade814-5e11-4e6a-97e2-57f8decf9322

Phillips, Stephen, Correndo, Gianluca, Surridge, Michael, Sanchez Vilchez, Jose Manuel, Arfaoui, Ghada, Heikkinen, Seppo, Liinasuo, Marja, Ruuska, Pekka, Schaefer, Christian, Nasland, Mats, Borgaonkar, Ravishankar, O'Hanlon, Piers, Lendrino, Gorka, Salas, Carla, Zaccanoe, Pier Luigi and Costa, Luciana (2016) 5G-ENSURE - D2.2 Trust model (draft) Southampton, GB. 5G-ENSURE Consortium 70pp.

Record type: Monograph (Project Report)

Abstract

Trust is a response to risk. A decision to trust someone (or something) is a decision to accept the risk that they will not perform as expected. To manage risk in a socio-technical system such as a mobile network we need to understand what trust decisions are being made, the consequences of those trust decisions and we need information on the trustworthiness of other parties in order to make better decisions.

New business models and new domains of operation in 5G networks facilitated by network function virtualisation and software defined networking bring increased dynamicity compared to 4G and an increase in the number of stakeholders and associated trust relationships. New relationships bring new risks that must be understood and controlled and in a system as complex as 5G this implies the need for a trust model which can model the system, highlight potential risks and demonstrate the effect of adding controls or changing the design.

This document takes the first steps towards such a trust model. Firstly we discuss and define terminology. This is essential, as in common speech terminology can be quite muddled but in trust modelling we must be precise. We then review the state of the art in trust modelling, firstly looking at human trust factors (as humans are essential components of 5G network scenarios), understanding how humans make decisions on whether to trust or not when dealing with other humans and when dealing with machines. Secondly we review work on machine trust: machines of course only follow the instructions given to them through their software code by humans, but we review what the options are and the indicators for trustworthiness of other entities, whether they are humans or machines. Finally we look at trust and trustworthiness by design techniques which we recommend for use both during the design of 5G and when changing the design of a 5G deployment by adding or removing elements.

To understand 5G networks we must first understand 4G networks, and this is what is covered in the next chapter, looking first at the actors and business models of 4G (including where they touch on satellite services) and then extracting the trust aspects of the 4G network. Following this we review how the actors and business models are expected to change as we move to 5G, bringing in new domains and new opportunities for operators (both terrestrial and satellite). Here we also review the majority of the 5G use cases identified by 5G-ENSURE in an earlier document, identifying the entities involved and the trust issues in each one.

The final chapter brings all this information together to firstly discuss privacy aspects, then analyse the relationships between 4G stakeholders (demonstrating surprising complexity even there) and finally lay out a proposed approach for the work in 5G-ENSURE which will culminate in a machine understandable trust model able to assist stakeholders in managing risk.

As this document is a “draft” trust model, the next steps to be done are set out alongside the conclusions.

Text
401842.pdf - Other
Download (2MB)

More information

Published date: 25 August 2016
Organisations: IT Innovation

Identifiers

Local EPrints ID: 401842
URI: http://eprints.soton.ac.uk/id/eprint/401842
PURE UUID: 0b5d5bea-cd45-4843-b8de-65b9e52c7e1e
ORCID for Stephen Phillips: ORCID iD orcid.org/0000-0002-7901-0839
ORCID for Gianluca Correndo: ORCID iD orcid.org/0000-0003-3335-5759
ORCID for Michael Surridge: ORCID iD orcid.org/0000-0003-1485-7024

Catalogue record

Date deposited: 21 Oct 2016 14:24
Last modified: 26 Aug 2024 01:32

Export record

Contributors

Author: Stephen Phillips ORCID iD
Author: Gianluca Correndo ORCID iD
Author: Michael Surridge ORCID iD
Author: Jose Manuel Sanchez Vilchez
Author: Ghada Arfaoui
Author: Seppo Heikkinen
Author: Marja Liinasuo
Author: Pekka Ruuska
Author: Christian Schaefer
Author: Mats Nasland
Author: Ravishankar Borgaonkar
Author: Piers O'Hanlon
Author: Gorka Lendrino
Author: Carla Salas
Author: Pier Luigi Zaccanoe
Author: Luciana Costa

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×