A security architecture for 5G networks
A security architecture for 5G networks
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.
Telecommunication Networks, 5G, Security, architecture
Arfaoui, Ghada
3a8e96e4-d9cc-4948-9144-95e8c454e885
Bisson, Pascal
ca30082d-2702-4446-8bd4-7c9f33ca1a6f
Blom, Rolf
35d81146-c452-4e52-949b-93e6d69f8126
Borgaonkar, Ravishankar
3acdc460-37e7-4304-8056-a0abc64cf640
Englund, Håkan
163d229e-0f2c-4238-92ea-7de391b49d21
Félix, Edith
74640040-e785-4e6d-bab9-99d62e511763
Klaedtke, Felix
5f5193f1-e160-4014-8482-52ca0ca0b313
Nakarmi, Prajwol Kumar
beb0157f-0f9b-4516-b002-f17deeff76a8
Näslund, Mats
680df98a-4252-47a3-aa9a-451a7e7ffda6
O’Hanlon, Piers
9a691a37-2303-4ad6-b942-85a63e5cd06f
Papay, Juri
21652b35-de29-439c-b343-cb3437ef2f9e
Suomalainen, Jani
a2b3d62d-4460-4bbd-84c7-70b34d0b125a
Surridge, Mike
3bd360fa-1962-4992-bb16-12fc4dd7d9a9
Wary, Jean-Philippe
0afd7434-16cd-40f8-8702-c921c2ff5704
Zahariev, Alexander
1104ca39-2bf5-4cb3-bce5-4d387eb41fe6
Arfaoui, Ghada
3a8e96e4-d9cc-4948-9144-95e8c454e885
Bisson, Pascal
ca30082d-2702-4446-8bd4-7c9f33ca1a6f
Blom, Rolf
35d81146-c452-4e52-949b-93e6d69f8126
Borgaonkar, Ravishankar
3acdc460-37e7-4304-8056-a0abc64cf640
Englund, Håkan
163d229e-0f2c-4238-92ea-7de391b49d21
Félix, Edith
74640040-e785-4e6d-bab9-99d62e511763
Klaedtke, Felix
5f5193f1-e160-4014-8482-52ca0ca0b313
Nakarmi, Prajwol Kumar
beb0157f-0f9b-4516-b002-f17deeff76a8
Näslund, Mats
680df98a-4252-47a3-aa9a-451a7e7ffda6
O’Hanlon, Piers
9a691a37-2303-4ad6-b942-85a63e5cd06f
Papay, Juri
21652b35-de29-439c-b343-cb3437ef2f9e
Suomalainen, Jani
a2b3d62d-4460-4bbd-84c7-70b34d0b125a
Surridge, Mike
3bd360fa-1962-4992-bb16-12fc4dd7d9a9
Wary, Jean-Philippe
0afd7434-16cd-40f8-8702-c921c2ff5704
Zahariev, Alexander
1104ca39-2bf5-4cb3-bce5-4d387eb41fe6
Arfaoui, Ghada, Bisson, Pascal, Blom, Rolf, Borgaonkar, Ravishankar, Englund, Håkan, Félix, Edith, Klaedtke, Felix, Nakarmi, Prajwol Kumar, Näslund, Mats, O’Hanlon, Piers, Papay, Juri, Suomalainen, Jani, Surridge, Mike, Wary, Jean-Philippe and Zahariev, Alexander
(2018)
A security architecture for 5G networks.
IEEE Access.
(doi:10.1109/ACCESS.2018.2827419).
Abstract
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.
Text
A_Security_Architecture_for_5G_Networks
- Version of Record
More information
Accepted/In Press date: 16 April 2018
e-pub ahead of print date: 17 April 2018
Keywords:
Telecommunication Networks, 5G, Security, architecture
Identifiers
Local EPrints ID: 420370
URI: http://eprints.soton.ac.uk/id/eprint/420370
ISSN: 2169-3536
PURE UUID: 8631fa9d-a65d-4117-a2fb-6be22728f967
Catalogue record
Date deposited: 04 May 2018 16:30
Last modified: 26 Aug 2024 01:32
Export record
Altmetrics
Contributors
Author:
Ghada Arfaoui
Author:
Pascal Bisson
Author:
Rolf Blom
Author:
Ravishankar Borgaonkar
Author:
Håkan Englund
Author:
Edith Félix
Author:
Felix Klaedtke
Author:
Prajwol Kumar Nakarmi
Author:
Mats Näslund
Author:
Piers O’Hanlon
Author:
Juri Papay
Author:
Jani Suomalainen
Author:
Mike Surridge
Author:
Jean-Philippe Wary
Author:
Alexander Zahariev
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics