The University of Southampton
University of Southampton Institutional Repository

A security architecture for 5G networks

A security architecture for 5G networks
A security architecture for 5G networks
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.
Telecommunication Networks, 5G, Security, architecture
2169-3536
Arfaoui, Ghada
3a8e96e4-d9cc-4948-9144-95e8c454e885
Bisson, Pascal
ca30082d-2702-4446-8bd4-7c9f33ca1a6f
Blom, Rolf
35d81146-c452-4e52-949b-93e6d69f8126
Borgaonkar, Ravishankar
3acdc460-37e7-4304-8056-a0abc64cf640
Englund, Håkan
163d229e-0f2c-4238-92ea-7de391b49d21
Félix, Edith
74640040-e785-4e6d-bab9-99d62e511763
Klaedtke, Felix
5f5193f1-e160-4014-8482-52ca0ca0b313
Nakarmi, Prajwol Kumar
beb0157f-0f9b-4516-b002-f17deeff76a8
Näslund, Mats
680df98a-4252-47a3-aa9a-451a7e7ffda6
O’Hanlon, Piers
9a691a37-2303-4ad6-b942-85a63e5cd06f
Papay, Juri
21652b35-de29-439c-b343-cb3437ef2f9e
Suomalainen, Jani
a2b3d62d-4460-4bbd-84c7-70b34d0b125a
Surridge, Mike
3bd360fa-1962-4992-bb16-12fc4dd7d9a9
Wary, Jean-Philippe
0afd7434-16cd-40f8-8702-c921c2ff5704
Zahariev, Alexander
1104ca39-2bf5-4cb3-bce5-4d387eb41fe6
Arfaoui, Ghada
3a8e96e4-d9cc-4948-9144-95e8c454e885
Bisson, Pascal
ca30082d-2702-4446-8bd4-7c9f33ca1a6f
Blom, Rolf
35d81146-c452-4e52-949b-93e6d69f8126
Borgaonkar, Ravishankar
3acdc460-37e7-4304-8056-a0abc64cf640
Englund, Håkan
163d229e-0f2c-4238-92ea-7de391b49d21
Félix, Edith
74640040-e785-4e6d-bab9-99d62e511763
Klaedtke, Felix
5f5193f1-e160-4014-8482-52ca0ca0b313
Nakarmi, Prajwol Kumar
beb0157f-0f9b-4516-b002-f17deeff76a8
Näslund, Mats
680df98a-4252-47a3-aa9a-451a7e7ffda6
O’Hanlon, Piers
9a691a37-2303-4ad6-b942-85a63e5cd06f
Papay, Juri
21652b35-de29-439c-b343-cb3437ef2f9e
Suomalainen, Jani
a2b3d62d-4460-4bbd-84c7-70b34d0b125a
Surridge, Mike
3bd360fa-1962-4992-bb16-12fc4dd7d9a9
Wary, Jean-Philippe
0afd7434-16cd-40f8-8702-c921c2ff5704
Zahariev, Alexander
1104ca39-2bf5-4cb3-bce5-4d387eb41fe6

Arfaoui, Ghada, Bisson, Pascal, Blom, Rolf, Borgaonkar, Ravishankar, Englund, Håkan, Félix, Edith, Klaedtke, Felix, Nakarmi, Prajwol Kumar, Näslund, Mats, O’Hanlon, Piers, Papay, Juri, Suomalainen, Jani, Surridge, Mike, Wary, Jean-Philippe and Zahariev, Alexander (2018) A security architecture for 5G networks. IEEE Access. (doi:10.1109/ACCESS.2018.2827419).

Record type: Article

Abstract

5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.

Text
A_Security_Architecture_for_5G_Networks - Version of Record
Available under License Creative Commons Attribution.
Download (978kB)

More information

Accepted/In Press date: 16 April 2018
e-pub ahead of print date: 17 April 2018
Keywords: Telecommunication Networks, 5G, Security, architecture

Identifiers

Local EPrints ID: 420370
URI: https://eprints.soton.ac.uk/id/eprint/420370
ISSN: 2169-3536
PURE UUID: 8631fa9d-a65d-4117-a2fb-6be22728f967

Catalogue record

Date deposited: 04 May 2018 16:30
Last modified: 13 Mar 2019 18:33

Export record

Altmetrics

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of https://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×