A Security Architecture for 5G Networks
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service a...
Gespeichert in:
Veröffentlicht in: | IEEE access 2018-01, Vol.6 (17), p.22466-22479 |
---|---|
Hauptverfasser: | , , , , , , , , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 22479 |
---|---|
container_issue | 17 |
container_start_page | 22466 |
container_title | IEEE access |
container_volume | 6 |
creator | Arfaoui, Ghada Bisson, Pascal Blom, Rolf Borgaonkar, Ravishankar Englund, Hakan Felix, Edith Klaedtke, Felix Nakarmi, Prajwol Kumar Naslund, Mats O'Hanlon, Piers Papay, Juri Suomalainen, Jani Surridge, Mike Wary, Jean-Philippe Zahariev, Alexander |
description | 5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization. |
doi_str_mv | 10.1109/ACCESS.2018.2827419 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_8340149</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8340149</ieee_id><doaj_id>oai_doaj_org_article_876591b1b0cf4068a488a7b55ff287b2</doaj_id><sourcerecordid>2455930709</sourcerecordid><originalsourceid>FETCH-LOGICAL-c482t-f1376a368207ad40e9af70dc418cd05a1b52094e4335a61ddc6c808f4534d5a73</originalsourceid><addsrcrecordid>eNqFkU9PwjAYhxejiQT5BFyWePBghm__re1xQUQSogfUa9N1rQzQYreF8O0dzBA9-V765s3zew79RdEQwQghkHfZeDxZLEYYkBhhgTlF8izqYZTKhDCSnv_aL6NBVa2gHdGeGO9FN1m8sKYJZb2Ps2CWZW1N3QQbOx9iNo2fbL3zYV1dRRdObyo7-Hn70evD5GX8mMyfp7NxNk8MFbhOHCI81SQVGLguKFipHYfCUCRMAUyjnGGQ1FJCmE5RUZjUCBCOMkILpjnpR7POW3i9UttQfuiwV16X6njw4V3pUJdmY5XgKZMoRzkYRyEVmgqhec6Yc1jwHLeu285V7ey2yf_Y7su37GgLpSKEM9HSyf_0ul4qTAGzg_2647fBfzW2qtXKN-Gz_ZyWYEwS4CBbinSUCb6qgnUnLwJ1qE919alDfeqnvjY17FKltfaUEIQCopJ8A11skuo</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455930709</pqid></control><display><type>article</type><title>A Security Architecture for 5G Networks</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Arfaoui, Ghada ; Bisson, Pascal ; Blom, Rolf ; Borgaonkar, Ravishankar ; Englund, Hakan ; Felix, Edith ; Klaedtke, Felix ; Nakarmi, Prajwol Kumar ; Naslund, Mats ; O'Hanlon, Piers ; Papay, Juri ; Suomalainen, Jani ; Surridge, Mike ; Wary, Jean-Philippe ; Zahariev, Alexander</creator><creatorcontrib>Arfaoui, Ghada ; Bisson, Pascal ; Blom, Rolf ; Borgaonkar, Ravishankar ; Englund, Hakan ; Felix, Edith ; Klaedtke, Felix ; Nakarmi, Prajwol Kumar ; Naslund, Mats ; O'Hanlon, Piers ; Papay, Juri ; Suomalainen, Jani ; Surridge, Mike ; Wary, Jean-Philippe ; Zahariev, Alexander</creatorcontrib><description>5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2827419</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>5G mobile communication ; 5G mobile communication systems ; Architecture ; Business ; Commerce ; Computer architecture ; Cost effectiveness ; Electronic devices ; Electronic mail ; Industry ; Mobile communications ; Mobile security ; Mobile telecommunication systems ; Network architecture ; Network security ; Network slicing ; New business models ; Queueing networks ; Security ; Security Architecture ; Security aspects ; Security functions ; Security objectives ; Security requirements ; Smart cities ; Smart city ; Software-defined networking ; Telecommunication Networks ; Wireless networks</subject><ispartof>IEEE access, 2018-01, Vol.6 (17), p.22466-22479</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c482t-f1376a368207ad40e9af70dc418cd05a1b52094e4335a61ddc6c808f4534d5a73</citedby><cites>FETCH-LOGICAL-c482t-f1376a368207ad40e9af70dc418cd05a1b52094e4335a61ddc6c808f4534d5a73</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8340149$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>230,314,776,780,860,881,2096,27610,27901,27902,54908</link.rule.ids><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240252$$DView record from Swedish Publication Index$$Hfree_for_read</backlink><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-33758$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><creatorcontrib>Arfaoui, Ghada</creatorcontrib><creatorcontrib>Bisson, Pascal</creatorcontrib><creatorcontrib>Blom, Rolf</creatorcontrib><creatorcontrib>Borgaonkar, Ravishankar</creatorcontrib><creatorcontrib>Englund, Hakan</creatorcontrib><creatorcontrib>Felix, Edith</creatorcontrib><creatorcontrib>Klaedtke, Felix</creatorcontrib><creatorcontrib>Nakarmi, Prajwol Kumar</creatorcontrib><creatorcontrib>Naslund, Mats</creatorcontrib><creatorcontrib>O'Hanlon, Piers</creatorcontrib><creatorcontrib>Papay, Juri</creatorcontrib><creatorcontrib>Suomalainen, Jani</creatorcontrib><creatorcontrib>Surridge, Mike</creatorcontrib><creatorcontrib>Wary, Jean-Philippe</creatorcontrib><creatorcontrib>Zahariev, Alexander</creatorcontrib><title>A Security Architecture for 5G Networks</title><title>IEEE access</title><addtitle>Access</addtitle><description>5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.</description><subject>5G mobile communication</subject><subject>5G mobile communication systems</subject><subject>Architecture</subject><subject>Business</subject><subject>Commerce</subject><subject>Computer architecture</subject><subject>Cost effectiveness</subject><subject>Electronic devices</subject><subject>Electronic mail</subject><subject>Industry</subject><subject>Mobile communications</subject><subject>Mobile security</subject><subject>Mobile telecommunication systems</subject><subject>Network architecture</subject><subject>Network security</subject><subject>Network slicing</subject><subject>New business models</subject><subject>Queueing networks</subject><subject>Security</subject><subject>Security Architecture</subject><subject>Security aspects</subject><subject>Security functions</subject><subject>Security objectives</subject><subject>Security requirements</subject><subject>Smart cities</subject><subject>Smart city</subject><subject>Software-defined networking</subject><subject>Telecommunication Networks</subject><subject>Wireless networks</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNqFkU9PwjAYhxejiQT5BFyWePBghm__re1xQUQSogfUa9N1rQzQYreF8O0dzBA9-V765s3zew79RdEQwQghkHfZeDxZLEYYkBhhgTlF8izqYZTKhDCSnv_aL6NBVa2gHdGeGO9FN1m8sKYJZb2Ps2CWZW1N3QQbOx9iNo2fbL3zYV1dRRdObyo7-Hn70evD5GX8mMyfp7NxNk8MFbhOHCI81SQVGLguKFipHYfCUCRMAUyjnGGQ1FJCmE5RUZjUCBCOMkILpjnpR7POW3i9UttQfuiwV16X6njw4V3pUJdmY5XgKZMoRzkYRyEVmgqhec6Yc1jwHLeu285V7ey2yf_Y7su37GgLpSKEM9HSyf_0ul4qTAGzg_2647fBfzW2qtXKN-Gz_ZyWYEwS4CBbinSUCb6qgnUnLwJ1qE919alDfeqnvjY17FKltfaUEIQCopJ8A11skuo</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Arfaoui, Ghada</creator><creator>Bisson, Pascal</creator><creator>Blom, Rolf</creator><creator>Borgaonkar, Ravishankar</creator><creator>Englund, Hakan</creator><creator>Felix, Edith</creator><creator>Klaedtke, Felix</creator><creator>Nakarmi, Prajwol Kumar</creator><creator>Naslund, Mats</creator><creator>O'Hanlon, Piers</creator><creator>Papay, Juri</creator><creator>Suomalainen, Jani</creator><creator>Surridge, Mike</creator><creator>Wary, Jean-Philippe</creator><creator>Zahariev, Alexander</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>ADTPV</scope><scope>AOWAS</scope><scope>D8V</scope><scope>DOA</scope></search><sort><creationdate>20180101</creationdate><title>A Security Architecture for 5G Networks</title><author>Arfaoui, Ghada ; Bisson, Pascal ; Blom, Rolf ; Borgaonkar, Ravishankar ; Englund, Hakan ; Felix, Edith ; Klaedtke, Felix ; Nakarmi, Prajwol Kumar ; Naslund, Mats ; O'Hanlon, Piers ; Papay, Juri ; Suomalainen, Jani ; Surridge, Mike ; Wary, Jean-Philippe ; Zahariev, Alexander</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c482t-f1376a368207ad40e9af70dc418cd05a1b52094e4335a61ddc6c808f4534d5a73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>5G mobile communication</topic><topic>5G mobile communication systems</topic><topic>Architecture</topic><topic>Business</topic><topic>Commerce</topic><topic>Computer architecture</topic><topic>Cost effectiveness</topic><topic>Electronic devices</topic><topic>Electronic mail</topic><topic>Industry</topic><topic>Mobile communications</topic><topic>Mobile security</topic><topic>Mobile telecommunication systems</topic><topic>Network architecture</topic><topic>Network security</topic><topic>Network slicing</topic><topic>New business models</topic><topic>Queueing networks</topic><topic>Security</topic><topic>Security Architecture</topic><topic>Security aspects</topic><topic>Security functions</topic><topic>Security objectives</topic><topic>Security requirements</topic><topic>Smart cities</topic><topic>Smart city</topic><topic>Software-defined networking</topic><topic>Telecommunication Networks</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Arfaoui, Ghada</creatorcontrib><creatorcontrib>Bisson, Pascal</creatorcontrib><creatorcontrib>Blom, Rolf</creatorcontrib><creatorcontrib>Borgaonkar, Ravishankar</creatorcontrib><creatorcontrib>Englund, Hakan</creatorcontrib><creatorcontrib>Felix, Edith</creatorcontrib><creatorcontrib>Klaedtke, Felix</creatorcontrib><creatorcontrib>Nakarmi, Prajwol Kumar</creatorcontrib><creatorcontrib>Naslund, Mats</creatorcontrib><creatorcontrib>O'Hanlon, Piers</creatorcontrib><creatorcontrib>Papay, Juri</creatorcontrib><creatorcontrib>Suomalainen, Jani</creatorcontrib><creatorcontrib>Surridge, Mike</creatorcontrib><creatorcontrib>Wary, Jean-Philippe</creatorcontrib><creatorcontrib>Zahariev, Alexander</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>SwePub</collection><collection>SwePub Articles</collection><collection>SWEPUB Kungliga Tekniska Högskolan</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Arfaoui, Ghada</au><au>Bisson, Pascal</au><au>Blom, Rolf</au><au>Borgaonkar, Ravishankar</au><au>Englund, Hakan</au><au>Felix, Edith</au><au>Klaedtke, Felix</au><au>Nakarmi, Prajwol Kumar</au><au>Naslund, Mats</au><au>O'Hanlon, Piers</au><au>Papay, Juri</au><au>Suomalainen, Jani</au><au>Surridge, Mike</au><au>Wary, Jean-Philippe</au><au>Zahariev, Alexander</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Security Architecture for 5G Networks</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><issue>17</issue><spage>22466</spage><epage>22479</epage><pages>22466-22479</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2827419</doi><tpages>14</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2018-01, Vol.6 (17), p.22466-22479 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_ieee_primary_8340149 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | 5G mobile communication 5G mobile communication systems Architecture Business Commerce Computer architecture Cost effectiveness Electronic devices Electronic mail Industry Mobile communications Mobile security Mobile telecommunication systems Network architecture Network security Network slicing New business models Queueing networks Security Security Architecture Security aspects Security functions Security objectives Security requirements Smart cities Smart city Software-defined networking Telecommunication Networks Wireless networks |
title | A Security Architecture for 5G Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T15%3A00%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Security%20Architecture%20for%205G%20Networks&rft.jtitle=IEEE%20access&rft.au=Arfaoui,%20Ghada&rft.date=2018-01-01&rft.volume=6&rft.issue=17&rft.spage=22466&rft.epage=22479&rft.pages=22466-22479&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2827419&rft_dat=%3Cproquest_ieee_%3E2455930709%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455930709&rft_id=info:pmid/&rft_ieee_id=8340149&rft_doaj_id=oai_doaj_org_article_876591b1b0cf4068a488a7b55ff287b2&rfr_iscdi=true |