A Security Architecture for 5G Networks

5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2018-01, Vol.6 (17), p.22466-22479
Hauptverfasser: Arfaoui, Ghada, Bisson, Pascal, Blom, Rolf, Borgaonkar, Ravishankar, Englund, Hakan, Felix, Edith, Klaedtke, Felix, Nakarmi, Prajwol Kumar, Naslund, Mats, O'Hanlon, Piers, Papay, Juri, Suomalainen, Jani, Surridge, Mike, Wary, Jean-Philippe, Zahariev, Alexander
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 22479
container_issue 17
container_start_page 22466
container_title IEEE access
container_volume 6
creator Arfaoui, Ghada
Bisson, Pascal
Blom, Rolf
Borgaonkar, Ravishankar
Englund, Hakan
Felix, Edith
Klaedtke, Felix
Nakarmi, Prajwol Kumar
Naslund, Mats
O'Hanlon, Piers
Papay, Juri
Suomalainen, Jani
Surridge, Mike
Wary, Jean-Philippe
Zahariev, Alexander
description 5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.
doi_str_mv 10.1109/ACCESS.2018.2827419
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_8340149</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8340149</ieee_id><doaj_id>oai_doaj_org_article_876591b1b0cf4068a488a7b55ff287b2</doaj_id><sourcerecordid>2455930709</sourcerecordid><originalsourceid>FETCH-LOGICAL-c482t-f1376a368207ad40e9af70dc418cd05a1b52094e4335a61ddc6c808f4534d5a73</originalsourceid><addsrcrecordid>eNqFkU9PwjAYhxejiQT5BFyWePBghm__re1xQUQSogfUa9N1rQzQYreF8O0dzBA9-V765s3zew79RdEQwQghkHfZeDxZLEYYkBhhgTlF8izqYZTKhDCSnv_aL6NBVa2gHdGeGO9FN1m8sKYJZb2Ps2CWZW1N3QQbOx9iNo2fbL3zYV1dRRdObyo7-Hn70evD5GX8mMyfp7NxNk8MFbhOHCI81SQVGLguKFipHYfCUCRMAUyjnGGQ1FJCmE5RUZjUCBCOMkILpjnpR7POW3i9UttQfuiwV16X6njw4V3pUJdmY5XgKZMoRzkYRyEVmgqhec6Yc1jwHLeu285V7ey2yf_Y7su37GgLpSKEM9HSyf_0ul4qTAGzg_2647fBfzW2qtXKN-Gz_ZyWYEwS4CBbinSUCb6qgnUnLwJ1qE919alDfeqnvjY17FKltfaUEIQCopJ8A11skuo</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455930709</pqid></control><display><type>article</type><title>A Security Architecture for 5G Networks</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Arfaoui, Ghada ; Bisson, Pascal ; Blom, Rolf ; Borgaonkar, Ravishankar ; Englund, Hakan ; Felix, Edith ; Klaedtke, Felix ; Nakarmi, Prajwol Kumar ; Naslund, Mats ; O'Hanlon, Piers ; Papay, Juri ; Suomalainen, Jani ; Surridge, Mike ; Wary, Jean-Philippe ; Zahariev, Alexander</creator><creatorcontrib>Arfaoui, Ghada ; Bisson, Pascal ; Blom, Rolf ; Borgaonkar, Ravishankar ; Englund, Hakan ; Felix, Edith ; Klaedtke, Felix ; Nakarmi, Prajwol Kumar ; Naslund, Mats ; O'Hanlon, Piers ; Papay, Juri ; Suomalainen, Jani ; Surridge, Mike ; Wary, Jean-Philippe ; Zahariev, Alexander</creatorcontrib><description>5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2827419</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>5G mobile communication ; 5G mobile communication systems ; Architecture ; Business ; Commerce ; Computer architecture ; Cost effectiveness ; Electronic devices ; Electronic mail ; Industry ; Mobile communications ; Mobile security ; Mobile telecommunication systems ; Network architecture ; Network security ; Network slicing ; New business models ; Queueing networks ; Security ; Security Architecture ; Security aspects ; Security functions ; Security objectives ; Security requirements ; Smart cities ; Smart city ; Software-defined networking ; Telecommunication Networks ; Wireless networks</subject><ispartof>IEEE access, 2018-01, Vol.6 (17), p.22466-22479</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c482t-f1376a368207ad40e9af70dc418cd05a1b52094e4335a61ddc6c808f4534d5a73</citedby><cites>FETCH-LOGICAL-c482t-f1376a368207ad40e9af70dc418cd05a1b52094e4335a61ddc6c808f4534d5a73</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8340149$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>230,314,776,780,860,881,2096,27610,27901,27902,54908</link.rule.ids><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240252$$DView record from Swedish Publication Index$$Hfree_for_read</backlink><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-33758$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><creatorcontrib>Arfaoui, Ghada</creatorcontrib><creatorcontrib>Bisson, Pascal</creatorcontrib><creatorcontrib>Blom, Rolf</creatorcontrib><creatorcontrib>Borgaonkar, Ravishankar</creatorcontrib><creatorcontrib>Englund, Hakan</creatorcontrib><creatorcontrib>Felix, Edith</creatorcontrib><creatorcontrib>Klaedtke, Felix</creatorcontrib><creatorcontrib>Nakarmi, Prajwol Kumar</creatorcontrib><creatorcontrib>Naslund, Mats</creatorcontrib><creatorcontrib>O'Hanlon, Piers</creatorcontrib><creatorcontrib>Papay, Juri</creatorcontrib><creatorcontrib>Suomalainen, Jani</creatorcontrib><creatorcontrib>Surridge, Mike</creatorcontrib><creatorcontrib>Wary, Jean-Philippe</creatorcontrib><creatorcontrib>Zahariev, Alexander</creatorcontrib><title>A Security Architecture for 5G Networks</title><title>IEEE access</title><addtitle>Access</addtitle><description>5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.</description><subject>5G mobile communication</subject><subject>5G mobile communication systems</subject><subject>Architecture</subject><subject>Business</subject><subject>Commerce</subject><subject>Computer architecture</subject><subject>Cost effectiveness</subject><subject>Electronic devices</subject><subject>Electronic mail</subject><subject>Industry</subject><subject>Mobile communications</subject><subject>Mobile security</subject><subject>Mobile telecommunication systems</subject><subject>Network architecture</subject><subject>Network security</subject><subject>Network slicing</subject><subject>New business models</subject><subject>Queueing networks</subject><subject>Security</subject><subject>Security Architecture</subject><subject>Security aspects</subject><subject>Security functions</subject><subject>Security objectives</subject><subject>Security requirements</subject><subject>Smart cities</subject><subject>Smart city</subject><subject>Software-defined networking</subject><subject>Telecommunication Networks</subject><subject>Wireless networks</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNqFkU9PwjAYhxejiQT5BFyWePBghm__re1xQUQSogfUa9N1rQzQYreF8O0dzBA9-V765s3zew79RdEQwQghkHfZeDxZLEYYkBhhgTlF8izqYZTKhDCSnv_aL6NBVa2gHdGeGO9FN1m8sKYJZb2Ps2CWZW1N3QQbOx9iNo2fbL3zYV1dRRdObyo7-Hn70evD5GX8mMyfp7NxNk8MFbhOHCI81SQVGLguKFipHYfCUCRMAUyjnGGQ1FJCmE5RUZjUCBCOMkILpjnpR7POW3i9UttQfuiwV16X6njw4V3pUJdmY5XgKZMoRzkYRyEVmgqhec6Yc1jwHLeu285V7ey2yf_Y7su37GgLpSKEM9HSyf_0ul4qTAGzg_2647fBfzW2qtXKN-Gz_ZyWYEwS4CBbinSUCb6qgnUnLwJ1qE919alDfeqnvjY17FKltfaUEIQCopJ8A11skuo</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Arfaoui, Ghada</creator><creator>Bisson, Pascal</creator><creator>Blom, Rolf</creator><creator>Borgaonkar, Ravishankar</creator><creator>Englund, Hakan</creator><creator>Felix, Edith</creator><creator>Klaedtke, Felix</creator><creator>Nakarmi, Prajwol Kumar</creator><creator>Naslund, Mats</creator><creator>O'Hanlon, Piers</creator><creator>Papay, Juri</creator><creator>Suomalainen, Jani</creator><creator>Surridge, Mike</creator><creator>Wary, Jean-Philippe</creator><creator>Zahariev, Alexander</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>ADTPV</scope><scope>AOWAS</scope><scope>D8V</scope><scope>DOA</scope></search><sort><creationdate>20180101</creationdate><title>A Security Architecture for 5G Networks</title><author>Arfaoui, Ghada ; Bisson, Pascal ; Blom, Rolf ; Borgaonkar, Ravishankar ; Englund, Hakan ; Felix, Edith ; Klaedtke, Felix ; Nakarmi, Prajwol Kumar ; Naslund, Mats ; O'Hanlon, Piers ; Papay, Juri ; Suomalainen, Jani ; Surridge, Mike ; Wary, Jean-Philippe ; Zahariev, Alexander</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c482t-f1376a368207ad40e9af70dc418cd05a1b52094e4335a61ddc6c808f4534d5a73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>5G mobile communication</topic><topic>5G mobile communication systems</topic><topic>Architecture</topic><topic>Business</topic><topic>Commerce</topic><topic>Computer architecture</topic><topic>Cost effectiveness</topic><topic>Electronic devices</topic><topic>Electronic mail</topic><topic>Industry</topic><topic>Mobile communications</topic><topic>Mobile security</topic><topic>Mobile telecommunication systems</topic><topic>Network architecture</topic><topic>Network security</topic><topic>Network slicing</topic><topic>New business models</topic><topic>Queueing networks</topic><topic>Security</topic><topic>Security Architecture</topic><topic>Security aspects</topic><topic>Security functions</topic><topic>Security objectives</topic><topic>Security requirements</topic><topic>Smart cities</topic><topic>Smart city</topic><topic>Software-defined networking</topic><topic>Telecommunication Networks</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Arfaoui, Ghada</creatorcontrib><creatorcontrib>Bisson, Pascal</creatorcontrib><creatorcontrib>Blom, Rolf</creatorcontrib><creatorcontrib>Borgaonkar, Ravishankar</creatorcontrib><creatorcontrib>Englund, Hakan</creatorcontrib><creatorcontrib>Felix, Edith</creatorcontrib><creatorcontrib>Klaedtke, Felix</creatorcontrib><creatorcontrib>Nakarmi, Prajwol Kumar</creatorcontrib><creatorcontrib>Naslund, Mats</creatorcontrib><creatorcontrib>O'Hanlon, Piers</creatorcontrib><creatorcontrib>Papay, Juri</creatorcontrib><creatorcontrib>Suomalainen, Jani</creatorcontrib><creatorcontrib>Surridge, Mike</creatorcontrib><creatorcontrib>Wary, Jean-Philippe</creatorcontrib><creatorcontrib>Zahariev, Alexander</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>SwePub</collection><collection>SwePub Articles</collection><collection>SWEPUB Kungliga Tekniska Högskolan</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Arfaoui, Ghada</au><au>Bisson, Pascal</au><au>Blom, Rolf</au><au>Borgaonkar, Ravishankar</au><au>Englund, Hakan</au><au>Felix, Edith</au><au>Klaedtke, Felix</au><au>Nakarmi, Prajwol Kumar</au><au>Naslund, Mats</au><au>O'Hanlon, Piers</au><au>Papay, Juri</au><au>Suomalainen, Jani</au><au>Surridge, Mike</au><au>Wary, Jean-Philippe</au><au>Zahariev, Alexander</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Security Architecture for 5G Networks</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><issue>17</issue><spage>22466</spage><epage>22479</epage><pages>22466-22479</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2827419</doi><tpages>14</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2018-01, Vol.6 (17), p.22466-22479
issn 2169-3536
2169-3536
language eng
recordid cdi_ieee_primary_8340149
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects 5G mobile communication
5G mobile communication systems
Architecture
Business
Commerce
Computer architecture
Cost effectiveness
Electronic devices
Electronic mail
Industry
Mobile communications
Mobile security
Mobile telecommunication systems
Network architecture
Network security
Network slicing
New business models
Queueing networks
Security
Security Architecture
Security aspects
Security functions
Security objectives
Security requirements
Smart cities
Smart city
Software-defined networking
Telecommunication Networks
Wireless networks
title A Security Architecture for 5G Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T15%3A00%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Security%20Architecture%20for%205G%20Networks&rft.jtitle=IEEE%20access&rft.au=Arfaoui,%20Ghada&rft.date=2018-01-01&rft.volume=6&rft.issue=17&rft.spage=22466&rft.epage=22479&rft.pages=22466-22479&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2827419&rft_dat=%3Cproquest_ieee_%3E2455930709%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455930709&rft_id=info:pmid/&rft_ieee_id=8340149&rft_doaj_id=oai_doaj_org_article_876591b1b0cf4068a488a7b55ff287b2&rfr_iscdi=true