A Security Architecture for 5G Networks

Ghada Arfaoui, Pascal Bisson, Rolf Blom, Ravishankar Borgaonkar, Hakan Englund, Edith Felix, Felix Klaedtke, Prajwol Kumar Nakarmi, Mats Naslund, Piers O'Hanlon, Juri Papay, Jani Suomalainen, Mike Surridge, Jean Philippe Wary, Alexander Zahariev

    Research output: Contribution to journalArticleScientificpeer-review

    7 Citations (Scopus)

    Abstract

    5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.

    Original languageEnglish
    Pages (from-to)22466-22479
    Number of pages14
    JournalIEEE Access
    Volume6
    DOIs
    Publication statusPublished - 17 Apr 2018
    MoE publication typeA1 Journal article-refereed

    Fingerprint

    Costs
    Industry
    Network function virtualization
    Smart city
    Software defined networking
    Internet of things

    Keywords

    • 5G
    • 5G mobile communication
    • Architecture
    • Business
    • Computer architecture
    • Electronic mail
    • Network slicing
    • Security
    • Smart cities
    • Telecommunication Networks

    Cite this

    Arfaoui, G., Bisson, P., Blom, R., Borgaonkar, R., Englund, H., Felix, E., ... Zahariev, A. (2018). A Security Architecture for 5G Networks. IEEE Access, 6, 22466-22479. https://doi.org/10.1109/ACCESS.2018.2827419
    Arfaoui, Ghada ; Bisson, Pascal ; Blom, Rolf ; Borgaonkar, Ravishankar ; Englund, Hakan ; Felix, Edith ; Klaedtke, Felix ; Nakarmi, Prajwol Kumar ; Naslund, Mats ; O'Hanlon, Piers ; Papay, Juri ; Suomalainen, Jani ; Surridge, Mike ; Wary, Jean Philippe ; Zahariev, Alexander. / A Security Architecture for 5G Networks. In: IEEE Access. 2018 ; Vol. 6. pp. 22466-22479.
    @article{8cbeec51bd8d40d4b985498ac8536108,
    title = "A Security Architecture for 5G Networks",
    abstract = "5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.",
    keywords = "5G, 5G mobile communication, Architecture, Business, Computer architecture, Electronic mail, Network slicing, Security, Smart cities, Telecommunication Networks",
    author = "Ghada Arfaoui and Pascal Bisson and Rolf Blom and Ravishankar Borgaonkar and Hakan Englund and Edith Felix and Felix Klaedtke and Nakarmi, {Prajwol Kumar} and Mats Naslund and Piers O'Hanlon and Juri Papay and Jani Suomalainen and Mike Surridge and Wary, {Jean Philippe} and Alexander Zahariev",
    year = "2018",
    month = "4",
    day = "17",
    doi = "10.1109/ACCESS.2018.2827419",
    language = "English",
    volume = "6",
    pages = "22466--22479",
    journal = "IEEE Access",
    issn = "2169-3536",
    publisher = "IEEE Institute of Electrical and Electronic Engineers",

    }

    Arfaoui, G, Bisson, P, Blom, R, Borgaonkar, R, Englund, H, Felix, E, Klaedtke, F, Nakarmi, PK, Naslund, M, O'Hanlon, P, Papay, J, Suomalainen, J, Surridge, M, Wary, JP & Zahariev, A 2018, 'A Security Architecture for 5G Networks', IEEE Access, vol. 6, pp. 22466-22479. https://doi.org/10.1109/ACCESS.2018.2827419

    A Security Architecture for 5G Networks. / Arfaoui, Ghada; Bisson, Pascal; Blom, Rolf; Borgaonkar, Ravishankar; Englund, Hakan; Felix, Edith; Klaedtke, Felix; Nakarmi, Prajwol Kumar; Naslund, Mats; O'Hanlon, Piers; Papay, Juri; Suomalainen, Jani; Surridge, Mike; Wary, Jean Philippe; Zahariev, Alexander.

    In: IEEE Access, Vol. 6, 17.04.2018, p. 22466-22479.

    Research output: Contribution to journalArticleScientificpeer-review

    TY - JOUR

    T1 - A Security Architecture for 5G Networks

    AU - Arfaoui, Ghada

    AU - Bisson, Pascal

    AU - Blom, Rolf

    AU - Borgaonkar, Ravishankar

    AU - Englund, Hakan

    AU - Felix, Edith

    AU - Klaedtke, Felix

    AU - Nakarmi, Prajwol Kumar

    AU - Naslund, Mats

    AU - O'Hanlon, Piers

    AU - Papay, Juri

    AU - Suomalainen, Jani

    AU - Surridge, Mike

    AU - Wary, Jean Philippe

    AU - Zahariev, Alexander

    PY - 2018/4/17

    Y1 - 2018/4/17

    N2 - 5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.

    AB - 5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.

    KW - 5G

    KW - 5G mobile communication

    KW - Architecture

    KW - Business

    KW - Computer architecture

    KW - Electronic mail

    KW - Network slicing

    KW - Security

    KW - Smart cities

    KW - Telecommunication Networks

    UR - http://www.scopus.com/inward/record.url?scp=85045763510&partnerID=8YFLogxK

    U2 - 10.1109/ACCESS.2018.2827419

    DO - 10.1109/ACCESS.2018.2827419

    M3 - Article

    AN - SCOPUS:85045763510

    VL - 6

    SP - 22466

    EP - 22479

    JO - IEEE Access

    JF - IEEE Access

    SN - 2169-3536

    ER -

    Arfaoui G, Bisson P, Blom R, Borgaonkar R, Englund H, Felix E et al. A Security Architecture for 5G Networks. IEEE Access. 2018 Apr 17;6:22466-22479. https://doi.org/10.1109/ACCESS.2018.2827419