A Security Architecture for 5G Networks

Ghada Arfaoui, Pascal Bisson, Rolf Blom, Ravishankar Borgaonkar, Hakan Englund, Edith Felix, Felix Klaedtke, Prajwol Kumar Nakarmi, Mats Naslund, Piers O'Hanlon, Juri Papay, Jani Suomalainen, Mike Surridge, Jean Philippe Wary, Alexander Zahariev

    Research output: Contribution to journalArticleScientificpeer-review

    61 Citations (Scopus)

    Abstract

    5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.
    Original languageEnglish
    Pages (from-to)22466-22479
    JournalIEEE Access
    Volume6
    DOIs
    Publication statusPublished - 17 Apr 2018
    MoE publication typeA1 Journal article-refereed

    Keywords

    • 5G
    • 5G mobile communication
    • Architecture
    • Business
    • Computer architecture
    • Electronic mail
    • Network slicing
    • Security
    • Smart cities
    • Telecommunication Networks

    Fingerprint

    Dive into the research topics of 'A Security Architecture for 5G Networks'. Together they form a unique fingerprint.

    Cite this