A Security Architecture for 5G Networks

Ghada Arfaoui, Pascal Bisson, Rolf Blom, Ravishankar Borgaonkar, Hakan Englund, Edith Felix, Felix Klaedtke, Prajwol Kumar Nakarmi, Mats Naslund, Piers O'Hanlon, Juri Papay, Jani Suomalainen, Mike Surridge, Jean Philippe Wary, Alexander Zahariev

    Research output: Contribution to journalArticleScientificpeer-review

    53 Citations (Scopus)


    5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.
    Original languageEnglish
    Pages (from-to)22466-22479
    JournalIEEE Access
    Publication statusPublished - 17 Apr 2018
    MoE publication typeA1 Journal article-refereed


    This work was supported in part by the European Union’s Horizon 2020 Research and Innovation Program under Grant 671562 and in part by Business Finland through the CORNET Project.


    • 5G
    • 5G mobile communication
    • Architecture
    • Business
    • Computer architecture
    • Electronic mail
    • Network slicing
    • Security
    • Smart cities
    • Telecommunication Networks


    Dive into the research topics of 'A Security Architecture for 5G Networks'. Together they form a unique fingerprint.

    Cite this