Abstract
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.
Original language | English |
---|---|
Pages (from-to) | 22466-22479 |
Number of pages | 14 |
Journal | IEEE Access |
Volume | 6 |
DOIs | |
Publication status | Published - 17 Apr 2018 |
MoE publication type | A1 Journal article-refereed |
Fingerprint
Keywords
- 5G
- 5G mobile communication
- Architecture
- Business
- Computer architecture
- Electronic mail
- Network slicing
- Security
- Smart cities
- Telecommunication Networks
Cite this
}
A Security Architecture for 5G Networks. / Arfaoui, Ghada; Bisson, Pascal; Blom, Rolf; Borgaonkar, Ravishankar; Englund, Hakan; Felix, Edith; Klaedtke, Felix; Nakarmi, Prajwol Kumar; Naslund, Mats; O'Hanlon, Piers; Papay, Juri; Suomalainen, Jani; Surridge, Mike; Wary, Jean Philippe; Zahariev, Alexander.
In: IEEE Access, Vol. 6, 17.04.2018, p. 22466-22479.Research output: Contribution to journal › Article › Scientific › peer-review
TY - JOUR
T1 - A Security Architecture for 5G Networks
AU - Arfaoui, Ghada
AU - Bisson, Pascal
AU - Blom, Rolf
AU - Borgaonkar, Ravishankar
AU - Englund, Hakan
AU - Felix, Edith
AU - Klaedtke, Felix
AU - Nakarmi, Prajwol Kumar
AU - Naslund, Mats
AU - O'Hanlon, Piers
AU - Papay, Juri
AU - Suomalainen, Jani
AU - Surridge, Mike
AU - Wary, Jean Philippe
AU - Zahariev, Alexander
PY - 2018/4/17
Y1 - 2018/4/17
N2 - 5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.
AB - 5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.
KW - 5G
KW - 5G mobile communication
KW - Architecture
KW - Business
KW - Computer architecture
KW - Electronic mail
KW - Network slicing
KW - Security
KW - Smart cities
KW - Telecommunication Networks
UR - http://www.scopus.com/inward/record.url?scp=85045763510&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2018.2827419
DO - 10.1109/ACCESS.2018.2827419
M3 - Article
AN - SCOPUS:85045763510
VL - 6
SP - 22466
EP - 22479
JO - IEEE Access
JF - IEEE Access
SN - 2169-3536
ER -