A Security Architecture for 5G Networks

5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.

[1]  Valtteri Niemi,et al.  Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.

[2]  Taoka Hidekazu,et al.  Scenarios for 5G mobile and wireless communications: the vision of the METIS project , 2014, IEEE Communications Magazine.

[3]  Sibel Adali,et al.  A Survey on Trust Modeling , 2015, ACM Comput. Surv..

[4]  Gunnar Björkman,et al.  An Enhanced Risk-Assessment Methodology for Smart Grids , 2017, Computer.

[5]  Keith Kirkpatrick,et al.  Software-defined networking , 2013, CACM.

[6]  Günther Horn,et al.  Towards 5G Security , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[7]  Ghassan O. Karame,et al.  On the Fingerprinting of Software-Defined Networks , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Georgios Mantas,et al.  Security for 5G Communications , 2015 .

[9]  Costas Kalogiros,et al.  Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems , 2015, CAiSE Forum.

[10]  Anass Benjebbour,et al.  Design considerations for a 5G network architecture , 2014, IEEE Communications Magazine.

[11]  Mehdi Mani,et al.  Use Cases for Authentication and Authorization in Constrained Environments , 2016, RFC.

[12]  Xiaoyu Chen,et al.  Maintaining Trustworthiness of Socio-Technical Systems at Run-Time , 2014, TrustBus.

[13]  Van-Giang Nguyen,et al.  SDN and Virtualization-Based LTE Mobile Network Architectures: A Comprehensive Survey , 2016, Wirel. Pers. Commun..

[14]  Andrei Gurtov,et al.  Leveraging LTE security with SDN and NFV , 2015, 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS).