NFV security survey in 5G networks: A three-dimensional threat taxonomy

被引:43
作者
Madi, Taous [1 ]
Alameddine, Hyame Assem [1 ]
Pourzandi, Makan [1 ]
Boukhtouta, Amine [1 ]
机构
[1] Ericsson Secur Res, Montreal, PQ, Canada
关键词
Security; Network function virtualization; 5G networks; Business model; Multi-site deployment; Multi-domain deployment; OF-THE-ART; SERVICE; TECHNOLOGY; CHALLENGES; CLOUD;
D O I
10.1016/j.comnet.2021.108288
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fifth Generation (5G) networks aim at providing value-added services with advanced performance such as low-latency communications, high reliability, high data rates and capacity to support an increasing number of connected devices. 5G networks are enabled by an automated and flexible provisioning and management of resources and services deployed over a shared infrastructure spanning multiple sites and domains and governed by different business players. This drives towards a complex 5G ecosystem enabled by Network Function Virtualization (NFV) and promoted by multiple business collaborations which draw new threats and vulnerabilities that are yet to be explored. Thus, we explore in this survey the complexity of the 5G ecosystem and derive a 5G telecommunication business model driven by 5G enabling technologies. We use this business model to identify new attack surface and security threats introduced by multiple business collaborations supported by NFV which we overview. Further, we delineate a three dimensional threat taxonomy for NFVbased 5G networks that leverages NFV architecture and deployment use cases in light of different 5G business collaboration scenarios. Finally, we shed light on insightful future research directions towards providing enhanced security in NFV-based 5G networks.
引用
收藏
页数:29
相关论文
共 189 条
[1]  
3GPP, 2019, 3GPP Standard TS 23.501
[2]  
5G Americas, 2019, The Evolution of Security in 5G, a Slice of Mobile Threats
[3]  
5G Infrastructure Association, 2015, 5G INFR PUBL PRIV PA
[4]  
AbdElRahem O, 2016, PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), P32, DOI 10.1109/ICCES.2016.7821971
[5]   Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment [J].
Abdulqadder, Ihsan H. ;
Zou, Deqing ;
Aziz, Israa T. ;
Yuan, Bin ;
Dai, Weiqi .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) :866-877
[6]  
Abdulrahman E.B.F., 2019, P 8 AS C PATT LANG P
[7]  
Ahmad Ijaz, 2018, IEEE Communications Standards Magazine, V2, P36, DOI 10.1109/MCOMSTD.2018.1700063
[8]   Security for 5G and Beyond [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Kumar, Tanesh ;
Okwuibe, Jude ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3682-3722
[9]  
Ahmad I, 2017, 2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), P193, DOI 10.1109/CSCN.2017.8088621
[10]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346