NFV security survey in 5G networks: A three-dimensional threat taxonomy

被引:39
|
作者
Madi, Taous [1 ]
Alameddine, Hyame Assem [1 ]
Pourzandi, Makan [1 ]
Boukhtouta, Amine [1 ]
机构
[1] Ericsson Secur Res, Montreal, PQ, Canada
关键词
Security; Network function virtualization; 5G networks; Business model; Multi-site deployment; Multi-domain deployment; OF-THE-ART; SERVICE; TECHNOLOGY; CHALLENGES; CLOUD;
D O I
10.1016/j.comnet.2021.108288
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fifth Generation (5G) networks aim at providing value-added services with advanced performance such as low-latency communications, high reliability, high data rates and capacity to support an increasing number of connected devices. 5G networks are enabled by an automated and flexible provisioning and management of resources and services deployed over a shared infrastructure spanning multiple sites and domains and governed by different business players. This drives towards a complex 5G ecosystem enabled by Network Function Virtualization (NFV) and promoted by multiple business collaborations which draw new threats and vulnerabilities that are yet to be explored. Thus, we explore in this survey the complexity of the 5G ecosystem and derive a 5G telecommunication business model driven by 5G enabling technologies. We use this business model to identify new attack surface and security threats introduced by multiple business collaborations supported by NFV which we overview. Further, we delineate a three dimensional threat taxonomy for NFVbased 5G networks that leverages NFV architecture and deployment use cases in light of different 5G business collaboration scenarios. Finally, we shed light on insightful future research directions towards providing enhanced security in NFV-based 5G networks.
引用
收藏
页数:29
相关论文
共 50 条
  • [21] Securing 5G Cloud Native NFV architecture with Zero Trust Security
    Sajid, Taha
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [22] Security Trust Zone in 5G Networks
    Han, Bin
    Wong, Stan
    Mannweiler, Christian
    Dohler, Mischa
    Schotten, Hans D.
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [23] Use of 5G networks in security technologies
    Dostalova, Petra
    Hromada, Martin
    PRZEGLAD ELEKTROTECHNICZNY, 2023, 99 (08): : 87 - 91
  • [24] 5G Internet of Things: A survey
    Li, Shancang
    Xu, Li Da
    Zhao, Shanshan
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2018, 10 : 1 - 9
  • [25] Security for 5G Mobile Wireless Networks
    Fang, Dongfeng
    Qian, Yi
    Hu, Rose Qingyang
    IEEE ACCESS, 2018, 6 : 4850 - 4874
  • [26] When Agile Security Meets 5G
    Carvalho, Glaucio H. S.
    Woungang, Isaac
    Anpalagan, Alagan
    Traore, Issa
    IEEE ACCESS, 2020, 8 (08): : 166212 - 166225
  • [27] Security for 5G and Beyond
    Ahmad, Ijaz
    Shahabuddin, Shahriar
    Kumar, Tanesh
    Okwuibe, Jude
    Gurtov, Andrei
    Ylianttila, Mika
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) : 3682 - 3722
  • [28] 5G Security: Analysis of Threats and Solutions
    Ahmad, Ijaz
    Kumar, Tanesh
    Liyanage, Madhusanka
    Okwuibe, Jude
    Ylianttila, Mika
    Gurtov, Andrei
    2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2017, : 193 - 199
  • [29] Survey of Promising Technologies for 5G Networks
    Le, Nam Tuan
    Hossain, Mohammad Arif
    Islam, Amirul
    Kim, Do-yun
    Choi, Young-June
    Jang, Yeong Min
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [30] 5G radio access networks: A survey
    Pana, Vuyo S.
    Babalola, Oluwaseyi P.
    Balyan, Vipin
    ARRAY, 2022, 14