Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services

被引:0
|
作者
Varadharajan, Vijay [1 ]
Tupakula, Uday [1 ]
Karmakar, Kallol Krishna [1 ]
机构
[1] Univ Newcastle, Adv Cyber Secur Engn Res Ctr, Newcastle, NSW, Australia
关键词
5G security; SDN Security; Security Architecture; State based Security Attack Detection; NFV Security;
D O I
10.1109/NetSoft51509.2021.9492704
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 5G network systems are evolving and have complex network infrastructures. There is a great deal of work in this area focused on meeting the stringent service requirements for the 5G networks. Within this context, security requirements play a critical role as 5G networks can support a range of services such as healthcare services, financial and critical infrastructures. 3GPP and ETSI have been developing security frameworks for 5G networks. Our work in 5G security has been focusing on the design of security architecture and mechanisms enabling dynamic establishment of secure and trusted end to end services as well as development of mechanisms to proactively detect and mitigate security attacks in virtualised network infrastructures. The focus of this paper is on the latter, namely the facilities and mechanisms, and the design of a security architecture providing facilities and mechanisms to detect and mitigate specific security attacks. We have developed a simplified version of the security architecture using Software Defined Networks (SDN) and Network Function Virtualisation (NFV) technologies. The specific security functions developed in this architecture can be directly integrated into the 5G core network facilities enhancing its security.
引用
收藏
页码:273 / 277
页数:5
相关论文
共 50 条
  • [1] A SOFTWARE DEFINED SECURITY ARCHITECTURE FOR SDN-BASED 5G NETWORK
    Liang, Xiaodong
    Qiu, Xiaofeng
    PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 17 - 21
  • [2] Techniques for Securing 5G Network Services from attacks
    Varadharajan, Vijay
    Tupakula, Uday
    Karmakar, Kallol Krishna
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 273 - 280
  • [3] Securing 5G Cloud Native NFV architecture with Zero Trust Security
    Sajid, Taha
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [4] SDN VANETs in 5G: An Architecture for Resilient Security Services
    Hussein, Ali
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2017 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2017, : 67 - 74
  • [5] 5G Wireless Security and Privacy: Architecture and Flexible Mechanisms
    Fang, Dongfeng
    Qian, Yi
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2020, 15 (02): : 58 - 64
  • [6] Securing video cloud storage by ERBAC mechanisms in 5g enabled vehicular networks
    R. Gopi
    A. Rajesh
    Cluster Computing, 2017, 20 : 3489 - 3497
  • [7] Securing video cloud storage by ERBAC mechanisms in 5g enabled vehicular networks
    Gopi, R.
    Rajesh, A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (04): : 3489 - 3497
  • [8] Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service
    Blanc, Gregory
    Kheir, Nizar
    Ayed, Dhouha
    Lefebvre, Vincent
    de Oca, Edgardo Montes
    Bisson, Pascal
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [9] 5G Network and Security
    Jinsong, Ma
    Yamin, Mohammad
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 249 - 254
  • [10] A Security Architecture for 5G Networks
    Arfaoul, Ghada
    Bisson, Pascal
    Blom, Rolf
    Borgaonkar, Ravishankar
    Englund, Hakan
    Felix, Edith
    Klaedtke, Felix
    Nakarmi, Prajwol Kumar
    Naslund, Mats
    O'Hanlon, Piers
    Papay, Juri
    Suomalainen, Jani
    Surridge, Mike
    Wary, Jean-Philippe
    Zahariev, Alexander
    IEEE ACCESS, 2018, 6 : 22466 - 22479