Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments

被引:7
作者
Vassilakis, Vassilios [1 ]
Panaousis, Emmanouil [2 ]
Mouratidis, Haralambos [2 ]
机构
[1] Univ West London, Sch Comp & Engn, London, England
[2] Univ Brighton, Sch Comp Engn & Math, Secure & Dependable Software Syst Res Cluster, Brighton, E Sussex, England
来源
INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016 | 2016年 / 9895卷
关键词
Security; Small cell as a service; Network functions virtualization; Mobile edge computing; 5G; NETWORK FUNCTION VIRTUALIZATION; 5G NETWORKS; ARCHITECTURE; HETNETS; SDN;
D O I
10.1007/978-3-319-45931-8_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are going to extensively rely on dense small cell deployments, which would exploit infrastructure and network functions virtualization (NFV), and push the network intelligence towards network edges by embracing the concept of mobile edge computing (MEC). As security will be a fundamental enabling factor of small cell as a service (SCaaS) in 5G networks, we present the most prominent threats and vulnerabilities against a broad range of targets. As far as the related work is concerned, to the best of our knowledge, this paper is the first to investigate security challenges at the intersection of SCaaS, NFV, and MEC. It is also the first paper that proposes a set of criteria to facilitate a clear and effective taxonomy of security challenges of main elements of 5G networks. Our analysis can serve as a staring point towards the development of appropriate 5G security solutions. These will have crucial effect on legal and regulatory frameworks as well as on decisions of businesses, governments, and end-users.
引用
收藏
页码:70 / 84
页数:15
相关论文
共 57 条
[1]   Link-Level Access Cloud Architecture Design Based on SDN for 5G Networks [J].
Ameigeiras, Pablo ;
Ramos-Munoz, Juan J. ;
Schumacher, Laurent ;
Prados-Garzon, Jonathan ;
Navarro-Ortiz, Jorge ;
Lopez-Soler, Juan M. .
IEEE NETWORK, 2015, 29 (02) :24-31
[2]   Understanding the IoT connectivity landscape: A contemporary M2M radio technology roadmap [J].
Andreev, Sergey ;
Galinina, Olga ;
Pyattaev, Alexander ;
Gerasimenko, Mikhail ;
Tirronen, Tuomas ;
Torsner, Johan ;
Sachs, Joachim ;
Dohler, Mischa ;
Koucheryavy, Yevgeni .
IEEE Communications Magazine, 2015, 53 (09) :32-40
[3]   Seven Ways that HetNets Are a Cellular Paradigm Shift [J].
Andrews, Jeffrey G. .
IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (03) :136-144
[4]  
[Anonymous], 2 IEEE C NETW SOFTW
[5]  
[Anonymous], 2009, SEC GUID CRIT AR FOC
[6]  
[Anonymous], 11 WEB INF SYST APPL
[7]  
Armando A., 2013, 28 ACM S APPL COMP C
[8]   Cache-leakage resilient OS isolation in an idealized model of virtualization [J].
Barthe, Gilles ;
Betarte, Gustavo ;
Campo, Juan Diego ;
Luna, Carlos .
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, :186-197
[9]   Implementing TLS with Verified Cryptographic Security [J].
Bhargavan, Karthikeyan ;
Fournet, Cedric ;
Kohlweiss, Markulf ;
Pironti, Alfredo ;
Strub, Pierre-Yves .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :445-459
[10]   Five Disruptive Technology Directions for 5G [J].
Boccardi, Federico ;
Heath, Robert W., Jr. ;
Lozano, Angel ;
Marzetta, Thomas L. ;
Popovski, Petar .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (02) :74-80