Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments

被引:7
作者
Vassilakis, Vassilios [1 ]
Panaousis, Emmanouil [2 ]
Mouratidis, Haralambos [2 ]
机构
[1] Univ West London, Sch Comp & Engn, London, England
[2] Univ Brighton, Sch Comp Engn & Math, Secure & Dependable Software Syst Res Cluster, Brighton, E Sussex, England
来源
INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016 | 2016年 / 9895卷
关键词
Security; Small cell as a service; Network functions virtualization; Mobile edge computing; 5G; NETWORK FUNCTION VIRTUALIZATION; 5G NETWORKS; ARCHITECTURE; HETNETS; SDN;
D O I
10.1007/978-3-319-45931-8_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are going to extensively rely on dense small cell deployments, which would exploit infrastructure and network functions virtualization (NFV), and push the network intelligence towards network edges by embracing the concept of mobile edge computing (MEC). As security will be a fundamental enabling factor of small cell as a service (SCaaS) in 5G networks, we present the most prominent threats and vulnerabilities against a broad range of targets. As far as the related work is concerned, to the best of our knowledge, this paper is the first to investigate security challenges at the intersection of SCaaS, NFV, and MEC. It is also the first paper that proposes a set of criteria to facilitate a clear and effective taxonomy of security challenges of main elements of 5G networks. Our analysis can serve as a staring point towards the development of appropriate 5G security solutions. These will have crucial effect on legal and regulatory frameworks as well as on decisions of businesses, governments, and end-users.
引用
收藏
页码:70 / 84
页数:15
相关论文
共 57 条
[11]   Software-Defined Mobile Networks Security [J].
Chen, Min ;
Qian, Yongfeng ;
Mao, Shiwen ;
Tang, Wan ;
Yang, Ximin .
MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05) :729-743
[12]   When Crowdsourcing Meets Mobile Sensing: A Social Network Perspective [J].
Chen, Pin-Yu ;
Cheng, Shin-Ming ;
Ting, Pai-Shun ;
Lien, Chia-Wei ;
Chu, Fu-Jen .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (10) :157-163
[13]   EMERGING TECHNOLOGIES AND RESEARCH CHALLENGES FOR 5G WIRELESS NETWORKS [J].
Chin, Woon Hau ;
Fan, Zhong ;
Haines, Russell .
IEEE WIRELESS COMMUNICATIONS, 2014, 21 (02) :106-112
[14]  
Davi Lucas, 2012, 19 ANN NETW DISTR SY
[15]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[16]   Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking [J].
Duan, Xiaoyu ;
Wang, Xianbin .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) :28-35
[17]   Introducing Mobile Edge Computing Capabilities through Distributed 5G Cloud Enabled Small Cells [J].
Oscar Fajardo, Jose ;
Liberal, Fidel ;
Giannoulakis, Ioannis ;
Kafetzakis, Emmanouil ;
Pii, Vincenzo ;
Trajkovska, Irena ;
Bohnert, Thomas Michael ;
Goratti, Leonardo ;
Riggio, Roberto ;
Garcia Lloreda, Javier ;
Sayyad Khodashenas, Pouria ;
Paolino, Michele ;
Bliznakov, Pavel ;
Perez-Romero, Jordi ;
Meani, Claudio ;
Chochliouros, Ioannis ;
Belesioti, Maria .
MOBILE NETWORKS & APPLICATIONS, 2016, 21 (04) :564-574
[18]   Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns [J].
Findling, Rainhard Dieter ;
Mayrhofer, Rene .
PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS MULTIMEDIA (MUM 2015), 2015, :131-135
[19]  
Fragkiadakis Alexandros, 2014, Distributed, Ambient, and Pervasive Interactions. Second International Conference (DAPI 2014) Held as Part of HCI International 2014. Proceedings: LNCS 8530, P427, DOI 10.1007/978-3-319-07788-8_40
[20]   Distributed Mobility Management for Future 5G Networks: Overview and Analysis of Existing Approaches [J].
Giust, Fabio ;
Cominardi, Luca ;
Bernardos, Carlos J. .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (01) :142-149