Security and Privacy

被引:0
|
作者
Dutta, Ashutosh [1 ]
Hammad, Eman [2 ]
Enright, Michael [3 ]
Behmann, Fawzi [4 ]
Chorti, Arsenia [5 ]
Cheema, Ahmad [6 ]
Kadio, Kassi [6 ]
Urbina-Pineda, Julia [7 ,8 ]
Alam, Khaled [9 ]
Limam, Ahmed [10 ]
Chu, Fred [11 ]
Lester, John [12 ]
Park, Jong-Geun [13 ]
Bio-Ukeme, Joseph [14 ]
Pawar, Sanjay S. [15 ]
Layton, Roslyn [16 ]
Ramchandran, Prakash [17 ]
Okonkwo, Kingsley [18 ]
Ong, Lyndon [19 ]
Emmelmann, Marc [20 ]
Issa, Omneya [21 ]
Arul, Rajakumar [22 ]
Malik, Sireen [23 ]
Krishnan, Sivarama [24 ]
Sugumar, Suresh [17 ]
Lala, Tk [25 ]
Borst, Matthew [26 ]
Kloza, Brad [26 ]
机构
[1] Johns Hopkins Univ, Appl Phys Lab, Baltimore, MD 21218 USA
[2] Texas A&M Univ, RELLIS, College Stn, TX 77843 USA
[3] Quantum Dimens Inc, Huntington Beach, CA USA
[4] TelNet Management Consulting Inc, IEEE ComSoc North Amer Reg Board, Round Rock, TX USA
[5] ENSEA, CNRS, Paris, France
[6] Shared Serv Canada, Ottawa, ON, Canada
[7] IEEE HKN, Piscataway, NJ USA
[8] CyberIIoT, Gurugram, Haryana, India
[9] Rogers Commun, Toronto, ON, Canada
[10] Higher Inst Engn & Technol ESPRIT, Tunis, Tunisia
[11] Univ Calif Los Angeles, Los Angeles, CA USA
[12] Our Lady Fatima Univ Valenzuela, Valenzuela, Philippines
[13] Seoul Natl Univ Sci & Technol, Seoul, South Korea
[14] Carleton Univ, Ottawa, ON, Canada
[15] Usha Mittal Univ Technol, Mumbai, Maharashtra, India
[16] Aalborg Univ, Aalborg, Denmark
[17] Intel Corp, Santa Clara, CA USA
[18] Chevron, San Ramon, CA USA
[19] Ciena, Hanover, MD USA
[20] Fraunhofer FOKUS, Berlin, Germany
[21] Dept Natl Def, Ottawa, ON, Canada
[22] Amrita Vishwa Vidyapeetham, Bangalore, Karnataka, India
[23] T Mobile, Bonn, Germany
[24] Natl Lib Med, Bethesda, MD 20894 USA
[25] ZecureZ Consulting Co, Thana, Maharashtra, India
[26] IEEE Future Networks Initiat, Santa Clara, CA USA
关键词
5G Cybersecurity; security; privacy; data protection; reliability; resilience; mMTC; URLLC; SDN/NFV; cyber risk assessment and management; threat scenarios; cyber-attacks; security controls; mitigation; defense; INTERNET;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The digital transformation brought on by 5G is redefining current models of end-to-end (E2E) connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights the importance of embedding security capabilities from the very beginning while the 5G architecture is being defined and standardized. Security requirements need to overlay and permeate through the different layers of 5G systems (physical, network, and application) as well as different parts of an E2E 5G architecture within a risk-management framework that takes into account the evolving security-threats landscape. 5G presents a typical use-case of wireless communication and computer networking convergence, where 5G fundamental building blocks include components such as Software Defined Networks (SDN), Network Functions Virtualization (NFV) and the edge cloud. This convergence extends many of the security challenges and opportunities applicable to SDN/NFV and cloud to 5G networks. Thus, 5G security needs to consider additional security requirements (compared to previous generations) such as SDN controller security, hypervisor security, orchestrator security, cloud security, edge security, etc. At the same time, 5G networks offer security improvement opportunities that should be considered. Here, 5G architectural flexibility, programmability and complexity can be harnessed to improve resilience and reliability. The working group scope fundamentally addresses the following: center dot 5G security considerations need to overlay and permeate through the different layers of the 5G systems (physical, network, and application) as well as different parts of an E2E 5G architecture including a risk management framework that takes into account the evolving security threats landscape. center dot 5G exemplifies a use-case of heterogeneous access and computer networking convergence, which extends a unique set of security challenges and opportunities (e.g., related to SDN/NFV and edge cloud, etc.) to 5G networks. Similarly, 5G networks by design offer potential security benefits and opportunities through harnessing the architecture flexibility, programmability and complexity to improve its resilience and reliability. center dot The IEEE FNI security WG's roadmap framework follows a taxonomic structure, differentiating the 5G functional pillars and corresponding cybersecurity risks. As part of cross collaboration, the security working group will also look into the security issues associated with other roadmap working groups within the IEEE Future Network Initiative. Disclaimer: in this document we use 5G to refer to future networks including evolution such as B5G, 6G, etc.
引用
收藏
页数:71
相关论文
共 50 条
  • [1] Usable Security and Privacy for Security and Privacy Workers
    Zurko, Mary Ellen
    Haney, Julie
    IEEE SECURITY & PRIVACY, 2023, 21 (01) : 8 - 10
  • [2] Security and privacy
    Geer, D
    Gong, L
    Ranum, M
    Neuman, C
    Zurko, ME
    IEEE CONCURRENCY, 2000, 8 (02): : 70 - 79
  • [3] Security and Privacy
    Davies, N
    IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 20 - 20
  • [4] Security and Privacy
    Dutta, Ashutosh
    Hammad, Eman
    Enright, Michael A.
    Chorti, Arsenia
    Pawar, Sanjay S.
    Urbina-Pineda, Julia
    Kurt, Gunes Karabulut
    Cheema, Ahmad Raza
    Taha, Sajid
    Chng, Baw
    Rawal, Bharat S.
    de Carvalho, Glaucio H. S.
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [5] Privacy and security
    Moglen, Eben
    Communications of the ACM, 2013, 56 (02) : 20 - 22
  • [6] Security & privacy
    Hong, Jason
    Satyanarayan, Mahadev
    Cybenko, George
    IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 15 - 17
  • [7] Privacy and Security
    Consolvo, Sunny
    Hong, Jason
    Langheinrich, Marc
    IEEE PERVASIVE COMPUTING, 2015, 14 (01) : 16 - 17
  • [8] Security and Privacy: Why Privacy Matters
    Bird, Stephanie J.
    SCIENCE AND ENGINEERING ETHICS, 2013, 19 (03) : 669 - 671
  • [9] Security and Privacy: Why Privacy Matters
    Stephanie J. Bird
    Science and Engineering Ethics, 2013, 19 : 669 - 671
  • [10] The ethics of trading privacy for security: The multifaceted effects of privacy on liberty and security
    Satra, Henrik Skaug
    TECHNOLOGY IN SOCIETY, 2022, 68