Security Architecture for Trustworthy Systems in 5G Era

07/29/2020
by   Takayuki Sasaki, et al.
0

Systems using 5G are expected to be used in various cases of Society 5.0 and Industrie 4.0 such as smart cities, smart factories, and also critical infrastructures. These systems are essential for our life, thus cyberattacks against the system must be prevented. In this paper, we tackle two problems posed by 5G features: system construction using multi-vendor devices and softwarized functions. Specifically, there are supply-chain risks that malicious devices are used in the construction phase. Moreover, the softwarized network functions are easy to be attacked compared to hardware. To cope with these problems, we propose a concept of architecture comprising a blockchain to record security events including supply-chain information and a tamper detection engine to ensure the integrity of software components in 5G system. We implement the initial prototype of the architecture and show its feasibility.

READ FULL TEXT
research
09/11/2022

Towards Security Enhancement of Blockchain-based Supply Chain Management

The cybersecurity of modern systems has dramatically increased attention...
research
11/28/2019

RIoTS: Risk Analysis of IoT Supply Chain Threats

Securing the supply chain of information and communications technology (...
research
08/26/2019

Towards a Supply Chain Management System for Counterfeit Mitigation using Blockchain and PUF

The complexity of today's supply chain, organised in several tiers and i...
research
02/02/2021

Decentralizing Supply Chain Anti-Counterfeiting Systems Using Blockchain Technology

An interesting research problem in supply chain industry is evaluating a...
research
07/21/2019

IoT Supply Chain Security: Overview, Challenges, and the Road Ahead

Supply chain is emerging as the next frontier of threats in the rapidly ...
research
05/10/2021

Advanced Metering Infrastructures: Security Risks and Mitigation

Energy providers are moving to the smart meter era, encouraging consumer...
research
07/29/2020

Towards a Backdoorless Network Architecture Based on Remote Attestation and Backdoor Inspection

To keep a system secure, all devices in the system need to be benign. To...

Please sign up or login with your details

Forgot password? Click here to reset