Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services

06/27/2020
by   Vijay Varadharajan, et al.
0

The 5G network systems are evolving and have complex network infrastructures. There is a great deal of work in this area focused on meeting the stringent service requirements for the 5G networks. Within this context, security requirements play a critical role as 5G networks can support a range of services such as healthcare services, financial and critical infrastructures. 3GPP and ETSI have been developing security frameworks for 5G networks. Our work in 5G security has been focusing on the design of security architecture and mechanisms enabling dynamic establishment of secure and trusted end to end services as well as development of mechanisms to proactively detect and mitigate security attacks in virtualised network infrastructures. The focus of this paper is on the latter, namely the facilities and mechanisms, and the design of a security architecture providing facilities and mechanisms to detect and mitigate specific security attacks. We have developed and implemented a simplified version of the security architecture using Software Defined Networks (SDN) and Network Function Virtualisation (NFV) technologies. The specific security functions developed in this architecture can be directly integrated into the 5G core network facilities enhancing its security. We describe the design and implementation of the security architecture and demonstrate how it can efficiently mitigate specific types of attacks.

READ FULL TEXT

page 15

page 19

page 20

research
06/27/2020

Software Enabled Security Architecture for Counteracting Attacks in Control Systems

Increasingly Industrial Control Systems (ICS) systems are being connecte...
research
02/10/2018

Aurora: Providing Trusted System Services for Enclaves On an Untrusted System

Intel SGX provisions shielded executions for security-sensitive computat...
research
11/09/2017

ANCHOR: logically-centralized security for Software-Defined Networks

While the logical centralization of functional properties of the network...
research
08/09/2021

Understanding Fuchsia Security

Fuchsia is a new open-source operating system created at Google that is ...
research
01/25/2020

An Immunology-Inspired Network Security Architecture

The coming 5G networks have been enabling the creation of a wide variety...
research
12/31/2019

Patterns and Interactions in Network Security

Networks play a central role in cyber-security: networks deliver securit...
research
01/15/2021

Enhancing Security via Deliberate Unpredictability of Solutions in Optimisation

The main aim of decision support systems is to find solutions that satis...

Please sign up or login with your details

Forgot password? Click here to reset