Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
5G: Towards secure ubiquitous connectivity beyond 2020
RISE, Swedish ICT, SICS.
RISE, Swedish ICT, SICS, Security Lab.ORCID iD: 0000-0003-0132-857x
RISE, Swedish ICT, SICS.
2015 (English)Report (Other academic)
Abstract [en]

The growing demand for mobile Internet, and the increasing number of connected devices, has required significant advancements in radio technology and networks compared to the previous generations of mobile telecommunication. Security however has only seen incremental changes to the previous mobile telecommunication generation, with enhancements that mitigate new threats and address revealed weaknesses. 5G is expected to change this, as novel use-cases will demand new trust models and require novel security solutions. In this paper, we examine the state of 5G Security, and start by describing the new expectations, requirements and enablers in 5G and the design principles conferred by material presented in selected publications. Furthermore, we describe the historic development of the authentication and key agreement protocols, which were introduced with GSM (2G), as an example of the incremental improvements to security. Additionally, we present select published papers that suggest different types of attacks on the current generations of mobile networks, and solutions to the identified weaknesses, which must be taken into account in 5G security. Finally, we describe a proposed 5G Security architecture, which bring new models for authentication, authorization and accounting (AAA) to 5G. The role of 5G security is clear, it must not only meet the basic security requirements in confidentiality, integrity and privacy, but also foster user confidence in mobile telecommunication.

Place, publisher, year, edition, pages
Kista, Sweden: Swedish Institute of Computer Science , 2015, 24.
Series
SICS Technical Report, ISSN 1100-3154 ; 2015:08
Keywords [en]
mobile telecommunication, Security, 5G, LTE, 4G, 3G, SDN, NFV
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-24484OAI: oai:DiVA.org:ri-24484DiVA, id: diva2:1043568
Projects
5GENSUREAvailable from: 2016-10-31 Created: 2016-10-31 Last updated: 2020-12-01Bibliographically approved

Open Access in DiVA

fulltext(1625 kB)458 downloads
File information
File name FULLTEXT01.pdfFile size 1625 kBChecksum SHA-512
21228fda3df1344bd67edf077dea8147fc453f9a649c73964333b354d8d7e660d3e1ef7e2af7b9fc9199b6a8c69c563f3f9ef57424674c22c53740f109a9df84
Type fulltextMimetype application/pdf

Authority records

Paladi, Nicolae

Search in DiVA

By author/editor
Paladi, Nicolae
By organisation
SICSSecurity Lab
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 458 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 417 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf