Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Security Architecture for 5G Networks
Orange, France.
Thales, France.
RISE - Research Institutes of Sweden, ICT, SICS.
University of Oxford, UK.
Show others and affiliations
2018 (English)In: IEEE Access, E-ISSN 2169-3536Article in journal (Refereed) In press
Abstract [en]

5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modelling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.

Place, publisher, year, edition, pages
2018.
Keywords [en]
5G, 5G mobile communication, Architecture, Business, Computer architecture, Electronic mail, Network slicing, Security, Smart cities, Telecommunication Networks, 5G mobile communication systems, Commerce, Cost effectiveness, Industry, Mobile security, Mobile telecommunication systems, Network architecture, Queueing networks, Smart city, Mobile communications, New business models, Security Architecture, Security functions, Security objectives, Security requirements, Network security
National Category
Natural Sciences
Identifiers
URN: urn:nbn:se:ri:diva-33758DOI: 10.1109/ACCESS.2018.2827419Scopus ID: 2-s2.0-85045763510OAI: oai:DiVA.org:ri-33758DiVA, id: diva2:1204201
Available from: 2018-05-07 Created: 2018-05-07 Last updated: 2018-05-07Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus
By organisation
SICS
In the same journal
IEEE Access
Natural Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 31 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
v. 2.35.3