Conference paper Open Access

Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach

Schinianakis, Dimitrios; Trapero, Ruben; Michalopoulos, Diomidis; Gallego-Nicasio Crespo, Beatriz


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:cnt="http://www.w3.org/2011/content#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://doi.org/10.5281/zenodo.3268630">
    <rdf:type rdf:resource="http://www.w3.org/ns/dcat#Dataset"/>
    <dct:type rdf:resource="http://purl.org/dc/dcmitype/Text"/>
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://doi.org/10.5281/zenodo.3268630</dct:identifier>
    <foaf:page rdf:resource="https://doi.org/10.5281/zenodo.3268630"/>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Schinianakis, Dimitrios</foaf:name>
        <foaf:givenName>Dimitrios</foaf:givenName>
        <foaf:familyName>Schinianakis</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Nokia Bell Labs, Munich, Germany</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Trapero, Ruben</foaf:name>
        <foaf:givenName>Ruben</foaf:givenName>
        <foaf:familyName>Trapero</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Atos Research and Innovation, Madrid, Spain</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Michalopoulos, Diomidis</foaf:name>
        <foaf:givenName>Diomidis</foaf:givenName>
        <foaf:familyName>Michalopoulos</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Nokia Bell Labs, Munich, Germany</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Gallego-Nicasio Crespo, Beatriz</foaf:name>
        <foaf:givenName>Beatriz</foaf:givenName>
        <foaf:familyName>Gallego-Nicasio Crespo</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Atos Research and Innovation, Madrid, Spain</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2019</dct:issued>
    <frapo:isFundedBy rdf:resource="info:eu-repo/grantAgreement/EC/H2020/761445/"/>
    <schema:funder>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </schema:funder>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2019-04-16</dct:issued>
    <owl:sameAs rdf:resource="https://zenodo.org/record/3268630"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/3268630</skos:notation>
      </adms:Identifier>
    </adms:identifier>
    <dct:isVersionOf rdf:resource="https://doi.org/10.5281/zenodo.3268629"/>
    <dct:description>&lt;p&gt;A security study of 5G networks and the use of security trust zones in network slicing architectures are presented in this paper. In such an approach, the security trust zone concept is analyzed in terms of a profiling methodology that takes into account the characteristics of the supported network slice. Moreover, the performance and isolation capabilities of the trust zone approach is assessed via a simulation framework, in terms of its ability to detect and mitigate simulated threats. Finally, the security study complements the simulated framework with a usecase analysis of a network testbed, carried out in an industrial environment. The conducted analysis shows that security trust zones can offer a security level which can cover the detection capabilities of critical parts of the network.&lt;/p&gt;</dct:description>
    <dct:description xml:lang="">© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
    <dcat:distribution>
      <dcat:Distribution>
        <dct:rights>
          <dct:RightsStatement rdf:about="https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode">
            <rdfs:label>Creative Commons Attribution Non Commercial No Derivatives 4.0 International</rdfs:label>
          </dct:RightsStatement>
        </dct:rights>
        <dcat:accessURL rdf:resource="https://doi.org/10.5281/zenodo.3268630"/>
      </dcat:Distribution>
    </dcat:distribution>
  </rdf:Description>
  <foaf:Project rdf:about="info:eu-repo/grantAgreement/EC/H2020/761445/">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">761445</dct:identifier>
    <dct:title>5G Mobile Network Architecture for diverse services, use cases, and applications in 5G and beyond</dct:title>
    <frapo:isAwardedBy>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </frapo:isAwardedBy>
  </foaf:Project>
</rdf:RDF>
62
107
views
downloads
All versions This version
Views 6262
Downloads 107107
Data volume 222.4 MB222.4 MB
Unique views 5757
Unique downloads 103103

Share

Cite as