Conference paper Open Access

Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach

Schinianakis, Dimitrios; Trapero, Ruben; Michalopoulos, Diomidis; Gallego-Nicasio Crespo, Beatriz

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="DOI">10.5281/zenodo.3268630</identifier>
      <creatorName>Schinianakis, Dimitrios</creatorName>
      <affiliation>Nokia Bell Labs, Munich, Germany</affiliation>
      <creatorName>Trapero, Ruben</creatorName>
      <affiliation>Atos Research and Innovation, Madrid, Spain</affiliation>
      <creatorName>Michalopoulos, Diomidis</creatorName>
      <affiliation>Nokia Bell Labs, Munich, Germany</affiliation>
      <creatorName>Gallego-Nicasio Crespo, Beatriz</creatorName>
      <familyName>Gallego-Nicasio Crespo</familyName>
      <affiliation>Atos Research and Innovation, Madrid, Spain</affiliation>
    <title>Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach</title>
    <date dateType="Issued">2019-04-16</date>
  <resourceType resourceTypeGeneral="ConferencePaper"/>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.3268629</relatedIdentifier>
    <rights rightsURI="">Creative Commons Attribution Non Commercial No Derivatives 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">&lt;p&gt;A security study of 5G networks and the use of security trust zones in network slicing architectures are presented in this paper. In such an approach, the security trust zone concept is analyzed in terms of a profiling methodology that takes into account the characteristics of the supported network slice. Moreover, the performance and isolation capabilities of the trust zone approach is assessed via a simulation framework, in terms of its ability to detect and mitigate simulated threats. Finally, the security study complements the simulated framework with a usecase analysis of a network testbed, carried out in an industrial environment. The conducted analysis shows that security trust zones can offer a security level which can cover the detection capabilities of critical parts of the network.&lt;/p&gt;</description>
    <description descriptionType="Other">© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.</description>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/761445/">761445</awardNumber>
      <awardTitle>5G Mobile Network Architecture for diverse services, use cases, and applications in 5G and beyond</awardTitle>
All versions This version
Views 8989
Downloads 490490
Data volume 1.0 GB1.0 GB
Unique views 8484
Unique downloads 465465


Cite as