Conference paper Open Access

Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach

Schinianakis, Dimitrios; Trapero, Ruben; Michalopoulos, Diomidis; Gallego-Nicasio Crespo, Beatriz


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/777da27e-5eae-40e4-b2cc-48277c359492/Security_STZ_paper.pdf"
      }, 
      "checksum": "md5:4198d87bdd5de185d63722c6126f5458", 
      "bucket": "777da27e-5eae-40e4-b2cc-48277c359492", 
      "key": "Security_STZ_paper.pdf", 
      "type": "pdf", 
      "size": 2078276
    }
  ], 
  "owners": [
    65089
  ], 
  "doi": "10.5281/zenodo.3268630", 
  "stats": {
    "version_unique_downloads": 36.0, 
    "unique_views": 45.0, 
    "views": 45.0, 
    "version_views": 45.0, 
    "unique_downloads": 36.0, 
    "version_unique_views": 45.0, 
    "volume": 74817936.0, 
    "version_downloads": 36.0, 
    "downloads": 36.0, 
    "version_volume": 74817936.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.3268630", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.3268629", 
    "bucket": "https://zenodo.org/api/files/777da27e-5eae-40e4-b2cc-48277c359492", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3268629.svg", 
    "html": "https://zenodo.org/record/3268630", 
    "latest_html": "https://zenodo.org/record/3268630", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3268630.svg", 
    "latest": "https://zenodo.org/api/records/3268630"
  }, 
  "conceptdoi": "10.5281/zenodo.3268629", 
  "created": "2019-07-04T12:06:39.053074+00:00", 
  "updated": "2020-01-20T17:27:41.288182+00:00", 
  "conceptrecid": "3268629", 
  "revision": 4, 
  "id": 3268630, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.3268630", 
    "description": "<p>A security study of 5G networks and the use of security trust zones in network slicing architectures are presented in this paper. In such an approach, the security trust zone concept is analyzed in terms of a profiling methodology that takes into account the characteristics of the supported network slice. Moreover, the performance and isolation capabilities of the trust zone approach is assessed via a simulation framework, in terms of its ability to detect and mitigate simulated threats. Finally, the security study complements the simulated framework with a usecase analysis of a network testbed, carried out in an industrial environment. The conducted analysis shows that security trust zones can offer a security level which can cover the detection capabilities of critical parts of the network.</p>", 
    "license": {
      "id": "CC-BY-NC-ND-4.0"
    }, 
    "title": "Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach", 
    "notes": "\u00a9 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3268629"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3268630"
          }
        }
      ]
    }, 
    "grants": [
      {
        "code": "761445", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::761445"
        }, 
        "title": "5G Mobile Network Architecture for diverse services, use cases, and applications in 5G and beyond", 
        "acronym": "5G-MoNArch", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "publication_date": "2019-04-16", 
    "creators": [
      {
        "affiliation": "Nokia Bell Labs, Munich, Germany", 
        "name": "Schinianakis, Dimitrios"
      }, 
      {
        "affiliation": "Atos Research and Innovation, Madrid, Spain", 
        "name": "Trapero, Ruben"
      }, 
      {
        "affiliation": "Nokia Bell Labs, Munich, Germany", 
        "name": "Michalopoulos, Diomidis"
      }, 
      {
        "affiliation": "Atos Research and Innovation, Madrid, Spain", 
        "name": "Gallego-Nicasio Crespo, Beatriz"
      }
    ], 
    "meeting": {
      "acronym": "WCNC", 
      "dates": "15-19 April 2019", 
      "place": "Marrakech, Morocco", 
      "title": "IEEE Wireless Communications and Networking Conference"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }, 
    "related_identifiers": [
      {
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.3268629", 
        "relation": "isVersionOf"
      }
    ]
  }
}
45
36
views
downloads
All versions This version
Views 4545
Downloads 3636
Data volume 74.8 MB74.8 MB
Unique views 4545
Unique downloads 3636

Share

Cite as