Conference paper Open Access

Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach

Schinianakis, Dimitrios; Trapero, Ruben; Michalopoulos, Diomidis; Gallego-Nicasio Crespo, Beatriz


JSON-LD (schema.org) Export

{
  "description": "<p>A security study of 5G networks and the use of security trust zones in network slicing architectures are presented in this paper. In such an approach, the security trust zone concept is analyzed in terms of a profiling methodology that takes into account the characteristics of the supported network slice. Moreover, the performance and isolation capabilities of the trust zone approach is assessed via a simulation framework, in terms of its ability to detect and mitigate simulated threats. Finally, the security study complements the simulated framework with a usecase analysis of a network testbed, carried out in an industrial environment. The conducted analysis shows that security trust zones can offer a security level which can cover the detection capabilities of critical parts of the network.</p>", 
  "license": "https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode", 
  "creator": [
    {
      "affiliation": "Nokia Bell Labs, Munich, Germany", 
      "@type": "Person", 
      "name": "Schinianakis, Dimitrios"
    }, 
    {
      "affiliation": "Atos Research and Innovation, Madrid, Spain", 
      "@type": "Person", 
      "name": "Trapero, Ruben"
    }, 
    {
      "affiliation": "Nokia Bell Labs, Munich, Germany", 
      "@type": "Person", 
      "name": "Michalopoulos, Diomidis"
    }, 
    {
      "affiliation": "Atos Research and Innovation, Madrid, Spain", 
      "@type": "Person", 
      "name": "Gallego-Nicasio Crespo, Beatriz"
    }
  ], 
  "headline": "Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach", 
  "image": "https://zenodo.org/static/img/logos/zenodo-gradient-round.svg", 
  "datePublished": "2019-04-16", 
  "url": "https://zenodo.org/record/3268630", 
  "@context": "https://schema.org/", 
  "identifier": "https://doi.org/10.5281/zenodo.3268630", 
  "@id": "https://doi.org/10.5281/zenodo.3268630", 
  "@type": "ScholarlyArticle", 
  "name": "Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach"
}
68
183
views
downloads
All versions This version
Views 6868
Downloads 183183
Data volume 380.3 MB380.3 MB
Unique views 6363
Unique downloads 166166

Share

Cite as