Conference paper Open Access

Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach

Schinianakis, Dimitrios; Trapero, Ruben; Michalopoulos, Diomidis; Gallego-Nicasio Crespo, Beatriz


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <controlfield tag="005">20200120172741.0</controlfield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.</subfield>
  </datafield>
  <controlfield tag="001">3268630</controlfield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="d">15-19 April 2019</subfield>
    <subfield code="g">WCNC</subfield>
    <subfield code="a">IEEE Wireless Communications and Networking Conference</subfield>
    <subfield code="c">Marrakech, Morocco</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Atos Research and Innovation, Madrid, Spain</subfield>
    <subfield code="a">Trapero, Ruben</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Nokia Bell Labs, Munich, Germany</subfield>
    <subfield code="a">Michalopoulos, Diomidis</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Atos Research and Innovation, Madrid, Spain</subfield>
    <subfield code="a">Gallego-Nicasio Crespo, Beatriz</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">2078276</subfield>
    <subfield code="z">md5:4198d87bdd5de185d63722c6126f5458</subfield>
    <subfield code="u">https://zenodo.org/record/3268630/files/Security_STZ_paper.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2019-04-16</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:3268630</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Nokia Bell Labs, Munich, Germany</subfield>
    <subfield code="a">Schinianakis, Dimitrios</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach</subfield>
  </datafield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">761445</subfield>
    <subfield code="a">5G Mobile Network Architecture for diverse services, use cases, and applications in 5G and beyond</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">http://creativecommons.org/licenses/by-nc-nd/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution Non Commercial No Derivatives 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;A security study of 5G networks and the use of security trust zones in network slicing architectures are presented in this paper. In such an approach, the security trust zone concept is analyzed in terms of a profiling methodology that takes into account the characteristics of the supported network slice. Moreover, the performance and isolation capabilities of the trust zone approach is assessed via a simulation framework, in terms of its ability to detect and mitigate simulated threats. Finally, the security study complements the simulated framework with a usecase analysis of a network testbed, carried out in an industrial environment. The conducted analysis shows that security trust zones can offer a security level which can cover the detection capabilities of critical parts of the network.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.3268629</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.3268630</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">conferencepaper</subfield>
  </datafield>
</record>
39
29
views
downloads
All versions This version
Views 3939
Downloads 2929
Data volume 60.3 MB60.3 MB
Unique views 3939
Unique downloads 2929

Share

Cite as