Other Open Access

White Paper: Intelligent Security Architecture for 5G and Beyond Networks

Chafika Benzaid; Pol Alemany; Dhouha Ayed; G. Chollon; Maria Christopoulou; Gürkan Gür; Vincent Lefebvre; Edgardo Montes de Oca; Raul Muñoz; Jordi Ortiz; Antonio Pastor; Ramon Sanchez-Iborra; Tarib Taleb; Ricard. Vilalta; George. Xilouris


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <controlfield tag="005">20201208143945.0</controlfield>
  <controlfield tag="001">4288658</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Centre Tecnologic de Telecomunicacions de Catalunya</subfield>
    <subfield code="a">Pol Alemany</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Thales</subfield>
    <subfield code="a">Dhouha Ayed</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Thales</subfield>
    <subfield code="a">G. Chollon</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">National Centre for Scientific Research Demokritos</subfield>
    <subfield code="a">Maria Christopoulou</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Zurich University of Applied Sciences</subfield>
    <subfield code="a">Gürkan Gür</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">TAGES</subfield>
    <subfield code="a">Vincent  Lefebvre</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Montimage</subfield>
    <subfield code="a">Edgardo  Montes de Oca</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Centre Tecnologic de Telecomunicacions de Catalunya</subfield>
    <subfield code="a">Raul Muñoz</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of Murcia</subfield>
    <subfield code="a">Jordi Ortiz</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Telefonica</subfield>
    <subfield code="a">Antonio Pastor</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of Murcia</subfield>
    <subfield code="a">Ramon Sanchez-Iborra</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of Murcia</subfield>
    <subfield code="a">Tarib Taleb</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Centre Tecnologic de Telecomunicacions de Catalunya</subfield>
    <subfield code="a">Ricard. Vilalta</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">National Centre for Scientific Research Demokritos</subfield>
    <subfield code="a">George. Xilouris</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">2143926</subfield>
    <subfield code="z">md5:d8dc4aec2a888220945b5f589ac142ce</subfield>
    <subfield code="u">https://zenodo.org/record/4288658/files/INSPIRE-5Gplus_White_Paper_HLA_FV_GA_Abbrev.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2020-11-24</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">user-inspire-5gplus</subfield>
    <subfield code="p">user-5g-ppp</subfield>
    <subfield code="o">oai:zenodo.org:4288658</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">AALTO</subfield>
    <subfield code="a">Chafika Benzaid</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">White Paper: Intelligent Security Architecture for 5G and Beyond Networks</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-5g-ppp</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-inspire-5gplus</subfield>
  </datafield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">871808</subfield>
    <subfield code="a">INtelligent Security and PervasIve tRust for 5G and Beyond</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;5G&amp;rsquo;s capabilities and flexibility hold the promise of further facilitating the society&amp;rsquo;s digitalization by enabling new services (e.g. remote surgery, advanced industrial applications) and communication modes (e.g. gestures, facial expressions and haptics). Current wireless communication systems do not meet the performance requirements of these new services, such as bandwidth, latency and reliability. Furthermore, the current COVID-19 crisis has fundamentally changed the way the world communicates and operates, accelerating the shift towards a more digital world. Such shift and the new requirements make the need of reliable and high-quality digital services promised by 5G more crucial than ever.&lt;br&gt;
To fulfil 5G promises, a shift towards full automation of network and service management and operation is a necessity. However, a major challenge facing full automation is the protection of the network and system assets &amp;ndash; services, data and network infrastructure &amp;ndash; against potential cybersecurity risks introduced by the unprecedented evolution of the 5G threat landscape.&lt;br&gt;
INSPIRE-5Gplus, a 5G-PPP phase 3 project, aims to address these cybersecurity risks by introducing innovative concepts for security management of 5G networks and beyond at the level of platforms and vertical applications and services. To meet this goal, INSPIRE-5Gplus will devise and implement a fully automated end-to-end smart network and service security management framework that empowers not only protection but also trustworthiness and liability in managing 5G network infrastructures across multi-domains. INSPIRE-5Gplus will allow the advancement of the security vision for 5G and beyond through the adoption of a set of emerging trends and technologies; namely, Zero-touch network and Service Management (ZSM), Software-Defined Security (D-SEC) models, Artificial Intelligence/Machine Learning (AI/ML) techniques, Distributed Ledger Technologies (DLT), and Trusted Execution Environments (TEE). INSPIRE-5Gplus will ensure that the provided security is compliant with the expected Security Service Level Agreement (SSLA) and regulatory requirements.&lt;br&gt;
This White Paper introduces the overall INSPIRE-5Gplus framework&amp;#39;s High-Level Architecture, its main functional blocks and their role in enabling intelligent closed-loop security operations. To illustrate how the INSPIRE-5Gplus framework can be applied as a zero-touch security management solution for 5G systems, the White Paper presents a representative set of advanced security use cases. The presented use cases cover different advanced security problems, including: (i) trustworthy composition of network slices using Blockchains (DLT) and secure deployment of E2E network slices in compliance with agreed SSLAs for automotive verticals; (ii) detection of network attacks over encrypted traffic in Service-Based Architectures; (iii) enforcement of E2E encryption policies while leveraging TEE to enable trustworthy execution of encryption-decryption operations; (iv) reactive and proactive protection of E2E network slices using, respectively, anomaly detection and Moving Target Defense mechanisms.&lt;br&gt;
The INSPIRE-5Gplus project is currently evolving the architecture, defining the specific set of services to be provided by each functional block and devising the corresponding enablers. As the project&amp;#39;s work progresses, we will release new White Papers to share our achievements with the community.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.4288657</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.4288658</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">other</subfield>
  </datafield>
</record>
352
338
views
downloads
All versions This version
Views 352352
Downloads 338338
Data volume 709.9 MB709.9 MB
Unique views 314314
Unique downloads 292292

Share

Cite as