Published May 24, 2023 | Version 1
Journal article Open

ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations

Authors/Creators

  • 1. Cybersecurity Group, Lithuanian Cybercrime Center of Excellence for Research, Training and Education (L3CE), Vilnius, 08303, Lithuania

Description

Abstract —The literature on 5G design and architecture numbers in the hundreds of thousands, which makes analyzing this vast corpus of technical knowledge impossible within the scope of a single article. A rigorous literature scan has revealed investigations of various specific 5G components, or specific aspects of 5G design, architecture, or security, but none that are comprehensive in scope, encompassing all of the aforementioned categories, or that take into account the associated vulnerabilities, threats and risks to the basic 5G infrastructure.

In this sense the 5G framework advocated by The European Union Agency for Cybersecurity (ENISA) in its comprehensive report is singular in relation to the extensive literature associated with the 5G domain and the fragmented character of scientific reporting related to 5G technology.

It is the purpose of this article to go beyond the existing literature and examine in depth the details of the ENISA 5G Threat Landscape Report and reveal ENISA's painstaking efforts to stand out among other leading-edge players in the 5G arena and achieve its strategic aims of integrating cybersecurity considerations with threats, risks, and vulnerabilities into an architecture of 5G right from the start of the design and development process.

In formulating such a framework, ENISA has set the stage for standardization of cybersecurity considerations in relation to 5G design and architecture that may be considered a first approximation towards best practice in the field.

ENISA's role in the European Union as a leader in setting the pace of development of 5G networks is acknowledged in EU's legislation and its directives. Significantly, its strategic direction targets future implementations of 5G networks by vendors, operators, and practitioners. This should equip EU with the necessary resilience to withstand hybrid threat onslaughts on its Pan-European network, a topic to be dealt with in full in a follow-on paper.

Files

openreseurope-2-17366.pdf

Files (2.8 MB)

Name Size Download all
md5:e9f16fb83cae8d52ac22a0a8969d0a46
2.8 MB Preview Download

Additional details

References

  • Lourenço MB, Marinos L, Palseas L, eds. (2020). ENISA Threat Landscape for 5G Networks: Updated threat assessment for the fifth generation of mobile telecommunications networks (5G).
  • Chakraborty M, Singh M, Balas VE (2021). The "Essence" of Network Security: An End-to-End Panorama. Lecture Notes in Networks and Systems. doi:10.1007/978-981-15-9317-8
  • Gupta BB, Perez GM, Agrawal DP (2020). Handbook of Computer Networks and Cyber Security: Principles and Paradigms. doi:10.1007/978-3-030-22277-2
  • (null). 3rd Generation Partnership Project (3GPP): Security architecture and procedures for 5G system (Release 16). TS 33.501 V16.4.0 (2020-09).
  • Bertenyi B (2021). 5G Evolution: What's Next?. IEEE Wireless Comm. doi:10.1109/MWC.2021.9363048
  • Bafoutsou G, Papaphilippou M, Kantas E (2023). Embedded SIM ecosystem, security risks and measures.
  • (null). 3rd Generation Partnership Project: Enhancement of URLLC support in the 5G Core network. TR 21.916 V0.6.0 (2020-09) Technical Report, Release 16 Description; Summary of Rel-16 Work Items (Release 16).
  • (2020). German standardization roadmap on artificial intelligence.
  • (2018). JRC Publications Repository - European Cybersecurity Centres of Expertise Map - Definitions and Taxonomy.
  • Linkov I, Roslycky L, Trump BD (2019). Resilience and hybrid threats: Security and integrity for the digital world.
  • Wijethilaka S, Liyanage M (2021). Survey on Network Slicing for Internet of Things Realization in 5G Networks. IEEE Communication Surveys and Tutorials. doi:10.1109/COMST.2021.3067807
  • Ahmadi S (2019). 5G NR: Architecture, Technology, Implementation, and Operation of 3GPP New Radio Standards.
  • Milenkovic G, Dekker M, European Union Agency for Cybersecurity (2021). Guideline on security measures under the EECC.
  • Milenkovic G, Dekker M, European Union Agency for Cybersecurity (null). 5G Supplement to the guideline on security measures under EECC.
  • You X, Wang CX, Huang J (2021). Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts. Sci China Inf Sci. doi:10.1007/s11432-020-2955-6
  • Cosquer F, Zamora F, Zugenmaier A (2022). 5G Cybersecurity standards: Analysis of standardisation requirements in support of cybersecurity policy.
  • Nikolouzou E, Milenkovic G, Bafoutsou G (2022). NFV security in 5G: Challenges and best practices.
  • (null). 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; System architecture for the 5G System (5GS); Stage 2 (Release 16). 3GPP TS 23.501 V16.6.0 (2020-09), Section 6 Network Functions.
  • (null). 5G System: Usage of the Unified Data Repository services for Subscription Data; Stage 3 -- 3GPP TS 29.505 V16.4.0 (2020-09).
  • Milenkovic G, Dekker M, European Union Agency for Cybersecurity (ENISA) (2021). Security in 5G specifications: Controls in 3GPP security specifications (5G SA).
  • Nikolouzou E, (ENISA) (2022). Fog and edge computing in 5G: Security opportunities and challenges.