5G安全挑战与机遇:系统方法

A. Dutta, Eman M. Hammad
{"title":"5G安全挑战与机遇:系统方法","authors":"A. Dutta, Eman M. Hammad","doi":"10.1109/5GWF49715.2020.9221122","DOIUrl":null,"url":null,"abstract":"The digital transformation brought by 5G is redefining current models of end-to-end connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights the importance of embedding security capabilities from the very beginning while the 5G architecture is being defined and standardized. Security requirements need to overlay and permeate through the different layers of the 5G systems (physical, network, and application) as well as different parts of an E2E5G architecture within a risk management framework that takes into account the evolving security threats landscape. 5G presents a typical use-case of wireless communication and computer networking convergence, where 5G fundamental building blocks include components such as Software Defined Networks (SDN), Network Functions Virtualization (NFV) and the edge cloud. This convergence extends many of the security challenges and opportunities applicable to SDN/NFV and cloud to 5G networks. Thus, 5G security needs to consider additional security requirements (compared to previous generations) such as SDN controller security, hypervisor security, orchestrator security, cloud security, edge security, etc. At the same time, 5G networks offer security improvement opportunities that should be considered. Here, 5G architectural flexibility, programmability and complexity can be harnessed to improve resilience and reliability.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"158 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":"{\"title\":\"5G Security Challenges and Opportunities: A System Approach\",\"authors\":\"A. Dutta, Eman M. Hammad\",\"doi\":\"10.1109/5GWF49715.2020.9221122\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The digital transformation brought by 5G is redefining current models of end-to-end connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights the importance of embedding security capabilities from the very beginning while the 5G architecture is being defined and standardized. Security requirements need to overlay and permeate through the different layers of the 5G systems (physical, network, and application) as well as different parts of an E2E5G architecture within a risk management framework that takes into account the evolving security threats landscape. 5G presents a typical use-case of wireless communication and computer networking convergence, where 5G fundamental building blocks include components such as Software Defined Networks (SDN), Network Functions Virtualization (NFV) and the edge cloud. This convergence extends many of the security challenges and opportunities applicable to SDN/NFV and cloud to 5G networks. Thus, 5G security needs to consider additional security requirements (compared to previous generations) such as SDN controller security, hypervisor security, orchestrator security, cloud security, edge security, etc. At the same time, 5G networks offer security improvement opportunities that should be considered. Here, 5G architectural flexibility, programmability and complexity can be harnessed to improve resilience and reliability.\",\"PeriodicalId\":232687,\"journal\":{\"name\":\"2020 IEEE 3rd 5G World Forum (5GWF)\",\"volume\":\"158 6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"28\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 3rd 5G World Forum (5GWF)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/5GWF49715.2020.9221122\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 3rd 5G World Forum (5GWF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/5GWF49715.2020.9221122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28

摘要

5G带来的数字化转型正在重新定义当前的端到端连接和服务可靠性模型,包括使5G实现其承诺所需的设计安全原则。5G的可信赖性强调了在5G架构定义和标准化过程中从一开始就嵌入安全功能的重要性。安全需求需要覆盖并渗透到5G系统的不同层(物理、网络和应用程序)以及风险管理框架内E2E5G架构的不同部分,该框架考虑到不断变化的安全威胁环境。5G呈现了无线通信和计算机网络融合的典型用例,其中5G基本构建块包括软件定义网络(SDN)、网络功能虚拟化(NFV)和边缘云等组件。这种融合将适用于SDN/NFV和云的许多安全挑战和机遇扩展到5G网络。因此,5G安全需要考虑额外的安全需求(与前几代相比),如SDN控制器安全、虚拟机管理程序安全、编排器安全、云安全、边缘安全等。与此同时,5G网络提供了应该考虑的安全改进机会。在这里,可以利用5G架构的灵活性、可编程性和复杂性来提高弹性和可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
5G Security Challenges and Opportunities: A System Approach
The digital transformation brought by 5G is redefining current models of end-to-end connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights the importance of embedding security capabilities from the very beginning while the 5G architecture is being defined and standardized. Security requirements need to overlay and permeate through the different layers of the 5G systems (physical, network, and application) as well as different parts of an E2E5G architecture within a risk management framework that takes into account the evolving security threats landscape. 5G presents a typical use-case of wireless communication and computer networking convergence, where 5G fundamental building blocks include components such as Software Defined Networks (SDN), Network Functions Virtualization (NFV) and the edge cloud. This convergence extends many of the security challenges and opportunities applicable to SDN/NFV and cloud to 5G networks. Thus, 5G security needs to consider additional security requirements (compared to previous generations) such as SDN controller security, hypervisor security, orchestrator security, cloud security, edge security, etc. At the same time, 5G networks offer security improvement opportunities that should be considered. Here, 5G architectural flexibility, programmability and complexity can be harnessed to improve resilience and reliability.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
5G Network Performance Experiments for Automated Car Functions An Efficient Low-Latency Algorithm and Implementation for Rate-Matching and Bit-Interleaving in 5G NR Time-Packing as Enabler of Optical Feeder Link Adaptation in High Throughput Satellite Systems A Collaborative RAN Approach for Handling Multicast-Broadcast Traffic in 5GS Onboard PAPR Reduction and Digital Predistortion for 5G waveforms in High Throughput Satellites
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1