Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service

被引:5
|
作者
Blanc, Gregory [1 ]
Kheir, Nizar [2 ]
Ayed, Dhouha [2 ]
Lefebvre, Vincent [3 ]
de Oca, Edgardo Montes [4 ]
Bisson, Pascal [2 ]
机构
[1] Telecom SudParis, CNRS, SAMOVAR, Evry, France
[2] Thales Grp, Paris, France
[3] Tages SAS, Le Cannet, France
[4] Montimage, Paris, France
关键词
Network Slicing; Software-Defined Security; Security as a Service;
D O I
10.1145/3230833.3233251
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
5G is envisioned as a transformation of the communications architecture towards multi-tenant, scalable and flexible infrastructure, which heavily relies on virtualised network functions and programmable networks. In particular, orchestration will advance one step further in blending both compute and data resources, usually dedicated to virtualisation technologies, and network resources into so-called slices. Although 5G security is being developed in current working groups, slice security is seldom addressed. In this work, we propose to integrate security in the slice life cycle, impacting its management and orchestration that relies on the virtualization/ softwarisation infrastructure. The proposed security architecture connects the demands specified by the tenants through as-a-service mechanisms with built-in security functions relying on the ability to combine enforcement and monitoring functions within the software-defined network infrastructure. The architecture exhibits desirable properties such as isolating slices down to the hardware resources or monitoring service-level performance.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Guest Editorial: Security Architecture and Technologies for 5G
    Zhang, Hongke
    Chen, Chi-Yuan
    Yu, Shui
    Quan, Wei
    IET NETWORKS, 2018, 7 (02) : 51 - 52
  • [42] Automated Factorization of Security Chains in Software-Defined Networks
    Schnepf, Nicolas
    Badonnel, Remi
    Lahmadi, Abdelkader
    Merz, Stephan
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 374 - 380
  • [43] Proposal and evaluation of security schemes for software-defined radio
    Shiba, H
    Uehara, K
    Araki, K
    PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, : 114 - 118
  • [44] A comprehensive security assessment framework for software-defined networks
    Lee, Seungsoo
    Kim, Jinwoo
    Woo, Seungwon
    Yoon, Changhoon
    Scott-Hayward, Sandra
    Yegneswaran, Vinod
    Porras, Phillip
    Shin, Seungwon
    COMPUTERS & SECURITY, 2020, 91
  • [45] Enhancing Security Management at Software-Defined Exchange Points
    Kumar, Himal
    Gharakheili, Hassan Habibi
    Russell, Craig
    Sivaraman, Vijay
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (04): : 1479 - 1492
  • [46] Hybrid Testbed for Security Research in Software-Defined Networks
    Windisch, Fritz
    Abedi, Kamyar
    Doan, Tung
    Strufe, Thorsten
    Nguyen, Giang T.
    2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN, 2023, : 147 - 152
  • [47] Leveraging software-defined networking for security policy enforcement
    Liu, Jiaqiang
    Li, Yong
    Wang, Huandong
    Jin, Depeng
    Su, Li
    Zeng, Lieguang
    Vasilakos, Thanos
    INFORMATION SCIENCES, 2016, 327 : 288 - 299
  • [48] Security Threats in the Data Plane of Software-Defined Networks
    Gao, Shang
    Li, Zecheng
    Xiao, Bin
    Wei, Guiyi
    IEEE NETWORK, 2018, 32 (04): : 108 - 113
  • [49] DELTA: A Security Assessment Framework for Software-Defined Networks
    Lee, Seungsoo
    Yoon, Changhoon
    Lee, Chanhee
    Shin, Seungwon
    Yegneswaran, Vinod
    Porras, Phillip
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [50] A Framework for Security Services based on Software-Defined Networking
    Jeong, Jaehoon
    Seo, Jihyeok
    Cho, Geumhwan
    Kim, Hyoungshick
    Park, Jung-Soo
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 150 - 153