Course Hero Logo

5G Security Challenges and Opportunities A System Approach.pdf

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 2 out of 6 pages.

5G Security Challenges and Opportunities: ASystem ApproachAshutosh DuttaApplied Physics LabJohns Hopkins UniversityBaltimore, MD, USA[email protected]Eman HammadDepartment of Computer ScienceTexas A&M University - Commerce/RELLISCollege Station, TX, USA[email protected]Abstract—The digital transformation brought by 5G is re-defining current models of end-to-end connectivity and servicereliability to include security-by-design principles necessary toenable 5G to achieveits promise. 5Gtrustworthiness high-lights the importance of embedding security capabilities fromthe very beginning while the 5G architecture is being definedand standardized. Security requirements need to overlay andpermeate through the different layers of the 5G systems (physical,network, and application) as well as different parts of an E2E5G architecture within a risk management framework that takesinto account the evolving security threats landscape. 5G presentsatypicaluse-caseofwirelesscommunicationand computernetworking convergence, where 5G fundamental building blocksinclude components such as Software Defined Networks (SDN),Network Functions Virtualization (NFV) and the edge cloud.This convergence extends many of the security challenges andopportunities applicable to SDN/NFV and cloud to 5G networks.Thus, 5G security needs to consider additional security require-ments (compared to previous generations) such as SDN controllersecurity, hypervisor security, orchestrator security, cloud security,edge security, etc. At the same time, 5G networks offer securityimprovement opportunities that should be considered. Here, 5Garchitectural flexibility, programmability and complexity can beharnessed to improve resilience and reliability.Index Terms—5G security, vulnerabilities, challenges, mitiga-tion, resilience, performance, reliabilityI. INTRODUCTION5G technologies provide ubiquitous connectivity while alsoaddressing the demands of both individual consumers andbusinesses [1]. 5G technologies are expected to provide higherthroughput, and lower latency and a higher density and mo-bility range without compromising reliability. By virtue of itsflexibility and an agile development methodology that usesmodular network functions, it supports various use cases thatare both scalable and cost effective. 5G can support excitinguse cases, including IoT, smart transportation, e-Health, smartcities, tactile computing and kinaesthetic communication, andHolographic interactions. 5G introduces a paradigm shift intowireless mobile communication [1]. Not only is 5G evolu-tionary (providing higher bandwidth and lower latency thancurrent-generation technology), more importantly, 5G is rev-olutionary in that it is expected to enable fundamentally newapplications with much more stringent requirements in latency(e.g., real time) and bandwidth (e.g., streaming). 5G could helpsolve the last-mile/-kilometer problem and provide broadbandaccess to the next billion users on earth at much lower costbecause of its use of new spectrum and its improvements inspectral efficiency [1]–[3]. An alternative view of the use-cases and innovation that will be driven by 5G is illustratedby Figure 1. The Figure differentiates between four advancedcapabilities of 5G that are directly relating to innovation:Fig. 1.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Computer Security, Stevens Institute of Technology, IEEE Xplore

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture