Security and Privacy

被引:0
|
作者
Dutta, Ashutosh [1 ,2 ,3 ,4 ,5 ,6 ,7 ]
Hammad, Eman [8 ]
Enright, Michael A. [9 ,10 ,11 ,12 ,13 ,14 ]
Chorti, Arsenia [15 ,16 ,17 ,18 ]
Pawar, Sanjay S. [19 ]
Urbina-Pineda, Julia [20 ,21 ]
Kurt, Gunes Karabulut [22 ,23 ,24 ,25 ,26 ,27 ,28 ]
Cheema, Ahmad Raza [29 ]
Taha, Sajid
Chng, Baw [30 ]
Rawal, Bharat S. [31 ,32 ,33 ,34 ,35 ,36 ,37 ,38 ,39 ]
de Carvalho, Glaucio H. S. [40 ,41 ]
机构
[1] Johns Hopkins Univ, Appl Phys Labs, Baltimore, MD 21218 USA
[2] AT&T Labs, Tech Staff, Middletown, NJ USA
[3] NIKSUN Inc, Princeton, NJ USA
[4] Telcordia Res, Piscataway, NJ USA
[5] Columbia Univ, Cent Res Facil, New York, NY 10027 USA
[6] NJIT, Newark, NJ USA
[7] TATA Motors, Mumbai, Maharashtra, India
[8] Syst Trust & Resilience iSTAR Lab, Bryan, TX USA
[9] Quantum Dimens Inc, Huntington Beach, CA USA
[10] Cybersecur Artificial Intelligence & Machine Lear, Toronto, ON, Canada
[11] Embedded Comp, Phoenix, AZ USA
[12] Quantum Comp, Leesburg, VA USA
[13] RF Commun, Naperville, IL USA
[14] USC, Dept Elect Engn, Los Angeles, CA USA
[15] Ecole Natl Super Elect & Applicat ENSEA, Cergy, France
[16] ETIS Lab, UMR 8051, Informat Commun & Imaging ICI Grp, Cergy, France
[17] Princeton Univ, Princeton, NJ 08544 USA
[18] Univ Essex, Colchester, Essex, England
[19] BCREC, Durgapur, India
[20] CYBERIIoT, Mexico City, DF, Mexico
[21] 5G & Ind 4 0 Mexico, Mexico City, DF, Mexico
[22] Univ Ottawa, CASP Grp, Ottawa, ON, Canada
[23] TenXc Wireless, Ottawa, ON, Canada
[24] Edgewater Comp Syst Inc, Ottawa, ON, Canada
[25] Turkcell Res & Dev Appl Res & Technol, Istanbul, Turkiye
[26] Istanbul Tech Univ, Istanbul, Turkiye
[27] Polytech Montreal, Elect Engn, Montreal, PQ, Canada
[28] Carleton Univ, Ottawa, ON, Canada
[29] Shared Serv Canada, Ottawa, ON, Canada
[30] BAWMAN LLC, Cherry Hill, NJ USA
[31] Grambling State Univ, Grambling, LA USA
[32] Benedict Coll, Columbia, SC USA
[33] Capitol Technol Univ, Laurel, MD USA
[34] Gannon Univ, Erie, PA USA
[35] Penn State Univ, University Pk, PA 16802 USA
[36] Duke Univ, Durham, NC 27706 USA
[37] Biochem Pharmaceut Ind Ltd, Mumbai, Maharashtra, India
[38] Bashundhara Pharmaceut Ltd, Kathmandu, Nepal
[39] Coracias Adv Technol LLC Z, Philadelphia, PA USA
[40] Brock Univ, Dept Comp Sci, St Catharines, ON, Canada
[41] Brock Univ, Dept Engn, St Catharines, ON, Canada
关键词
5G Cybersecurity; security; privacy; data protection; reliability; resilience; mMTC; URLLC; SDN; /NFV; cyber risk assessment and management; threat scenarios; cyber-attacks; security controls; mitigation; defense; CHALLENGES; INTERNET;
D O I
10.1109/FNWF58287.2023.10520409
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The digital transformation brought on by 5G is redefining current models of end-to-end (E2E) connectivity and service reliability to include security-by-design principles necessary to enable 5G to fulfill its promise. 5G trustworthiness highlights the importance of embedding security capabilities from the very beginning while the 5G architecture is being defined and standardized. Security requirements need to overlay and permeate through the different layers of 5G systems (physical, network, and application) as well as different parts of an E2E 5G architecture within a risk-management framework that takes into account the evolving security-threats landscape. 5G presents a typical use-case of wireless communication and computer networking convergence, where 5G fundamental building blocks include components such as Software Defined Networks (SDN), Network Functions Virtualization (NFV), and the edge cloud. This convergence extends many of the security challenges and opportunities applicable to SDN / NFV and cloud to 5G networks. Thus, 5G security needs to consider additional security requirements (compared to previous generations) such as SDN controller security, hypervisor security, orchestrator security, cloud security, edge security, etc. At the same time, 5G networks offer security improvement opportunities that should be considered. Here, 5G architectural flexibility, programmability and complexity can be harnessed to improve resilience and reliability. The working group scope fundamentally addresses the following: 5G security considerations need to overlay and permeate through the different layers of 5G systems (physical, network, and application) as well as different parts of the E2E 5G architecture including a risk management framework that considers the evolving security threats landscape. 5G exemplifies a use-case of heterogeneous access and computer networking convergence, which extends a unique set of security challenges and opportunities (e.g., related to SDN / NFV and edge cloud, etc.) to 5G networks. Similarly, 5G networks by design offer potential security benefits and opportunities through harnessing the architecture flexibility, programmability, and complexity to improve its resilience and reliability. The IEEE FNI security WG's roadmap framework follows a taxonomic structure, differentiating the 5G functional pillars and corresponding cybersecurity risks. As part of a cross-collaboration effort within IEEE FNI, the security working group also looks into the security issues associated with other roadmap working groups. Disclaimer: in this document we use 5G to refer to future networks including evolution such as B5G, 6G, etc.
引用
收藏
页数:87
相关论文
共 50 条
  • [1] Usable Security and Privacy for Security and Privacy Workers
    Zurko, Mary Ellen
    Haney, Julie
    [J]. IEEE SECURITY & PRIVACY, 2023, 21 (01) : 8 - 10
  • [2] Security and Privacy
    Dutta, Ashutosh
    Hammad, Eman
    Enright, Michael
    Behmann, Fawzi
    Chorti, Arsenia
    Cheema, Ahmad
    Kadio, Kassi
    Urbina-Pineda, Julia
    Alam, Khaled
    Limam, Ahmed
    Chu, Fred
    Lester, John
    Park, Jong-Geun
    Bio-Ukeme, Joseph
    Pawar, Sanjay S.
    Layton, Roslyn
    Ramchandran, Prakash
    Okonkwo, Kingsley
    Ong, Lyndon
    Emmelmann, Marc
    Issa, Omneya
    Arul, Rajakumar
    Malik, Sireen
    Krishnan, Sivarama
    Sugumar, Suresh
    Lala, Tk
    Borst, Matthew
    Kloza, Brad
    [J]. 2022 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2022,
  • [3] Security and privacy
    Geer, D
    Gong, L
    Ranum, M
    Neuman, C
    Zurko, ME
    [J]. IEEE CONCURRENCY, 2000, 8 (02): : 70 - 79
  • [4] Security and Privacy
    Davies, N
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 20 - 20
  • [5] Privacy and Security
    Consolvo, Sunny
    Hong, Jason
    Langheinrich, Marc
    [J]. IEEE PERVASIVE COMPUTING, 2015, 14 (01) : 16 - 17
  • [6] Security & privacy
    Hong, Jason
    Satyanarayan, Mahadev
    Cybenko, George
    [J]. IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 15 - 17
  • [7] Security and Privacy: Why Privacy Matters
    Bird, Stephanie J.
    [J]. SCIENCE AND ENGINEERING ETHICS, 2013, 19 (03) : 669 - 671
  • [8] Security and Privacy: Why Privacy Matters
    Stephanie J. Bird
    [J]. Science and Engineering Ethics, 2013, 19 : 669 - 671
  • [9] The ethics of trading privacy for security: The multifaceted effects of privacy on liberty and security
    Satra, Henrik Skaug
    [J]. TECHNOLOGY IN SOCIETY, 2022, 68
  • [10] Privacy and Security Making Security Sustainable
    Anderson, Ross
    [J]. COMMUNICATIONS OF THE ACM, 2018, 61 (03) : 24 - 26