Security requirements modelling for virtualized 5G small cell networks

Vassilios G. Vassilakis, Haralambos Mouratidis, Emmanouil Panaousis, Ioannis D. Moscholios, Michael D. Logothetis

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

Abstract

It is well acknowledged that one of the key enabling factors for the realization of future 5G networks will be the small cell (SC) technology. Furthermore, recent advances in the fields of network functions virtualization (NFV) and software-defined networking (SDN) open up the possibility of deploying advanced services at the network edge. In the context of mobile/cellular networks this is referred to as mobile edge computing (MEC). Within the scope of the EU-funded research project SESAME we perform a comprehensive security modelling of MEC-assisted quality-of-experience (QoE) enhancement of fast moving users in a virtualized SC wireless network, and demonstrate it through a representative scenario toward 5G. Our modelling and analysis is based on a formal security requirements engineering methodology called Secure Tropos which has been extended to support MEC-based SC networks. In the proposed model, critical resources which need protection, and potential security threats are identified. Furthermore, we identify appropriate security constraints and suitable security mechanisms for 5G networks. Thus, we reveal that existing security mechanisms need adaptation to face emerging security threats in 5G networks.

Original languageEnglish
Title of host publicationProceedings of the 24th International Conference on Telecommunications
Subtitle of host publicationIntelligence in Every Form, ICT 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538606421
DOIs
Publication statusPublished - 31 Jul 2017
Event24th International Conference on Telecommunications, ICT 2017 - Limassol, Cyprus
Duration: 3 May 20175 May 2017

Conference

Conference24th International Conference on Telecommunications, ICT 2017
Country/TerritoryCyprus
CityLimassol
Period3/05/175/05/17

Keywords

  • mobile edge computing
  • Security modelling
  • small cells
  • virtualization

Fingerprint

Dive into the research topics of 'Security requirements modelling for virtualized 5G small cell networks'. Together they form a unique fingerprint.

Cite this