Security requirements modelling for virtualized 5G small cell networks

Vassilios G. Vassilakis, Haralambos Mouratidis, Emmanouil Panaousis, Ioannis D. Moscholios, Michael D. Logothetis

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNResearchpeer-review

Abstract

It is well acknowledged that one of the key enabling factors for the realization of future 5G networks will be the small cell (SC) technology. Furthermore, recent advances in the fields of network functions virtualization (NFV) and software-defined networking (SDN) open up the possibility of deploying advanced services at the network edge. In the context of mobile/cellular networks this is referred to as mobile edge computing (MEC). Within the scope of the EU-funded research project SESAME we perform a comprehensive security modelling of MEC-assisted quality-of-experience (QoE) enhancement of fast moving users in a virtualized SC wireless network, and demonstrate it through a representative scenario toward 5G. Our modelling and analysis is based on a formal security requirements engineering methodology called Secure Tropos which has been extended to support MEC-based SC networks. In the proposed model, critical resources which need protection, and potential security threats are identified. Furthermore, we identify appropriate security constraints and suitable security mechanisms for 5G networks. Thus, we reveal that existing security mechanisms need adaptation to face emerging security threats in 5G networks.

Original languageEnglish
Title of host publicationProceedings of the 24th International Conference on Telecommunications
Subtitle of host publicationIntelligence in Every Form, ICT 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538606421
DOIs
Publication statusPublished - 31 Jul 2017
Event24th International Conference on Telecommunications, ICT 2017 - Limassol, Cyprus
Duration: 3 May 20175 May 2017

Conference

Conference24th International Conference on Telecommunications, ICT 2017
CountryCyprus
CityLimassol
Period3/05/175/05/17

Fingerprint

Requirements engineering
Wireless networks
Network function virtualization
Software defined networking

Keywords

  • mobile edge computing
  • Security modelling
  • small cells
  • virtualization

Cite this

Vassilakis, V. G., Mouratidis, H., Panaousis, E., Moscholios, I. D., & Logothetis, M. D. (2017). Security requirements modelling for virtualized 5G small cell networks. In Proceedings of the 24th International Conference on Telecommunications: Intelligence in Every Form, ICT 2017 [7998269] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICT.2017.7998269
Vassilakis, Vassilios G. ; Mouratidis, Haralambos ; Panaousis, Emmanouil ; Moscholios, Ioannis D. ; Logothetis, Michael D. / Security requirements modelling for virtualized 5G small cell networks. Proceedings of the 24th International Conference on Telecommunications: Intelligence in Every Form, ICT 2017. Institute of Electrical and Electronics Engineers Inc., 2017.
@inproceedings{b1f2a754b80e4fd8a8c9e45fd1736b70,
title = "Security requirements modelling for virtualized 5G small cell networks",
abstract = "It is well acknowledged that one of the key enabling factors for the realization of future 5G networks will be the small cell (SC) technology. Furthermore, recent advances in the fields of network functions virtualization (NFV) and software-defined networking (SDN) open up the possibility of deploying advanced services at the network edge. In the context of mobile/cellular networks this is referred to as mobile edge computing (MEC). Within the scope of the EU-funded research project SESAME we perform a comprehensive security modelling of MEC-assisted quality-of-experience (QoE) enhancement of fast moving users in a virtualized SC wireless network, and demonstrate it through a representative scenario toward 5G. Our modelling and analysis is based on a formal security requirements engineering methodology called Secure Tropos which has been extended to support MEC-based SC networks. In the proposed model, critical resources which need protection, and potential security threats are identified. Furthermore, we identify appropriate security constraints and suitable security mechanisms for 5G networks. Thus, we reveal that existing security mechanisms need adaptation to face emerging security threats in 5G networks.",
keywords = "mobile edge computing, Security modelling, small cells, virtualization",
author = "Vassilakis, {Vassilios G.} and Haralambos Mouratidis and Emmanouil Panaousis and Moscholios, {Ioannis D.} and Logothetis, {Michael D.}",
year = "2017",
month = "7",
day = "31",
doi = "10.1109/ICT.2017.7998269",
language = "English",
booktitle = "Proceedings of the 24th International Conference on Telecommunications",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

Vassilakis, VG, Mouratidis, H, Panaousis, E, Moscholios, ID & Logothetis, MD 2017, Security requirements modelling for virtualized 5G small cell networks. in Proceedings of the 24th International Conference on Telecommunications: Intelligence in Every Form, ICT 2017., 7998269, Institute of Electrical and Electronics Engineers Inc., 24th International Conference on Telecommunications, ICT 2017, Limassol, Cyprus, 3/05/17. https://doi.org/10.1109/ICT.2017.7998269

Security requirements modelling for virtualized 5G small cell networks. / Vassilakis, Vassilios G.; Mouratidis, Haralambos; Panaousis, Emmanouil; Moscholios, Ioannis D.; Logothetis, Michael D.

Proceedings of the 24th International Conference on Telecommunications: Intelligence in Every Form, ICT 2017. Institute of Electrical and Electronics Engineers Inc., 2017. 7998269.

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNResearchpeer-review

TY - GEN

T1 - Security requirements modelling for virtualized 5G small cell networks

AU - Vassilakis, Vassilios G.

AU - Mouratidis, Haralambos

AU - Panaousis, Emmanouil

AU - Moscholios, Ioannis D.

AU - Logothetis, Michael D.

PY - 2017/7/31

Y1 - 2017/7/31

N2 - It is well acknowledged that one of the key enabling factors for the realization of future 5G networks will be the small cell (SC) technology. Furthermore, recent advances in the fields of network functions virtualization (NFV) and software-defined networking (SDN) open up the possibility of deploying advanced services at the network edge. In the context of mobile/cellular networks this is referred to as mobile edge computing (MEC). Within the scope of the EU-funded research project SESAME we perform a comprehensive security modelling of MEC-assisted quality-of-experience (QoE) enhancement of fast moving users in a virtualized SC wireless network, and demonstrate it through a representative scenario toward 5G. Our modelling and analysis is based on a formal security requirements engineering methodology called Secure Tropos which has been extended to support MEC-based SC networks. In the proposed model, critical resources which need protection, and potential security threats are identified. Furthermore, we identify appropriate security constraints and suitable security mechanisms for 5G networks. Thus, we reveal that existing security mechanisms need adaptation to face emerging security threats in 5G networks.

AB - It is well acknowledged that one of the key enabling factors for the realization of future 5G networks will be the small cell (SC) technology. Furthermore, recent advances in the fields of network functions virtualization (NFV) and software-defined networking (SDN) open up the possibility of deploying advanced services at the network edge. In the context of mobile/cellular networks this is referred to as mobile edge computing (MEC). Within the scope of the EU-funded research project SESAME we perform a comprehensive security modelling of MEC-assisted quality-of-experience (QoE) enhancement of fast moving users in a virtualized SC wireless network, and demonstrate it through a representative scenario toward 5G. Our modelling and analysis is based on a formal security requirements engineering methodology called Secure Tropos which has been extended to support MEC-based SC networks. In the proposed model, critical resources which need protection, and potential security threats are identified. Furthermore, we identify appropriate security constraints and suitable security mechanisms for 5G networks. Thus, we reveal that existing security mechanisms need adaptation to face emerging security threats in 5G networks.

KW - mobile edge computing

KW - Security modelling

KW - small cells

KW - virtualization

UR - http://www.scopus.com/inward/record.url?scp=85028560916&partnerID=8YFLogxK

U2 - 10.1109/ICT.2017.7998269

DO - 10.1109/ICT.2017.7998269

M3 - Conference contribution with ISSN or ISBN

BT - Proceedings of the 24th International Conference on Telecommunications

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Vassilakis VG, Mouratidis H, Panaousis E, Moscholios ID, Logothetis MD. Security requirements modelling for virtualized 5G small cell networks. In Proceedings of the 24th International Conference on Telecommunications: Intelligence in Every Form, ICT 2017. Institute of Electrical and Electronics Engineers Inc. 2017. 7998269 https://doi.org/10.1109/ICT.2017.7998269