Besides significantly outperforming past generations in terms of capacity and throughput, 5G networks and systems will provide an infrastructure for the support of highly diversified services and ‘‘verticals’’. Indeed, the major paradigm shift with respect to previous cellular network generations, specifically oriented to one class of terminals (namely, people’s cell phones), is the largely heterogeneous nature of the multiplicity of end systems supported. Within a 5G infrastructure, playing the role of ‘‘network of networks’’, traditionally independent technical and business stakeholders are now called to cooperate in the deployment of crucial infrastructure components relying on innovative (for the Telecom world) technologies such as virtualization, not in the traditional operators’ portfolio, and eventually placed in security-critical parts of the network — think e.g. to Multi Access Edge Computing systems. Goal of this survey is to analyze the complex threat landscape of 5G systems, by taking the point of view of the involved stakeholders. The motivation behind our proposed analysis revolves on the observation that, in complex and virtualized systems such as the 5G infrastructure, an attack to a system component under the responsibility of a given stakeholder may yield a dramatic impact to a completely different player. Therefore, while reviewing the many 5G security risks and relevant threats which the main stakeholders operating in virtualized 5G cellular networks are exposed to, we will try to showcase the sometimes non-obvious relation between impact and responsibility, as well as identify shared responsibilities.

Suraci, C., Araniti, G., Abrardo, A., Bianchi, G., Iera, A. (2021). A stakeholder-oriented security analysis in virtualized 5G cellular networks. COMPUTER NETWORKS, 184 [10.1016/j.comnet.2020.107604].

A stakeholder-oriented security analysis in virtualized 5G cellular networks

Abrardo, Andrea;
2021-01-01

Abstract

Besides significantly outperforming past generations in terms of capacity and throughput, 5G networks and systems will provide an infrastructure for the support of highly diversified services and ‘‘verticals’’. Indeed, the major paradigm shift with respect to previous cellular network generations, specifically oriented to one class of terminals (namely, people’s cell phones), is the largely heterogeneous nature of the multiplicity of end systems supported. Within a 5G infrastructure, playing the role of ‘‘network of networks’’, traditionally independent technical and business stakeholders are now called to cooperate in the deployment of crucial infrastructure components relying on innovative (for the Telecom world) technologies such as virtualization, not in the traditional operators’ portfolio, and eventually placed in security-critical parts of the network — think e.g. to Multi Access Edge Computing systems. Goal of this survey is to analyze the complex threat landscape of 5G systems, by taking the point of view of the involved stakeholders. The motivation behind our proposed analysis revolves on the observation that, in complex and virtualized systems such as the 5G infrastructure, an attack to a system component under the responsibility of a given stakeholder may yield a dramatic impact to a completely different player. Therefore, while reviewing the many 5G security risks and relevant threats which the main stakeholders operating in virtualized 5G cellular networks are exposed to, we will try to showcase the sometimes non-obvious relation between impact and responsibility, as well as identify shared responsibilities.
2021
Suraci, C., Araniti, G., Abrardo, A., Bianchi, G., Iera, A. (2021). A stakeholder-oriented security analysis in virtualized 5G cellular networks. COMPUTER NETWORKS, 184 [10.1016/j.comnet.2020.107604].
File in questo prodotto:
File Dimensione Formato  
computer networks.pdf

non disponibili

Descrizione: Articolo principale
Tipologia: PDF editoriale
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 2.16 MB
Formato Adobe PDF
2.16 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/1124023