Skip to main content

Abstract

Communications play a fundamental role in the economic and social well-being of the citizens and on operations of most of the Critical Infrastructures (CIs). 5G networks and future communications technologies radically transform the way we communicate, by introducing a vast array of new connections, capabilities and services in a multiplicity of sectors. In this scope, network function virtualization and end-to-end network slicing are two promising technologies empowering 5G networks for efficient and dynamic network/service deployment and management. Resilience of critical infrastructure systems and especially in telecommunication networks can be considered as “key factor” that can reduce vulnerability, minimize the consequences of threats as well as their cascade effects, accelerate mitigation and facilitate re-adaptation to a disruptive event. In this context, comprehensive knowledge of the complete surrounding environment and of the most important factors that affect and/or determine resilience, can evolve at a fundamental aspect concerning the case resilience of critical telecommunication. Based on this idea, the RESISTO project provides a holistic situation awareness for telecommunication infrastructures and simultaneously enhances resilience, while acting as an on top safety net boosting the faster and more reliable management enabling the digital transformation of our society and a variety of business processes. In this paper we specifically discuss the impact of the RESISTO platform when a security breach occurs in a 5G mobile network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rost, P., Banchs, A., Berberana, I., Reitbach, M., Doll, M., et al.: Mobile network architecture evolution toward 5G. IEEE Commun. Mag. 54(5), 84–91 (2016)

    Article  Google Scholar 

  2. Agiwal, M., Roy, A., et al.: Next generation 5G wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutor. 18(3), 1617–1655 (2016)

    Article  Google Scholar 

  3. Chochliouros, I.P., et al.: Enhancing network management via NFV, MEC, cloud computing and cognitive features: the “5G ESSENCE” modern architectural approach. In: Iliadis, L., Maglogiannis, I., Plagianakos, V. (eds.) AIAI 2018. AICT, vol. 520, pp. 50–61. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-92016-0_5

    Chapter  Google Scholar 

  4. Next Generation Mobile Networks (NGMN) Alliance: NGMN 5G White Paper, NGMN Alliance (2015)

    Google Scholar 

  5. Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., et al.: 5G: security analysis of threats and solutions. In: Proceedings of CSCN-2017, pp. 193–199. IEEE (2017)

    Google Scholar 

  6. RESISTO (“RESIlience enhancement and risk control platform for communication infraSTructure Operators”) H2020 Project (Grant Agreement No. 786409). http://www.resistoproject.eu/

  7. Setola, R., Luiijf, E., Theocharidou, M.: Critical infrastructures, protection and resilience. In: Setola, R., Rosato, V., Kyriakides, E., Rome, E. (eds.) Managing the Complexity of Critical Infrastructures. SSDC, vol. 90, pp. 1–18. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-51043-9_1

    Chapter  Google Scholar 

  8. European Commission: Commission Staff Working Document on a new approach to the European Programme for Critical Infrastructure Protection Making European Critical Infrastructures more secure, SWD (2013) 318 final, 28 August 2013. http://ec.europa.eu/transparency/regdoc/rep/10102/2013/EN/10102-2013-318-EN-F1-1.PDF

  9. Council of the European Union: Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Off. J. L345, 75–82 (2008)

    Google Scholar 

  10. Aziz, F.M., et al.: Resilience of LTE networks against smart jamming attacks: wideband model. In: Proceedings of the IEEE PIMRC 2015, pp. 1344–1348. IEEE (2015)

    Google Scholar 

  11. Abhishek, R., Tipper, D., Medhi, D.: Network virtualization and survivability of 5G networks: framework, optimization model, and performance. In: Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1–6. IEEE (2018)

    Google Scholar 

  12. Abhishek, R.: Resilience and survivability of 5G networks. Ph.D. thesis, University of Missouri-Kansas City, USA. Proquest LLC, May 2020

    Google Scholar 

  13. 5GAmericas: Security Considerations for the 5G Era - A 5GAmericas’ White Paper, July 2020

    Google Scholar 

  14. European Union Agency for Cybersecurity (ENISA): Threat Landscape for 5G Networks. ENISA, December 2020

    Google Scholar 

  15. Nguyen, V.-G., Brunstrom, A., Grinnemo, K.-J., Taheri, J.: SDN/NFV-based mobile packet core network architectures: a survey. IEEE Commun. Surv. Tutor. 19(3), 1567–1602 (2017)

    Article  Google Scholar 

  16. Olimid, R.F., Nencioni, G.: 5G network slicing: a security overview. IEEE Access 8, 99999–100009 (2020)

    Article  Google Scholar 

  17. International Telecommunication Union – Radiocommunications Sector (ITU-R): Recommendation ITU-R M.2083-0 (09-2015): “IMT Vision – Framework and overall objectives of the future development of IMT for 2020 and beyond”. ITU-R (2015)

    Google Scholar 

  18. Geller, M., Nair, P.: 5G Security Innovation with Cisco – White paper (2018)

    Google Scholar 

  19. GSM Association (GSMA): Migration from Physical to Virtual Network Functions – Best Practices and Lessons Learned Version 0.1. GSMA, October 2018

    Google Scholar 

  20. The 3rd Generation Partnership Project: 3GPP TR 33.848 V0.5.0 (2019-11): Technical report 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security Aspects; Study on Security Impacts of Virtualisation (Release 16). 3GPP (2019)

    Google Scholar 

  21. Taleb, T., Ksentini, A., et al.: On service resilience in cloud-native 5G mobile systems. IEEE J. Sel. Areas Commun. (JSAC) 34(3), 483–496 (2016)

    Article  Google Scholar 

  22. Sterbenz, J.P.G., Çetinkaya, E.K., Hameed, M.A., Jabbar, A., et al.: Evaluation of network resilience survivability and disruption tolerance: analysis topology generation simulation and experimentation. Telecommun. Syst. 52, 705–736 (2013)

    Google Scholar 

  23. Xie, L., et al.: Network survivability under disaster propagation: modeling and analysis. In: Proceedings of the IEEE WCNC-2013, pp. 473–475. IEEE (2013)

    Google Scholar 

  24. Arfaoui, G., et al.: Security and resilience in 5G: current challenges and future directions. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 1–8. IEEE (2017)

    Google Scholar 

  25. Yusta, J.M., Correa, G.J., Lacal-Arantegui, R.: Methodologies and applications for critical infrastructure protection: state-of-the-art. Energy Policy 39(10), 6100–6119 (2011)

    Article  Google Scholar 

  26. Belesioti, M., Chochliouros, I.P., et al.: Enhancing critical infrastructure protection: the RESISTO concept. In: Proceedings of EuCNC 2018, pp. 591–592. IEEE (2018)

    Google Scholar 

  27. Belesioti, M., Makri, R., Fehling-Kaschek, M., Carli, et al.: A new security approach in telecom infrastructures: the RESISTO concept. In: Proceedings of the DCOSS-2019/SecRIoT-2019 Workshop, pp. 212–218. IEEE Computer Society (2019)

    Google Scholar 

  28. RESISTO Project: Deliverable 2.7: “RESISTO Platform and Tools Reference Architecture- final”, December 2019

    Google Scholar 

  29. Häring, I., et al.: Towards a generic resilience management, quantification and development process: general definitions, requirements, methods, techniques and measures, and case studies. In: Linkov, I., Palma-Oliveira, J.M. (eds.) Resilience and Risk. NSPSSCES, pp. 21–80. Springer, Dordrecht (2017). https://doi.org/10.1007/978-94-024-1123-2_2

    Chapter  Google Scholar 

  30. Bellini, E., Ferreira, P.: Managing interdependencies in critical infrastructures - a cornerstone for system resilience. In: Haugen, S., Barros, A., et al. (eds.) Safety and Reliability – Safe Societies in a Changing World, pp. 2687–2692. CRC Press, Boca Raton (2018)

    Google Scholar 

  31. Dutta, A., Hammad, E.: 5G security challenges and opportunities: a system approach. In: Proceedings of the 2020 IEEE 3rd 5G World Forum (5GWF), pp. 109–-114. IEEE (2020)

    Google Scholar 

  32. Fang, D., Qian, Y., Hu, R.Q.: Security for 5G mobile wireless networks. IEEE Access 6, 4850–4874 (2017)

    Article  Google Scholar 

  33. Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., et al.: A survey on security aspects for 3GPP 5G networks. IEEE Commun. Surv. Tutor. 22(1), 170–195 (2020)

    Article  Google Scholar 

  34. 5G Public Private Partnership (5G-PPP): View on 5G Architecture – White Paper, Version 3.0. 5G-PPP, June 2019

    Google Scholar 

  35. Khan, R., Kumar, P., Jayakody, D.N.K., Liyanage, M.: A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutor. 22(1), 196–248 (2019)

    Google Scholar 

  36. Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., et al.: Overview of 5G security challenges and solutions. IEEE Commun. Stand. Mag. 2(1), 36–43 (2018)

    Article  Google Scholar 

  37. 5GAmericas: The Evolution of Security in 5G - White Paper, July 2019

    Google Scholar 

  38. RESISTO Project: Deliverable 2.8: “Table-Top Read Teaming Results of RESISTO Architecture, Scenarios and Use Cases Tabular Report”, January 2020

    Google Scholar 

  39. Liyanage, M., Ahmad, I. Bux Abro, A., Gurtov, A., and Ylianttila, M.: Comprehensive Guide to 5G Security. Wiley (2018)

    Google Scholar 

  40. The 3rd Generation Partnership Project: 3GPP TR 28.801 v15.1.0: “Technical report Technical Specification Group Services and System Aspects; Telecommunication management; Study on management and orchestration of network slicing for next generation network (Release 15)”. 3GPP (2018)

    Google Scholar 

Download references

Acknowledgments

The paper has been based on the context of the “RESISTO” (“RESIlience enhancement and risk control platform for communication infrastructure Operators”) Project, funded by the EC under the Grant Agreement (GA) No. 786409.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ioannis P. Chochliouros .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Belesioti, M., Carapinha, J., Makri, R., Chochliouros, I.P. (2021). The Challenge of Security Breaches in the Era of 5G Networking. In: Maglogiannis, I., Macintyre, J., Iliadis, L. (eds) Artificial Intelligence Applications and Innovations. AIAI 2021 IFIP WG 12.5 International Workshops. AIAI 2021. IFIP Advances in Information and Communication Technology, vol 628. Springer, Cham. https://doi.org/10.1007/978-3-030-79157-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-79157-5_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-79156-8

  • Online ISBN: 978-3-030-79157-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics