2021
DOI: 10.1007/s10922-021-09623-7
|View full text |Cite
|
Sign up to set email alerts
|

Design of a Security and Trust Framework for 5G Multi-domain Scenarios

Abstract: With the expansion of 5G networks, new business models are arising where multi-tenancy and active infrastructure sharing will be key enablers for them. With these new opportunities, new security risks are appearing in the form of a complex and evolving threat landscape for 5G networks, being one of the main challenges for the 5G mass rollout. In 5G-enabled scenarios, adversaries can exploit vulnerabilities associated with resource sharing to perform lateral movements targeting other tenant resources, as well a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 54 publications
1
7
0
Order By: Relevance
“…Thereby, the lower credibility distance after evaluating the set of stakeholders, the most credible the opinion. It should be pointed out that this mechanism supports the idea of a non-transitive trust model [27], which entails greater disbelief when two stakeholders have not previously interacted with each other. Therefore, it is necessary to identify a set of common stakeholders to find out the belief [28] of such a new stakeholder.…”
Section: B Trust Computation Modulesupporting
confidence: 66%
See 1 more Smart Citation
“…Thereby, the lower credibility distance after evaluating the set of stakeholders, the most credible the opinion. It should be pointed out that this mechanism supports the idea of a non-transitive trust model [27], which entails greater disbelief when two stakeholders have not previously interacted with each other. Therefore, it is necessary to identify a set of common stakeholders to find out the belief [28] of such a new stakeholder.…”
Section: B Trust Computation Modulesupporting
confidence: 66%
“…where u is the provider for whom wants to determine the trust score T (u) ∈ [0, 1] on the i-th interaction; α and β are the weights of each dimension, satisfying that α + β = 1; and I(u) is the maximum number of interactions. Due to the fact that the authors of this research work at hand have thoroughly described how all dimensions have been formulated in [23] and [26], we honestly believe such equations should not be reintroduced again as the principal aim is to spotlight a new SLA-driven reward and punishment mechanism. Nonetheless, a high level description of the four dimension objectives is going to be reported so as to comprehend how our adapted PeerTrust model works.…”
Section: B Trust Computation Modulementioning
confidence: 99%
“…5G network slicing enables multiple tenants to be able to share the same physical resources. Valero et al [51] state that multi-tenant scenarios should focus attention on security and risk management in multi-slice domains. 3GPP recommends network slice performance and fault monitoring in multi-tenant environments [52].…”
Section: Multi-tenant Scenario Security Requirements and Recommendationsmentioning
confidence: 99%
“…How zero trust can be deployed in the IoT environment under 5G is also a current research priority. Valero et al [51] proposed a new security and trust framework for 5G multidomain scenarios and validated zero trust principles in distributed multistakeholder environments. The security and trust levels of multi-stakeholder 5G networks are improved through trust and intra-domain and inter-domain modules.…”
Section: Application Of Zero Trust In the Iot Environmentmentioning
confidence: 99%