2019
DOI: 10.1109/mcomstd.2019.1800034
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges of the 3GPP 5G Service Based Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 4 publications
0
20
0
Order By: Relevance
“…NRF can provide registration and discovery functionality to network functions, for them to discover and communicate with each other. NEF offers an interface gateway which allows external users, such as enterprises or partner operators, the ability to monitor, provision and enforce application policy such that users can be inside the operator network [188,189]. The SBA is based on the related technologies across cloud computing, virtualization, microservice, stateless service, etc.…”
Section: Sba and Its Evolutionmentioning
confidence: 99%
See 1 more Smart Citation
“…NRF can provide registration and discovery functionality to network functions, for them to discover and communicate with each other. NEF offers an interface gateway which allows external users, such as enterprises or partner operators, the ability to monitor, provision and enforce application policy such that users can be inside the operator network [188,189]. The SBA is based on the related technologies across cloud computing, virtualization, microservice, stateless service, etc.…”
Section: Sba and Its Evolutionmentioning
confidence: 99%
“…Each service can realize a specific functionality. Thus, microservice can enable the SBA with flexibility, granularity, and independent scaling [189]. The case study and deployment considerations about the SBA in 5G can be found in [190].…”
Section: Sba and Its Evolutionmentioning
confidence: 99%
“…The east-bound interface (EBI) is an API for NF's MANO to interact with the service-based MEC Layer, which is mainly used to manage and orchestrate both the resource allocation and life cycle of NFs. On the basis of using the same HTTP, we design a unified Representational State Transferful (RESTful) [23] API for the SBI, NBI and EBI, which is lightweight and can be read both by people and machines easily. Thus, the service-based MEC layer provides direct communications between the NFs, the MANO and the NFs, as well as the NFs and APPs, thereby reducing the interfacecomplexity and the protocol-inconsistency in the traditional MEC architecture [18].…”
Section: B Mec Decouplingmentioning
confidence: 99%
“…Added to the enhanced authentication methods for 5GC [31], the potential solutions proposed in the literature include a variety of security-and latency-aware protocols that would able to balance the contradicting requirements between security and performance for different types of services [53]. In addition to the countermeasures to better secure the communications between 5GC network functions, additional end-to-end application level security enhancements would also be needed, e.g., in roaming scenarios [54].…”
Section: ) Security Solutions For Virtual Epc and 5gcmentioning
confidence: 99%
“…Web technologies are extensively used in SBAs that bring with them new inherent vulnerabilities to mobile networks. Risks of using web technologies are mainly related to availability, confidentiality, integrity and control of the mobile network functions and signalling [54]. Therefore, new solutions for securing web-based systems, such as new SBAs, are required.…”
Section: Future Research Directionsmentioning
confidence: 99%