Special Session Title: Secure 5G Telecommunication Networks
Special Session Abstract:
The evolution of mobile telecommunication networks is accompanied by new demands for the performance, portability, elasticity and energy efficiency of network functions. As a result, 5G mobile networks will adopt new networking concepts to improve the performance. The telecommunication standardization bodies are working on integrating novel networking concepts such as Software Defined Networking (SDN), Network Function Virtualization (NFV), Cloud Computing, Multi-access Edge Computing (MEC) and Network Slicing principles to telecommunication networks. The target of such efforts is to innovate and develop new network concepts for meeting the future requirements of the evolving mobile networks.
Present-day, mobile networks are suffering from many security limitations such as Securing only the perimeter, Distributed and uncoordinated security mechanisms, tightly coupled to physical resources, lack of adaptation and interoperability, over-provisioned security mechanisms, vulnerability to various IP based attacks, lack of visibility and high network monitoring overhead. The introduction of network softwarization, programmability, NFV, the separation of the control and data planes, the introduction of new network functions and even the introduction of new stakeholders such as Mobile Virtual network Operators (MVNO) are expected to solve the security limitation of current telecommunication networks.
Despite the expected advantages, the adaptation of SDN, NFV, MEC and slicing concepts also brings many security disadvantages as well. For instance, adaptation of these technologies will minimize the technological gap between the common IP networks and 5G telecommunication networks. As a result, 5G mobile networks will be vulnerable to most the attacks which are available in general SDN and IP networks. Therefore, the introduction of all these new features have impact on how security needs to be assured and managed in 5G networks.
This workshop aims to gather cutting-edge contributions from academia and industry that address and show the latest results on developing security solutions for 5G networks. It is not only focused on new opportunities but also new challenges and vulnerabilities related to 5G security.We solicit high-quality original research papers on advanced 5G security techniques that go beyond security mechanisms and solution concepts. Suitable topics include, but are not limited to, the following areas: