Towards 5G-ready Security Metrics

Lianying Zhao, Muhammad Shafayat Oshman, Mengyuan Zhang, Fereydoun Farrahi Moghaddam, Shubham Chander, Makan Pourzandi

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

The fifth-generation (5G) mobile telecom network has been garnering interest in both academia and industry, with better flexibility and higher performance compared to previous generations. Along with functionality improvements, new attack vectors also made way. Network operators and regulatory organizations wish to have a more precise idea about the security posture of 5G environments. Meanwhile, various security metrics for IT environments have been around and attracted the community's attention. However, 5G-specific factors are less taken into consideration.This paper considers such 5G-specific factors to identify potential gaps if existing security metrics are to be applied to the 5G environments. In light of the layered nature and multi-ownership, the paper proposes a new approach to the modular computation of security metrics based on cross-layer projection as a means of information sharing between layers. Finally, the proposed approach is evaluated through simulation.
Original languageEnglish
Title of host publicationICC 2021 - IEEE International Conference on Communications, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728171227
DOIs
Publication statusPublished - 1 Jun 2021
Externally publishedYes
Event2021 IEEE International Conference on Communications, ICC 2021 - Virtual, Online, Canada
Duration: 14 Jun 202123 Jun 2021

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Conference

Conference2021 IEEE International Conference on Communications, ICC 2021
Country/TerritoryCanada
CityVirtual, Online
Period14/06/2123/06/21

Fingerprint

Dive into the research topics of 'Towards 5G-ready Security Metrics'. Together they form a unique fingerprint.

Cite this