Browsing by Author "Alemany, Pol"
Now showing 1 - 1 of 1
Results Per Page
Sort Options
Item INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks(2020-08-25) Ortiz, Jordi; Sanchez-Iborra, Ramon; Bernabe, Jorge Bernal; Skarmeta, Antonio; Benzaid, Chafika; Taleb, Tarik; Alemany, Pol; Muñoz, Raul; Vilalta, Ricard; Gaber, Chrystel; Wary, Jean Philippe; Ayed, Dhouha; Bisson, Pascal; Christopoulou, Maria; Xilouris, George; De Oca, Edgardo Montes; Gür, Gürkan; Santinelli, Gianni; Lefebvre, Vincent; Pastor, Antonio; Lopez, Diego; Department of Communications and Networking; Mobile Network Softwarization and Service Customization; University of Murcia; Catalan Telecommunications Technology Centre; Orange Polska; Thales; Demokritos National Centre for Scientific Research; Montimage; Zurich University of Applied Sciences; SolidshieldThe promise of disparate features envisioned by the 3GPP for 5G, such as offering enhanced Mobile Broadband connectivity while providing massive Machine Type Communications likely with very low data rates and maintaining Ultra Reliable Low Latency Communications requirements, create a very challenging environment for protecting the 5G networks themselves and associated assets. To overcome such complexity, future 5G networks must employ a very high degree of network and service management automation, which is a security challenge by itself as well as an opportunity for smarter and more efficient security functions. In this paper, we present the smart, trustworthy and liable 5G security platform being designed and developed in the INSPIRE-5Gplus1 project. This platform takes advantage of new techniques such as Machine Learning (ML), Artificial Intelligence (AI), Distributed Ledger Technologies (DLT), network softwarization and Trusted Execution Environment (TEE) for closed-loop and end-to-end security management following a zero-touch model in 5G and Beyond 5G networks. To this end, we specifically elaborate on two key aspects of our platform, namely security management with Security Service Level Agreements (SSLAs) and liability management, in addition to the description of the overall architecture.