Overview of the security and trust mechanisms in the 5GZORRO project

dc.contributor.author
Chainho, Paulo
dc.contributor.author
Fernandez-Fernández, Adriana
dc.contributor.author
Fernández Hidalgo, Javier
dc.contributor.author
Gil Pérez, Manuel
dc.contributor.author
Jorquera Valero, Joasé María
dc.contributor.author
Martínez Perez, Gregorio
dc.contributor.author
Mifsud, Jean-Marie
dc.contributor.author
Huertas Celdran, Alberto
dc.contributor.author
Lekidis, Aleixos
dc.contributor.author
Sanchez Sánchez, Pedro Miguel
dc.contributor.author
Santos, Bruno
dc.contributor.author
Sciberras, Antonie
dc.contributor.author
Siddiqui, Shuaib
dc.date.accessioned
2022-07-04T09:37:27Z
dc.date.accessioned
2024-09-20T08:17:16Z
dc.date.available
2022-07-04T09:37:27Z
dc.date.available
2024-09-20T08:17:16Z
dc.date.issued
2021-11
dc.identifier.uri
http://hdl.handle.net/2072/522489
dc.description.abstract
In the evolution from 5G to beyond 5G networks, new business models are emerging where multi-domain and multistakeholder scenarios will play a paramount role as enablers. In these scenarios, the automated management of the services with minimal human intervention, also known as zero-touch management, is a pivotal requirement to ensure a proper functioning and to enable real-time responses to possible incidents or scalability needs. Nonetheless, these new scenarios and requirements also introduce new security risks that entail a complex threat landscape for beyond 5G networks. Hence, zero-touch management demands new solutions capable of securely controlling network resources into end-to-end scenarios distributed in multiple domains. In this vein, several challenges arise and need to be addressed, such as integrity, non-repudiation, confidentiality, security, and trust. Therefore, the H2020 5GZORRO project proposes new security and trust solutions for multi-domain and multi-stakeholder scenarios in 5G and beyond networks. To deal with the utmost importance security and trust challenges, we introduce different modules to mitigate them, namely, integrity and non-repudiation through Distributed Ledger Technologies, decentralized identity through an Identity and Permission Manager, end-to-end trustworthy relationships via a Trust Management Framework, secure workloads across different tenants and stakeholders via Trusted Execution Environment Security Management, detection and response to internal vulnerabilities and attacks via Network Monitoring, and on-demand secure cross-domain connections via VPN-as-a-Service. Therefore, the built security and trust 5GZORRO mechanisms form a secure environment with zero-touch automation capabilities, minimizing human intervention.
eng
dc.format.extent
5 p.
dc.language.iso
eng
dc.publisher
5GZORRO
dc.relation.ispartof
EUCNC 2021
dc.rights
L'accés als continguts d'aquest document queda condicionat a l'acceptació de les condicions d'ús establertes per la següent llicència Creative Commons:http://creativecommons.org/licenses/by-nc-nd/4.0/
dc.source
RECERCAT (Dipòsit de la Recerca de Catalunya)
dc.subject.other
Software Networks
dc.subject.other
Computer security
dc.title
Overview of the security and trust mechanisms in the 5GZORRO project
dc.type
info:eu-repo/semantics/conferenceObject
dc.embargo.terms
cap
dc.rights.accessLevel
info:eu-repo/semantics/openAccess


Documentos

Overview_of_the_security_and_trust_mechanisms_in_the_5GZORRO_project.pdf

354.9Kb PDF

Este ítem aparece en la(s) siguiente(s) colección(ones)