Conference Paper

ETSI ZSM Driven Security Management in Future Networks

To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Technical Report
Full-text available
The White Paper covers key areas related to 6G research from a technical, societal, policy and business perspective providing a vision for the future networks and services. In the coming decade, 6G will bring a new era in which billions of things, humans, connected vehicles, robots and drones will generate zettabytes of digital information. 6G will enable unprecedented connectivity modes and properties that can effectively match the needs of a growing and broader range of demanding applications. The White Paper explains how 6G is expected to play a key role in the evolution of the society towards the 2030’s, as the convergence between the digital, physical and personal worlds will increasingly become a reality. Furthermore, 6G will support the European Green Deal’s objective of reaching climate neutrality for Europe by 2050. This and other objectives of 6G will also greatly contribute to the United Nations Sustainable Development Goals.
Conference Paper
Full-text available
The promise of disparate features envisioned by the 3GPP for 5G, such as offering enhanced Mobile Broadband connectivity while providing massive Machine Type Communications likely with very low data rates and maintaining Ultra Reliable Low Latency Communications requirements, create a very challenging environment for protecting the 5G networks themselves and associated assets. To overcome such complexity, future 5G networks must employ a very high degree of network and service management automation, which is a security challenge by itself as well as an opportunity for smarter and more efficient security functions. In this paper, we present the smart, trustworthy and liable 5G security platform being designed and developed in the INSPIRE-5Gplus1 project. This platform takes advantage of new techniques such as Machine Learning (ML), Artificial Intelligence (AI), Distributed Ledger Technologies (DLT), network softwarization and Trusted Execution Environment (TEE) for closed-loop and end-to-end security management following a zero-touch model in 5G and Beyond 5G networks. To this end, we specifically elaborate on two key aspects of our platform, namely security management with Security Service Level Agreements (SSLAs) and liability management, in addition to the description of the overall architecture.
Full-text available
The ETSI's Zero touch network and Service Management (ZSM) framework is a prominent initiative to tame the envisioned complexity in operating and managing 5G and beyond networks. To this end, the ZSM framework promotes the shift toward full Automation of Network and Service Management and Operation (ANSMO) by leveraging the flexibility of SDN/NFV technologies along with Artificial Intelligence, combined with the portability and reusability of model-driven, open interfaces. Besides its benefits, each leveraged enabler will bring its own security threats, which should be carefully tackled to make the ANSMO vision a reality. This paper introduces the ZSM's potential attack surface and recommends possible mitigation measures along with some research directions to safeguard ZSM system security.
6G networks will take the digital services offered by 5G to a whole new level with considerably higher bit rates, lower latency, and ultra-re-liability. However, the security of these systems is crucial to fulfill the promise of 6G. A critical element of this requirement is the efficient and pervasive protection of 6G infrastructure and services. In this article, we propose Moving Target Defense (MTD) as a key proactive defense element and elaborate on how it can be integrated into beyond 5G systems. We also present the standardization perspective, the relevant research challenges, and future research directions.
6g security challenges and potential solutions
  • P Porambage
  • G Gür
  • D P Moya Osorio
  • M Livanage
  • M Ylianttila
Hexa-X deliverable D1.3: Targets and requirements for 6G - initial E2E architecture
  • B M Khorsandi
Policy-based definition and policy for orchestration final report
  • A M Zarca
  • J B Bernabé
  • J Ortíz
  • A Skarmeta
Applying expert system technology to code reuse with pyke
  • B Frederiksen