Measuring Security in 5G and Future Networks
- URL: http://arxiv.org/abs/2505.08799v1
- Date: Fri, 09 May 2025 04:24:17 GMT
- Title: Measuring Security in 5G and Future Networks
- Authors: Loay Abdelrazek, Rim ElMalki, Filippo Rebecchi, Daniel Cho,
- Abstract summary: Mobile networks, such as 5G and future generations such as 6G, play a pivotal role and must be considered as critical infrastructures.<n>We introduce a state machine model designed to capture the security life cycle of network functions.<n>We identify three essential security metrics -- attack surface exposure, impact of system vulnerabilities, and effectiveness of applied security controls.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In today's increasingly interconnected and fast-paced digital ecosystem, mobile networks, such as 5G and future generations such as 6G, play a pivotal role and must be considered as critical infrastructures. Ensuring their security is paramount to safeguard both individual users and the industries that depend on these networks. An essential condition for maintaining and improving the security posture of a system is the ability to effectively measure and monitor its security state. In this work we address the need for an objective measurement of the security state of 5G and future networks. We introduce a state machine model designed to capture the security life cycle of network functions and the transitions between different states within the life cycle. Such a model can be computed locally at each node, or hierarchically, by aggregating measurements into security domains or the whole network. We identify three essential security metrics -- attack surface exposure, impact of system vulnerabilities, and effectiveness of applied security controls -- that collectively form the basis for calculating the overall security score. With this approach, it is possible to provide a holistic understanding of the security posture, laying the foundation for effective security management in the expected dynamic threat landscape of 6G networks. Through practical examples, we illustrate the real-world application of our proposed methodology, offering valuable insights for developing risk management and informed decision-making strategies in 5G and 6G security operations and laying the foundation for effective security management in the expected dynamic threat landscape of 6G networks.
Related papers
- Generative AI for Vulnerability Detection in 6G Wireless Networks: Advances, Case Study, and Future Directions [7.991374874432769]
Generative AI (GAI) emerges as a transformative solution, leveraging synthetic data generation, multimodal reasoning, and adaptive learning to enhance security frameworks.<n>This paper explores the integration of GAI-powered vulnerability detection in 6G wireless networks, focusing on code auditing, protocol security, cloud-edge defenses, and hardware protection.
arXiv Detail & Related papers (2025-06-25T14:36:31Z) - SAFER-D: A Self-Adaptive Security Framework for Distributed Computing Architectures [6.145115042061793]
The rise of the Internet of Things and Cyber-Physical Systems has introduced new challenges on ensuring secure and robust communication.<n>We present our holistic self-adaptive security framework which combines different adaptation strategies to create comprehensive and efficient defense mechanisms.
arXiv Detail & Related papers (2025-06-19T19:02:35Z) - LLM Agents Should Employ Security Principles [60.03651084139836]
This paper argues that the well-established design principles in information security should be employed when deploying Large Language Model (LLM) agents at scale.<n>We introduce AgentSandbox, a conceptual framework embedding these security principles to provide safeguards throughout an agent's life-cycle.
arXiv Detail & Related papers (2025-05-29T21:39:08Z) - Agile Orchestration at Will: An Entire Smart Service-Based Security Architecture Towards 6G [43.63515130049697]
We propose ES3A (Entire Smart Service-based Security Architecture), a novel security architecture for 6G networks.<n>Our architecture consists of three layers and three domains. It relies on a two-stage orchestration mechanism to tailor smart security strategies for customized protection in high-dynamic 6G networks.
arXiv Detail & Related papers (2025-05-29T01:05:02Z) - Integrating Communication, Sensing, and Security: Progress and Prospects of PLS in ISAC Systems [0.05999777817331316]
It is of paramount importance to consider a balanced trade-off between communication reliability, sensing, and security in future networks, such as the 5G and beyond, and the 6G.<n>We provide a comprehensive and system-wise review of designed secure ISAC systems from a PLS point of view.<n>The amalgamation of PLS and ISAC is analyzed in a broader impact by considering attacks targeting data confidentiality, communication covertness, and sensing spoofing.
arXiv Detail & Related papers (2025-05-08T09:40:14Z) - An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks [49.605335601285496]
6G space-air-ground integrated networks (SAGINs) offer ubiquitous coverage for various mobile applications.<n>We propose a novel security framework for SAGINs based on Large Language Models (LLMs)<n>Our framework produces highly accurate security strategies that remain robust against a variety of unknown attacks.
arXiv Detail & Related papers (2025-05-06T04:14:13Z) - Bridging the Security Gap: Lessons from 5G and What 6G Should Do Better [1.3505077405741583]
This paper provides a set of security recommendations for 6G networks.<n>It focuses on access and handover procedures, which often lack encryption and integrity protection.<n>It concludes with actionable recommendations to enhance the security, resilience, and robustness of 6G access and handover mechanisms.
arXiv Detail & Related papers (2025-01-19T13:44:17Z) - ACRIC: Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
Recent security incidents in safety-critical industries exposed how the lack of proper message authentication enables attackers to inject malicious commands or alter system behavior.<n>These shortcomings have prompted new regulations that emphasize the pressing need to strengthen cybersecurity.<n>We introduce ACRIC, a message authentication solution to secure legacy industrial communications.
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - An Approach To Enhance IoT Security In 6G Networks Through Explainable AI [1.9950682531209158]
6G communication has evolved significantly, with 6G offering groundbreaking capabilities, particularly for IoT.<n>The integration of IoT into 6G presents new security challenges, expanding the attack surface due to vulnerabilities introduced by advanced technologies.<n>Our research addresses these challenges by utilizing tree-based machine learning algorithms to manage complex datasets and evaluate feature importance.
arXiv Detail & Related papers (2024-10-04T20:14:25Z) - Penetration Testing of 5G Core Network Web Technologies [53.89039878885825]
We present the first security assessment of the 5G core from a web security perspective.
We use the STRIDE threat modeling approach to define a complete list of possible threat vectors and associated attacks.
Our analysis shows that all these cores are vulnerable to at least two of our identified attack vectors.
arXiv Detail & Related papers (2024-03-04T09:27:11Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks [2.3464026676834813]
We introduce a digital twin-empowered smart attack detection system for 6G EoT networks.
It monitors and simulates physical assets in real time, enhancing security.
Our system excels in proactive threat detection, ensuring 6G EoT network security.
arXiv Detail & Related papers (2023-10-05T14:06:04Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Neural Certificates for Safe Control Policies [108.4560749465701]
This paper develops an approach to learn a policy of a dynamical system that is guaranteed to be both provably safe and goal-reaching.
We show the effectiveness of the method to learn both safe and goal-reaching policies on various systems, including pendulums, cart-poles, and UAVs.
arXiv Detail & Related papers (2020-06-15T15:14:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.