logo

A Risk Management framework for 5G

   

Added on  2023-03-20

11 Pages2652 Words70 Views
A Risk Management framework for 5G 1
A Risk Management Framework for 5G Proposal
Student
Tutor
Institutional Affiliations
Date

A Risk Management framework for 5G 2
Introduction and background
There have been a rapid proliferation of technology over the last two decades, especially
in the field of telecommunication. The wireless network is getting progressively indispensable
part of the current and future life. The fast pacing technology such as the Internet of Things IoT,
the mobile internet among other numerous applications have emerged and they are widely used
through wireless communication networks. Experts predict that by the year 2022, mobile devices
from all over the world will increase from 9 billion in 2018 to 13 billion come 2022 and the
traffic from the wireless devices will be approximately 8 Exabyte per month1. Despite the fact
that the currently used network, 4G, is able to fairly accommodate the device access
requirements and the data traffic for the next one or two years, it will not be able to
accommodate the future requirements, particularly for large internet of things IoT devices, very
high traffic applications and high mobile devices. As a result, 5G network has emerged to
support the future wireless communication in the next generation.
The main aim of the 5G network is to achieve the Internet of Things IoT and the IoT
require a network access that is resilient, secure and is able to secure the privacy of individuals
and the 5G network is designed such that it adopts a revolutionary technology for supporting all
of these2. Be that as it may, there are new requirements, technologies, as well as scenarios such
as the Service Level Agreement SLA, Partner Settlement, Security assurance, billing assurance,
1 Taleb T, Samdanis K, Mada B, Flinck H, Dutta S, Sabella D. On multi-access edge computing: A survey of the
emerging 5G network edge cloud architecture and orchestration. IEEE.
2 Fichera S, Gharbaoui M, Castoldi P, Martini B, Manzalini A. On experimenting 5G: Testbed set-up for SDN
orchestration across network cloud and IoT domains. In2017 IEEE Conference on Network Softwarization (NetSoft)
2017 Jul 3 (pp. 1-6). IEEE.

A Risk Management framework for 5G 3
usage assurance and provisioning assurance that if not well handled, would bring security
challenges to the 5G network and this demands a pertinent diverse security mechanism. The
cyber security surface through the past couples of years were quite small. Networks were rarely
connected; if there was connection, then it could be due to downloads from email or regular
check-up. People were browsing from standalone workstations. Today, massive networks are
now connected every time and this has come with a dramatic growth of cyber-attack. The cyber
security threat has sufficiently grown to an extent that it has become level concern in the
information technology industry.
5G security management has drawn a lot of attention. There is a lot of study concerning
the key security issues that are involved in the network. The majority of the study, however,
focus on the issues concerning the 5G network layers involving the logical security layer and the
physical security layer3. Nevertheless, the research has shown little attention on the security risks
in the Communication Service providers CSP sector. However, the CSP sector can experience
security issues if some characteristics of the underlying communication including Service Level
Agreement SLA, Partner Settlement, Security assurance, billing assurance, usage assurance and
provisioning assurance that if not accorded the care they deserve, may introduce security risk to
the Communication Service Provider CSP value chain at large4. It is therefore important to
recommend a pertinent risk management framework for the 5G network. In this rationale, this
3 Campolo C, Molinaro A, Iera A, Menichella F. 5G network slicing for vehicle-to-everything services. IEEE
Wireless Communications. 2017 Dec;24(6):38-45.
4 Akyildiz IF, Wang P, Lin SC. SoftAir: A software defined networking architecture for 5G wireless systems.
Computer Networks. 2015 Jul 5;85:1-8.

A Risk Management framework for 5G 4
document seek to propose a security risk management framework for the 5G based on the
previously mentioned characteristics of the network. The remaining part of this document is
arranged in the following manner: after this section, Introduction and background, we proceed to
literature review where we study the current works after which the document present the
proposed framework, and lastly summary and conclusion.
Literature review
SLA monitoring
There are active and advance research on SLA monitoring for CSP concerning 5G
network. As such several approaches and solutions have evolved for techniques that handles
Quality of Service QoS that optimizes the process within a given workflow. 5Kousiouris and his
team presents a study in which the importance of application of ANNs in the service oriented
field is examined. The main aim of the ANN in their approach is setting up the design attribute
targets for a web service system in terms of QoS. Another interesting study is a study by Ali,
Rana, Walker, Jha and Sohail6. In their work, the scholars discusses a framework for
incorporating the QoS Grid application. The authors use a performance model to estimate pricing
and response time in order to find a given job execution price.
Partner Settlement
5 Kousiouris G, Kyriazis D, Gogouvitis S, Menychtas A, Konstanteli K, Varvarigou T. Translation of application-
level terms to resource-level attributes across the Cloud stack layers. In2011 IEEE Symposium on Computers and
Communications (ISCC) 2011 Jun 28 (pp. 153-160). IEEE.
6 Ali RJ, Rana OF, Walker DW, Jha S, Sohail S. G-QoSM: Grid service discovery using QoS properties. Computing
and Informatics. 2012 Feb 21;21(4):363-82.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IoT and Cyber Security
|15
|4234
|395

Benefits and Security Issues of IoT in Farming - Synthesis Matrix
|3
|1178
|313

Wireless Communication Protocols for Internet of Things (IoT)
|10
|902
|363

IoT Design Challenges: Wireless IoT Networks (5G vs. LoRaWAN)
|10
|3100
|61

Report on the Springer 2022
|1
|427
|8

5G Network: Architecture and Emerging Technologies
|27
|22798
|222