Security Analysis of Mobile Edge Computing in Virtualized Small Cell Networks

Based upon the context of Mobile Edge Computing (MEC) actual research and within the innovative scope of the SESAME EU-funded research project, we propose and assess a framework for security analysis applied in virtualised Small Cell Networks, with the ai

  • PDF / 2,967,453 Bytes
  • 13 Pages / 439.37 x 666.14 pts Page_size
  • 32 Downloads / 157 Views

DOWNLOAD

REPORT


1

School of Computing and Engineering, University of West London, London, W5 5RF, UK [email protected] 2 Hellenic Telecommunications Organization (OTE) S.A., 99, Kifissias Avenue, 151 24 Athens, Greece {ichochliouros,esfak,mbelesioti,nbompetsis}@oteresearch.gr, [email protected] 3 Fujitsu Laboratories of Europe Ltd., Hayes Park Central, Hayes End Road, Hayes, Middlesex, UB4 8FE, UK {Mick.Wilson,Charles.Turyagyenda}@uk.fujitsu.com 4 SmartNET S.A., 2, Lakonias Street, Agios Dimitrios, 173 42 Attica, Greece [email protected] Abstract. Based upon the context of Mobile Edge Computing (MEC) actual research and within the innovative scope of the SESAME EU-funded research project, we propose and assess a framework for security analysis applied in virtualised Small Cell Networks, with the aim of further extending MEC in the broader 5G environment. More specifically, by applying the fundamental concepts of the SESAME original architecture that aims at providing enhanced multi-tenant MEC services through Small Cells coordination and virtualization, we focus on a realistic 5G-oriented scenario enabling the provision of large multitenant enterprise services by using MEC. Then we evaluate several security issues by using a formal methodology, known as the Secure Tropos. Keywords: 5G · Mobile Edge Computing (MEC) · Network Functions Virtualization (NFV) · Security · Software Defined Networking (SDN) · Small Cell (SC) · Virtual Network Function (VNF)

1

Introduction

In the recent years we are witnessing a widespread use of end user devices with advanced capabilities, such as smart-phones and tablet computers, and the emergence of new services and communication technologies. Modern devices implicate for powerful multimedia capabilities and they are increasingly penetrating the global e-communica‐ tions market, thus creating new demands on broadband (wireless or mobile) access. The challenge becomes greater as devices are also expected to actively communicate with a multiplicity of equipment (such as sensors, smart meters, actuators, etc.) within a fully converged framework of heterogeneous (underlying) network infrastructure(s). This © IFIP International Federation for Information Processing 2016 Published by Springer International Publishing Switzerland 2016. All Rights Reserved L. Iliadis and I. Maglogiannis (Eds.): AIAI 2016, IFIP AICT 475, pp. 653–665, 2016. DOI: 10.1007/978-3-319-44944-9_58

654

V. Vassilakis et al.

results to the emergence of new data services and/or related applications that can dras‐ tically “reshape” the network usage and all associated demands; these are also “key success factors” in order to realize an effective mobile broadband experience for the benefit of our modern societies and economies. This new evolved ecosystem, however, imposes very strict requirements on the network architecture and its functionality. Enabling low end-to-end (E2E) latency and supporting a large number of connections at the fitting level, is not possible to be accomplished in current Long-Term Evolution (LTE) n