Abstract

Future 5G networks must provide communication services to a great and heterogeneous collection of scenarios: from traditional mobile communications to emerging applications such as Industry 4.0 or the Internet of Things (IoT). In this context, the network slicing technique is defined, where network resources are packaged and assigned in an isolated manner to the sets of users according to their specific requirements. Two different domains are, thus, defined: the intra-slice domain (where dedicated and specific solutions have to be deployed) and the inter-slice domain (including transversal solutions). One of the key topics which should be redefined following this approach is security. Traditionally, some solutions (such as stream ciphers) were not considered in mobile networks. However, 5G systems will be extensively employed in other new and very distinct scenarios, where requirements are different. For example, the use of resource constrained devices with little mobility and real-time data streaming in certain IoT applications suggests the use of stream ciphers (and other similar techniques) as the main security solutions. Therefore, in this paper, we investigate and propose a new security solution for emerging 5G networks, to be applied in the intra-slice domain. The proposed solutions employ lightweight pseudo-random number generators in order to provide the keystream used in stream ciphers which protect the private information and hide the communication signals in the frequency spectrum using spread spectrum techniques. We also describe and evaluate a first implementation of the proposed solution, using both, a simulation scenario and a real deployment.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.