Visible to the public 5G Core Security in Edge Networks: A Vulnerability Assessment Approach

Title5G Core Security in Edge Networks: A Vulnerability Assessment Approach
Publication TypeConference Paper
Year of Publication2021
AuthorsKholidy, Hisham A., Karam, Andrew, Sidoran, James L., Rahman, Mohammad A.
Conference Name2021 IEEE Symposium on Computers and Communications (ISCC)
Keywords5G attack graphs, 5G attack vector, 5G Edge security, 5G mobile communication, 5G security testbed, Computers, Economics, pubcrawl, Scalability, security, security scalability, vulnerability analysis
AbstractThe 5G technology will play a crucial role in global economic growth through numerous industrial developments. However, it is essential to ensure the security of these developed systems, while 5G brings unique security challenges. This paper contributes explicitly to the need for an effective Vulnerability Assessment Approach (VAA) to identify and assess the vulnerabilities in 5G networks in an accurate, salable, and dynamic way. The proposed approach develops an optimized mechanism based on the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) to analyze the vulnerabilities in 5G Edge networks from the attacker perspective while considering the dynamic and scalable Edge properties. Furthermore, we introduce a cloud-based 5G Edge security testbed to test and evaluate the accuracy, scalability, and performance of the proposed VAA.
DOI10.1109/ISCC53001.2021.9631531
Citation Keykholidy_5g_2021