Skip to main content

5G Enablers for Network and System Security and Resilience

Deliverables

Final Market Analysis & Exploitation Report

Introduces a set of impact scenarios as part of the market analysis, socio-technical and economic opportunities. It details partner final exploitation plans.

Testbed extension and operation plan including business model

The conclusions and the possible next steps for the security testbed development.

5G Security testbed architecture

Description of the test architecture.

Project final report

The final technical report is a publishable summary of the entire action (describing the overview of the results and their exploitation and dissemination, the conclusions on the action and its socio-economic impact).

Risk assessment, mitigation and requirements (final)

This is the final report on risk assessment, mitigation and requirements for 5G.

5G-PPP Security Enablers Documentation (v1.0)

Documentation/manuals accompanying the reference implementations (e.g. installation and administration guides, user & programmers’ guides, unit testing plans).

Evaluation of the security enablers

Results and analysis of the testbed runs.

First report on communication, marketing and standardisation

This report covers the results of activities performed and their impact, including joint activities at the programme level, and planning of new actions on a 6-month basis. This report also sets the KPIs.

Security architecture (final)

The final description of high-level logical and functional security architecture for the 5G system.

Test plan (final)

Final description of how to evaluate the selected security enablers.

Trust model (draft)

This report will include the description of the initial trust model

Second report on communication, marketing and standardisation

The report covers the results of activities performed and their impact, including joint activities at the programme level and planning of new actions on a 6-month basis. Impact reporting includes KPI outcomes

5G-PPP security enablers technical roadmap (update)

Updated technical roadmap on development of the 5G security enablers.

5G-PPP security enablers technical roadmap (early vision)

The vision of the security enablers to be developed during the project.

First market analysis & exploitation report

Introduces a set of impact scenarios as part of the market analysis, SME concerns based on recent surveys, and socio-technical and economic opportunities.

5G-PPP security enablers open specifications (v2.0)

The open specifications for the final set of the security enablers.

Risk assessment, mitigation and requirements (draft)

This is a preliminary report on risk assessment, mitigation and requirements for 5G.

Test plan (draft)

Draft descriptions of how to evaluate the selected security enablers

Trust model (final)

This report will include the description of the final trust model.

Security architecture (draft)

The draft description of high-level logical and functional security architecture for the 5G system.

Use cases

Definition of the use cases focusing on security and privacy aspects.

5G-PPP security enablers open specifications (v1.0)

The open specifications for the first set of the security enablers.

5G-PPP security enablers documentation (v2.0)

Documentation/manuals accompanying the reference implementations (e.g. installation and administration guides, user & programmers’ guides, unit testing plans).

5G-PPP security enablers technical roadmap (final)

Final technical roadmap on the 5G security enablers containing the development activities beyond 5G-ENSURE.

Third report on communication, marketing and standardisation

The report covers the results of activities performed and their impact, including joint activities at the programme level and planning of new actions on a 6-month basis. Impact reporting includes KPI outcomes.

5G-PPP security enablers sw release (v1.0)

Reference implementations for the first set of the enablers.

5G-PPP security enablers sw release (v2.0)

Reference implementations for the final set of the enablers.

Searching for OpenAIRE data...

Publications

Runtime Verification of Temporal Properties over Out-of-Order Data Streams

Author(s): David Basin, Felix Klaedtke, Eugen Zălinescu
Published in: Lecture Notes in Computer Science, 10426, 2017, Page(s) 356-376, ISBN 978-3-319-63386-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-63387-9_18

Safeguarding VNF Credentials with Intel SGX

Author(s): Nicolae Paladi, Linus Karlsson
Published in: Proceedings of the SIGCOMM Posters and Demos on - SIGCOMM Posters and Demos '17, 2017, Page(s) 144-146, ISBN 9781-450350570
Publisher: ACM Press
DOI: 10.1145/3123878.3132016

Towards Micro-Segmentation in 5G Network Security

Author(s): Olli Mämmelä, Jouni Hiltunen, Jani Suomalainen, Kimmo Ahola, Petteri Mannersalo, Janne Vehkaperä
Published in: Proc. of the EuCNC 2016 Network Management, QoS and Security workshop, 2016
Publisher: EuCNC2016 proceedings

Cases for Including a Reference Monitor to SDN

Author(s): Dimitrios Gkounis, Felix Klaedtke, Roberto Bifulco, Ghassan O. Karame
Published in: Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference - SIGCOMM '16, 2016, Page(s) 599-600, ISBN 9781-450341936
Publisher: ACM Press
DOI: 10.1145/2934872.2959066

TruSDN: Bootstrapping Trust in Cloud Network Infrastructure

Author(s): Nicolae Paladi and Christian Gehrmann
Published in: 12th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2016), OCTOBER 10–12, 2016, Guangzhou, China, 2016
Publisher: Springer

Threats to 5G Group-Based Authentication

Author(s): Rosario Giustolisi and Christian Gehrmann
Published in: Proc. of the 13th International Conference on Security and Cryptography (SECRYPT 2016), 2016
Publisher: SCITEPRESS

On the Fingerprinting of Software-Defined Networks

Author(s): Heng Cui, Ghassan O. Karame, Felix Klaedtke, Roberto Bifulco
Published in: IEEE Transactions on Information Forensics and Security, 11/10, 2016, Page(s) 2160-2173, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2016.2573756