Security enablers explored in the trials include satellite backhaul securing with IPsec, identity management (IdM) for mission-critical (MC) services in tactical bubble, and remote attestation of IoT devices.

Security enablers explored in the trials include satellite backhaul securing with IPsec, identity management (IdM) for mission-critical (MC) services in tactical bubble, and remote attestation of IoT devices.

Source publication
Article
Full-text available
The forthcoming communication networks for public safety authorities rely on the fifth generation (5G) of mobile networking technologies. Police officers, paramedics, border guards, as well as fire and rescue personnel, will connect through commercial operator’s access network and rapidly deployable tactical bubbles. This transition from closed and...

Context in source publication

Context 1
... illustrated in Fig. 2. The solutions have been analyzed against the use cases described in Subsection II.D, the threat framework from Section III, and the identified threat scenarios from Section III. Table VIII highlights the main ...

Similar publications

Article
Full-text available
The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while oper...

Citations

... The RESPOND-A project, on the other hand, has evaluated 5G capabilities and demonstrated the superior connectivity offered by 5G communications technologies in hands-on approach across different search-and-rescue scenarios with real end-users Paladin et al. (2023). The FUDGE-5G project (Gomez-Barquero et al., 2021) aims at contributing to the recent evidence surrounding the concept of the 5G "tactical bubble", i.e., ad-hoc, dedicated mobile networks, intended solely for the vertical for which they are deployed (Suomalainen et al., 2021). More recently, newly funded initiatives FIDAL and 6G-SANDBOX announced plans to experiment with the 3GPP Common API Framework, to expose mission-critical services APIs (Charismiadis et al., 2023). ...
Article
Full-text available
Low latency and high bandwidth heralded with 5G networks will allow transmission of large amounts of Mission-Critical data over a short time period. 5G hence unlocks several capabilities for novel Public Protection and Disaster Relief (PPDR) applications, developed to support first responders in making faster and more accurate decisions during times of crisis. As various research initiatives are giving shape to the Network Application ecosystem as an interaction layer between vertical applications and the network control plane, in this article we explore how this concept can unlock finer network service management capabilities that can be leveraged by PPDR solution developers. In particular, we elaborate on the role of Network Applications as means for developers to assure prioritization of specific emergency flows of data, such as high-definition video transmission from PPDR field users to remote operators. To demonstrate this potential in future PPDR-over-5G services, we delve into the transfer of network-intensive PPDR solutions to the Network Application model. We then explore novelties in Network Application experimentation platforms, aiming to streamline development and deployment of such integrated systems across existing 5G infrastructures, by providing the reliability and multi-cluster environments they require.
... ity challenges in the 5G landscape include the development of rapid response mechanisms. In the event of a security incident, organizations should have predefined response plans that enable swift detection, containment, and mitigation of the threat. Rapid response mechanisms reduce the impact of cyber attacks and enhance overall network resilience , Suomalainen et. al., 2021, Tang et. al., 2022. ...
Article
Full-text available
The advent of 5G technology represents a paradigm shift in the realm of communication and security, ushering in a new era of connectivity and capabilities. This paper provides a comprehensive review of the far-reaching implications of emerging 5G technology on communication and security landscapes. The 5G technology promises unprecedented data speeds and low latency, revolutionizing the way we communicate and interact with digital content. Its enhanced bandwidth and connectivity are poised to transform various industries, including healthcare, manufacturing, and transportation. This review explores how 5G's ultra-fast data transfer rates will enable real-time communication, paving the way for innovations like augmented reality and Internet of Things (IoT) applications. Additionally, the integration of 5G into smart cities will redefine urban infrastructure, enhancing efficiency and sustainability. However, the widespread adoption of 5G also raises concerns about security vulnerabilities. The study delves into the potential risks associated with 5G technology, such as increased attack surfaces and the need for robust encryption protocols. It examines the evolving threat landscape and the imperative for proactive cybersecurity measures to safeguard sensitive information and critical infrastructure. Furthermore, the paper explores the geopolitical implications of 5G technology, as nations vie for dominance in the race to deploy and control this transformative connectivity. The competitive landscape of global telecommunications is shifting, with implications for international relations and economic competitiveness. This review highlights the transformative potential of emerging 5G technology in communication and security realms. While promising unprecedented connectivity and technological advancements, it underscores the critical importance of addressing security challenges to fully realize the benefits of this groundbreaking technology. Stakeholders must collaborate to navigate the complexities and capitalize on the vast opportunities presented by the 5G revolution.
... Tactical bubbles may also support isolated operations in which case also the 5G core network and mission-critical services are hosted in the multi-access edge (MEC) server with the access network. Cybersecurity risks [29] include, e.g., disruption of the operational capabilities as well as leaking of short-lived operational data and long-lived organizational or privacy-critical information. ...
Conference Paper
Full-text available
Risk assessment is an essential step for architecting the resilience (safety/security) of a mission critical software-intensive system as well as a regular maintenance procedures. It closely relates to estimating the (cyber) insurance needs of the system. Managing of cyber risk involves gathering threat intelligence, prioritizing the current threats against the system of interest, and planning mitigation strategies. While reliability engineering can rely on a relatively stable set of failure modes and statistical data related to their probabilities of occurrence, security deals with a dynamic threat environment. This reality has dictated the use of qualitative methods (like STRIDE and DREAD), relying on the experience and the specific background of the person performing the study. This subjectivity leads to criticism, since results calculated by different experts for the same system can vary significantly. This challenge has been addressed in the past with a method called DELPHI aiming to reduce subjectivity using a group of experts. The scientific contribution of this paper is the development of the CyberRiskDELPHI, a modified version of original DELPHI method for the identification and prioritization of cyber risks. It is demonstrated over a case study of a 5G tactical bubble covering the communication needs of a critical operation. An early evaluation of the use of a large language model (ChatGPT) in risk identification and prioritization for this case study is also included as a complementary side-activity giving an indication of future developments in the risk assessment domain.
... An analysis is conducted in [2] on the tactical and commercial security guidelines provided by 5G, specifically focusing on communications for the public environments. The objective is to determine whether the security level achieved in a public 5G network can be extrapolated to military scenarios. ...
Article
Full-text available
In the realm of military communications, the advent of new technologies like 5G and the future 6G networks holds promise. However, incorporating these technologies into tactical environments presents unique security challenges. This article delves into an analysis of these challenges by examining practical use cases for military communications, where emerging technologies can be applied. Our focus lies on identifying and presenting a range of emerging technologies associated with 5G and 6G, including the Internet of things (IoT), tactile internet, network virtualization and softwarization, artificial intelligence, network slicing, digital twins, neuromorphic processors, joint sensing and communications, and blockchain. We specifically explore their applicability in tactical environments by proposing where they can be potential use cases. Additionally, we provide an overview of legacy tactical radios so that they can be researched to address the challenges posed by these technologies.
... Additionally, the application of fifth generation (5G) new radio (NR) for PSNs has been explored in the literature (Pérez et al., 2020;Ali et al., 2021;Chochliouros et al., 2021;Suomalainen et al., 2021;Li et al., 2022). In Chochliouros et al. (2021), the authors have introduced a PS scenario with the primary aim of showcasing the utilization of a shared 5G infrastructure during emergencies that involves both first responders and civilians. ...
... They examined the integration of new 5G mobile networks for the dynamic deployment of virtualized emergency services within future mobile communications. Furthermore, Suomalainen et al. (2021) have investigated and conducted a survey concerning the security architecture and mechanisms that are intended to enhance prioritized PS communication within 5G networks. Moreover, Li et al. (2022) identified critical technical hurdles and elaborated on the evolution of 5G NR features aimed at fulfilling the emerging safety-critical prerequisites. ...
Article
Full-text available
Public protection and disaster relief (PPDR) agencies rely on wireless communications to respond in the event of emergencies. Public safety networks (PSNs) provide the wireless network used by emergency services. PSN is used to support push-to-talk services with some data transmission by employing land mobile radios. However, PPDR agencies are increasingly relying on additional information such as videos that require higher bandwidths. Therefore, many countries are transitioning or integrating their public safety networks with advanced broadband wireless communication systems such as fourth-generation (4G) long term evolution (LTE) and planning to evolve to fifth-generation (5G) new radio (NR) in the future. The paper investigates infrastructure sharing mechanisms, coexistence, and deployment strategies in the PSNs' transition to a 4G LTE network. We also examine the LTE-based PSN deployment scenarios in different countries. Furthermore, the advantages and disadvantages of various sharing mechanisms and coexistence schemes are discussed.
... Virtualization can help network security. For this reason, the commercial and tactical security guidelines provided by 5G are analyzed for communications in public environments to validate if the security level of a public 5G network can be extrapolated to military scenarios [2]. 5G will dominate next-generation telecommunications networks and enable new applications, playing a pivotal role in future societies. ...
Preprint
Full-text available
p>The technology associated with 5G and future 6G networks is challenging for military communications in tactical scenarios. This work has selected and analyzed a group of leading technologies that allow tactical networks to evolve. The virtualization of networks with 5G helps to guarantee greater security. These developments are vital in improving the feasibility of truly network-centric operations for military applications. Software-defined networks, IoT, blockchain, Artificial Intelligence, semantic communications, or neuromorphic processors help increase communications performance. These technologies have improved ten classic use cases in the military field. This work is an analysis to serve as a starting point for new scientists to open up new lines of research. It is not merely a compilation but an analytical basis for future work.</p
... Virtualization can help network security. For this reason, the commercial and tactical security guidelines provided by 5G are analyzed for communications in public environments to validate if the security level of a public 5G network can be extrapolated to military scenarios [2]. 5G will dominate next-generation telecommunications networks and enable new applications, playing a pivotal role in future societies. ...
Preprint
Full-text available
p>The technology associated with 5G and future 6G networks is challenging for military communications in tactical scenarios. This work has selected and analyzed a group of leading technologies that allow tactical networks to evolve. The virtualization of networks with 5G helps to guarantee greater security. These developments are vital in improving the feasibility of truly network-centric operations for military applications. Software-defined networks, IoT, blockchain, Artificial Intelligence, semantic communications, or neuromorphic processors help increase communications performance. These technologies have improved ten classic use cases in the military field. This work is an analysis to serve as a starting point for new scientists to open up new lines of research. It is not merely a compilation but an analytical basis for future work.</p
... The trustworthiness of the core architecture can have a knock-on effect on other systems, such as the cloud. Under this context, it is vital to examine the credible threats against the fundamental or core infrastructure (Suomalainen et al., 2021), (Lopez et al., 2022). ...
Article
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as a remarkable edge-cloud technology to provide computing facilities to resource-restrained edge user devices. Utilizing the features of MEC user devices can obtain computational services from the network edge which drastically reduces the transmission latency of evolving low-latency applications such as video analytics, e-healthcare, etc. The objective of the work is to perform a thorough survey of the recent advances relative to the MEC paradigm. In this context, the work overviewed the fundamentals, architecture, state-of-the-art enabling technologies, evolving supporting/assistive technologies, deployment scenarios, security issues, and solutions relative to the MEC technology. The work, moreover, stated the relative challenges and future directions to further improve the features of MEC.
... IAB networks have motivated the research activity from the academy and industrial sectors. Although operating on mmWave or sub-6 GHz bands, the IAB architecture is playing an appreciable role in several practical environments in FR1 5G wireless communications, such as public safety networks [21], [22]. According to the 3GPP standard [18], IAB architectures can improve the spectral efficiency (SE) and reduce the communication delay without any requirement for the guard time/band in comparison with the standardized LTE relay nodes, however, the end-to-end packet delay may greatly increase due to the multi-hop transmission, so this limitation is one of the main aspects currently tackled in 3GPP Release-18, particularly for mobility scenarios [23]. ...
Article
Full-text available
In this paper, we present a 3GPP-inspired hardware implementation for the out-of-band Integrated Access and Backhaul (IAB) network, which serves as a solution to both coverage extension and capacity boosting in 5G and beyond networks. By employing an Ettus x310 software-defined radio (SDR) board, Pasternack’s 60 GHz Transmitter (Tx) waveguide module, and Matlab™ software, we design and develop an easy-to-use out-to-band mmWave Layer 2 protocol. The proposed protocol decodes a frequency range 1 (FR1) 5G signal as input at 3.5 GHz, which is retransmitted to the UE as a frequency range 2 (FR2) 5G signal at 60 GHz. In the implementation of the Layer 2 protocol, the least squares (LS) estimator is adopted by considering the demodulation reference signal (DM-RS) and the channel state information reference signal (CSI-RS) as pilot symbols in real-world environments. To alleviate the performance degradation in the mmWave access link, a phase noise cancellation (PNC) algorithm based on the phase tracking reference signal (PT-RS) is implemented at the UE node where a PT-RS block structure is introduced in the mmWave Layer 2 protocol transmitter stage. We review and evaluate the key performance indicators (KPIs) of the proposed Layer 2 protocol in real non-line-of-sight (NLOS) environments and a comparison between the gNode-to-UE link is carried out. Our results indicate that the performance of the proposed Layer 2 protocol is similar to the obtained with the off-the-shelf equipment demonstrating the right functionality of the developed algorithms. Experimental results evidence the superiority of the proposed Layer 2 protocol over the gNodeB-to-UE link (direct link communication) and the best performance is obtained when the PNC algorithm is considered in the IAB architecture.
... Once attackers breach the perimeter, they will be unhindered to achieve their goals. The security in 5G IoT networks must be hardened, especially in critical infrastructures that involve public safety and sensitive information [7]. It is necessary for modern networks to transform from static and perimeter-based defenses to a zero-trust security framework that focuses on the identity and integrity of individual components in the network. ...
... The hybrid architecture of public and tactical 5G IoT networks requires constant trust evaluation of the network components. Suomalainen et al. [7] have addressed the security of 5G public safety communication, which utilizes both tactical bubbles and commercial operators' infrastructure. Ramezanpour and Jagannath [28] have proposed a zero-trust architecture for 5G networks utilizing artificial intelligence to provide information security in untrusted networks, which requires a lot of training data. ...
Article
Full-text available
The increasing connectivity in the 5G Internet of Things networks has enlarged the attack surface and made the traditional security defense inadequate for sophisticated attackers, who can move laterally from node to node with stored credentials once build a foothold in the network. There is a need to shift from the perimeter-based defense to a zero-trust security framework that focuses on agent-centric trust evaluation and access policies to identify malicious attackers, and proactively delay their lateral movement while ensuring system performance. In this work, we propose a GAme-theoretic ZEro-Trust Authentication framework, known as GAZETA, to design interdependent trust evaluation and authentication policies using dynamic game models. The stealthy and dynamic behaviors of the agent are captured by a Markov game with one-sided incomplete information. We provide a quantitative trust evaluation mechanism for the agent and update the trust score continuously based on observations. The analysis of the equilibrium not only provides a way to quantitatively assess the security posture of the network but also enables a formal method to design zero-trust authentication policies. We propose a moving-horizon computational method to enable online decisions and rapid responses to environmental changes. This online computation also enables a dynamic trust evaluation that integrates multiple sources of security evidence. We use a case study to illustrate the resilience, robustness, and efficiency of the proposed zero-trust approach.