Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications

In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizatio...

Full description

Saved in:
Bibliographic Details
Published in韓國컴퓨터情報學會論文誌 Vol. 25; no. 11; pp. 105 - 114
Main Authors Park, Tae-Keun, Park, Jong-Geun, Kim, Keewon
Format Journal Article
LanguageKorean
Published 한국컴퓨터정보학회 2020
Subjects
Online AccessGet full text
ISSN1598-849X
2383-9945
DOI10.9708/jksci.2020.25.11.105

Cover

Abstract In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements. 본 논문에서는 산업 애플리케이션을 위한 5G Non-Public Network에서의 보안 이슈를 다룬다. 일반 대중에게 모바일 네트워크 서비스를 제공하는 공공 네트워크와는 달리, 5G Non-Public Network는 명확하게 정의된 사용자 조직이나 조직들의 그룹에게 5G 네트워크 서비스를 제공하며, 캠퍼스나 공장과 같이 사용자 조직이 지정한 영역 내에 구축된다. 본 논문의 주목적은 5G-ACIA (5G Alliance for Connected Industries and Automation)에서 제안한 네 가지 구축 모델에 따라 5G Non-Public Network가 이산 산업 및 공정 산업을 위하여 구축될 경우 고려되어야 할 보안 위협 및 잠재적 보안 요구사항을 도출하는 것이다. 본 논문의 범위를 명확하게 하기 위해 먼저 5G Non-Public Network에 적용할 보안 툴박스를 심층 방어 개념으로 표현한다. 일반적인 5G 이동통신 서비스와 관련된 보안 이슈는 본 논문의 범위에 포함되지 않는다. 그 다음, 산업 도메인에 5G-ACIA의 구축 모델을 적용할 때 고려해야 할 보안 이슈를 도출한다. 도출된 보안 이슈들은 세 가지 범주로 나뉘며 각각의 보안 이슈들은 개요, 보안 위협 및 잠재적 보안 요구사항의 순서로 서술된다.
AbstractList 본 논문에서는 산업 애플리케이션을 위한 5G Non-Public Network에서의 보안 이슈를 다룬다. 일반 대중에게 모바일 네트워크 서비스를 제공하는 공공 네트워크와는 달리, 5G Non-Public Network는명확하게 정의된 사용자 조직이나 조직들의 그룹에게 5G 네트워크 서비스를 제공하며, 캠퍼스나 공장과 같이 사용자 조직이 지정한 영역 내에 구축된다. 본 논문의 주목적은 5G-ACIA (5G Alliance for Connected Industries and Automation)에서 제안한 네 가지 구축 모델에 따라 5G Non-Public Network가 이산 산업 및 공정 산업을 위하여 구축될 경우 고려되어야 할 보안 위협 및 잠재적 보안요구사항을 도출하는 것이다. 본 논문의 범위를 명확하게 하기 위해 먼저 5G Non-Public Network에적용할 보안 툴박스를 심층 방어 개념으로 표현한다. 일반적인 5G 이동통신 서비스와 관련된 보안이슈는 본 논문의 범위에 포함되지 않는다. 그 다음, 산업 도메인에 5G-ACIA의 구축 모델을 적용할때 고려해야 할 보안 이슈를 도출한다. 도출된 보안 이슈들은 세 가지 범주로 나뉘며 각각의 보안이슈들은 개요, 보안 위협 및 잠재적 보안 요구사항의 순서로 서술된다. In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization’s defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements. KCI Citation Count: 0
In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements. 본 논문에서는 산업 애플리케이션을 위한 5G Non-Public Network에서의 보안 이슈를 다룬다. 일반 대중에게 모바일 네트워크 서비스를 제공하는 공공 네트워크와는 달리, 5G Non-Public Network는 명확하게 정의된 사용자 조직이나 조직들의 그룹에게 5G 네트워크 서비스를 제공하며, 캠퍼스나 공장과 같이 사용자 조직이 지정한 영역 내에 구축된다. 본 논문의 주목적은 5G-ACIA (5G Alliance for Connected Industries and Automation)에서 제안한 네 가지 구축 모델에 따라 5G Non-Public Network가 이산 산업 및 공정 산업을 위하여 구축될 경우 고려되어야 할 보안 위협 및 잠재적 보안 요구사항을 도출하는 것이다. 본 논문의 범위를 명확하게 하기 위해 먼저 5G Non-Public Network에 적용할 보안 툴박스를 심층 방어 개념으로 표현한다. 일반적인 5G 이동통신 서비스와 관련된 보안 이슈는 본 논문의 범위에 포함되지 않는다. 그 다음, 산업 도메인에 5G-ACIA의 구축 모델을 적용할 때 고려해야 할 보안 이슈를 도출한다. 도출된 보안 이슈들은 세 가지 범주로 나뉘며 각각의 보안 이슈들은 개요, 보안 위협 및 잠재적 보안 요구사항의 순서로 서술된다.
Author Tae-Keun Park(박태근)
Keewon Kim(김기원)
Jong-Geun Park(박종근)
Author_xml – sequence: 1
  fullname: Park, Tae-Keun
– sequence: 2
  fullname: Park, Jong-Geun
– sequence: 3
  fullname: Kim, Keewon
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002649881$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNpFkElPwzAQhS0EEmX5Bxx84cAhwbHj7VixlAJqq9IDN8t2bDApTrFTIf49YRGc3mjeN6OndwB2YxcdACcVKiVH4vylzTaUGGFUYlpWVVkhugNGmAhSSFnTXTCqqBSFqOXjPjjOORhEGOYSUzYCLw_OblPoP-DqOTndZ6hjAxdd72If9Br-2Uv3tg3JvQ77DEOEdAJnXSwWW7MOFs5c_96lNkPfJTiNzTb36et8vNkMtu5DF_MR2PN6nd3xrx6C1fXV6uKmuJ9Pphfj-6Id0hbOGk4Nq73XjGFjjceIMyu1ozXmVnjGHRKiYY4bjzw1WGhOvESGSKsNJofg7OdtTF61NqhOh2996lSb1Hi5mirJkKSCDezpD9uG3AcVm7xWt-O7-VebpCYUEy6Y5P9cHMp4dU3QajMMOn2o2fzyqkK1JDWm5BPRa3ku
ContentType Journal Article
DBID DBRKI
TDB
JDI
ACYCR
DEWEY 651.8
DOI 10.9708/jksci.2020.25.11.105
DatabaseName DBPIA - 디비피아
Nurimedia DBPIA Journals
KoreaScience
Korean Citation Index
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Business
EISSN 2383-9945
EndPage 114
ExternalDocumentID oai_kci_go_kr_ARTI_9609586
JAKO202034352378697
NODE10493425
GroupedDBID .UV
ALMA_UNASSIGNED_HOLDINGS
DBRKI
TDB
JDI
ACYCR
ID FETCH-LOGICAL-k945-ecb75b64ffa662bcbf2076c9ae5427c8f67e088d6e7bf0f5b28a73f90b39cab23
ISSN 1598-849X
IngestDate Sun Mar 09 07:51:04 EDT 2025
Fri Dec 22 12:03:31 EST 2023
Thu Feb 06 13:35:19 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Issue 11
Keywords 5G
Industrial Domain
Security Requirement
Deployment
Non-Public Network
보안 요구사항
구축
산업 도메인
Language Korean
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-k945-ecb75b64ffa662bcbf2076c9ae5427c8f67e088d6e7bf0f5b28a73f90b39cab23
Notes KISTI1.1003/JNL.JAKO202034352378697
OpenAccessLink http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO202034352378697&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
PageCount 10
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_9609586
kisti_ndsl_JAKO202034352378697
nurimedia_primary_NODE10493425
PublicationCentury 2000
PublicationDate 2020
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 2020
PublicationDecade 2020
PublicationTitle 韓國컴퓨터情報學會論文誌
PublicationTitleAlternate Journal of the Korea Society of Computer and Information
PublicationYear 2020
Publisher 한국컴퓨터정보학회
Publisher_xml – name: 한국컴퓨터정보학회
SSID ssib036279256
ssib001107257
ssib044738270
ssib012146333
ssib008451689
ssib053377514
Score 1.7100437
Snippet In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network...
본 논문에서는 산업 애플리케이션을 위한 5G Non-Public Network에서의 보안 이슈를 다룬다. 일반 대중에게 모바일 네트워크 서비스를 제공하는 공공 네트워크와는 달리, 5G Non-Public Network는명확하게 정의된 사용자 조직이나 조직들의 그룹에게 5G 네트워크...
SourceID nrf
kisti
nurimedia
SourceType Open Website
Open Access Repository
Publisher
StartPage 105
SubjectTerms 컴퓨터학
Title Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications
URI https://www.dbpia.co.kr/journal/articleDetail?nodeId=NODE10493425
http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO202034352378697&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002649881
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX 한국컴퓨터정보학회논문지, 2020, 25(11), 200, pp.105-114
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Jb9NAFB6FIgEXxKqWpRoh5hQ52B7PdrQbt6VVF0GQerM8zrikQQ4qiZA48Bf5S7zxOqoqsVwc603sxPM-zfve-C0IvS3BpMp5QL3cVz44KJx60sy1V0Z-LriYGyNsovDJKT_8FB1dsIvR6JcTtbRZ60nx49a8kv_RKshArzZL9h80298UBHAO-oUjaBiOf6Xjj23zufHss-V-Tbnl89XaRgDZKh_d8Adj431Nk822qMbsYHy6qrxmy87m_NrorLoww9hp5RE777ZdDktSRdQ-UZSkjKg9IhOS7pEkIUlE0qmVx9KeyIgkPkk5kZRIZr8c-yQJ6pMpSaQdspfDffZJzIDT1hL4viCpJHFMZL-Fe96FdOfGOzab6qb8aFVdegfOQNsl-tiY7y3w2q2N0HfXYSU9GdVddsFM1TIAFfWUaqpPdot3kzXdgTRwluLAZ45VD5pU1ZsGQ4k6CeJqCXxjYv_CJGRgRSb9xW597ht2s49mPIqPz-y1FKhnSIXkStxBd0MhAhtjevIzHfgpONuh85pZ2jbJQ7n_wHZZpwP_BnIhVDgUO4oiQWU4LLBA1YVo6tf3E9akh9rnenfbU4EPZh2TBVCp6hoY2P1qY9tIwFrk0KrZI_Sw9Ydw3ID7MRotV0_QvS4d4ym66kCMW4xjwDjuMY77YRfjeFFhdoAHjOMO4xgwjgeMYxfjz9BsP53tHXptfxBvCSjwTKEF0zwqy5zzUBe6DH3BC5UbFoWikCUXBmzonBuhS79kOpS5oKXyNVVFrkP6HG1Vq8psI8wKUWilDJMlzCGPFCsMZ4Epg5waHbEdtFvPWlbNv33JbtH3DnoD05kti0Vm67Xbz8tVtrzOwCt9n9VVHSWHu_SznX1tislkp2fTNAA3nYLxfPGnn3mJHlhJswX4Cm2trzfmNZDitd6tgfYbDuyeog
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+Threats+and+Potential+Security+Requirements+in+5G+Non-Public+Networks+for+Industrial+Applications&rft.jtitle=%E9%9F%93%E5%9C%8B%EC%BB%B4%ED%93%A8%ED%84%B0%E6%83%85%E5%A0%B1%E5%AD%B8%E6%9C%83%EF%A5%81%E6%96%87%E8%AA%8C&rft.au=Park%2C+Tae-Keun&rft.au=Park%2C+Jong-Geun&rft.au=Kim%2C+Keewon&rft.date=2020&rft.issn=1598-849X&rft.eissn=2383-9945&rft.volume=25&rft.issue=11&rft.spage=105&rft.epage=114&rft_id=info:doi/10.9708%2Fjksci.2020.25.11.105&rft.externalDBID=n%2Fa&rft.externalDocID=JAKO202034352378697
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1598-849X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1598-849X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1598-849X&client=summon