Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications
In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizatio...
Saved in:
Published in | 韓國컴퓨터情報學會論文誌 Vol. 25; no. 11; pp. 105 - 114 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | Korean |
Published |
한국컴퓨터정보학회
2020
|
Subjects | |
Online Access | Get full text |
ISSN | 1598-849X 2383-9945 |
DOI | 10.9708/jksci.2020.25.11.105 |
Cover
Abstract | In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements. 본 논문에서는 산업 애플리케이션을 위한 5G Non-Public Network에서의 보안 이슈를 다룬다. 일반 대중에게 모바일 네트워크 서비스를 제공하는 공공 네트워크와는 달리, 5G Non-Public Network는 명확하게 정의된 사용자 조직이나 조직들의 그룹에게 5G 네트워크 서비스를 제공하며, 캠퍼스나 공장과 같이 사용자 조직이 지정한 영역 내에 구축된다. 본 논문의 주목적은 5G-ACIA (5G Alliance for Connected Industries and Automation)에서 제안한 네 가지 구축 모델에 따라 5G Non-Public Network가 이산 산업 및 공정 산업을 위하여 구축될 경우 고려되어야 할 보안 위협 및 잠재적 보안 요구사항을 도출하는 것이다. 본 논문의 범위를 명확하게 하기 위해 먼저 5G Non-Public Network에 적용할 보안 툴박스를 심층 방어 개념으로 표현한다. 일반적인 5G 이동통신 서비스와 관련된 보안 이슈는 본 논문의 범위에 포함되지 않는다. 그 다음, 산업 도메인에 5G-ACIA의 구축 모델을 적용할 때 고려해야 할 보안 이슈를 도출한다. 도출된 보안 이슈들은 세 가지 범주로 나뉘며 각각의 보안 이슈들은 개요, 보안 위협 및 잠재적 보안 요구사항의 순서로 서술된다. |
---|---|
AbstractList | 본 논문에서는 산업 애플리케이션을 위한 5G Non-Public Network에서의 보안 이슈를 다룬다. 일반 대중에게 모바일 네트워크 서비스를 제공하는 공공 네트워크와는 달리, 5G Non-Public Network는명확하게 정의된 사용자 조직이나 조직들의 그룹에게 5G 네트워크 서비스를 제공하며, 캠퍼스나 공장과 같이 사용자 조직이 지정한 영역 내에 구축된다. 본 논문의 주목적은 5G-ACIA (5G Alliance for Connected Industries and Automation)에서 제안한 네 가지 구축 모델에 따라 5G Non-Public Network가 이산 산업 및 공정 산업을 위하여 구축될 경우 고려되어야 할 보안 위협 및 잠재적 보안요구사항을 도출하는 것이다. 본 논문의 범위를 명확하게 하기 위해 먼저 5G Non-Public Network에적용할 보안 툴박스를 심층 방어 개념으로 표현한다. 일반적인 5G 이동통신 서비스와 관련된 보안이슈는 본 논문의 범위에 포함되지 않는다. 그 다음, 산업 도메인에 5G-ACIA의 구축 모델을 적용할때 고려해야 할 보안 이슈를 도출한다. 도출된 보안 이슈들은 세 가지 범주로 나뉘며 각각의 보안이슈들은 개요, 보안 위협 및 잠재적 보안 요구사항의 순서로 서술된다. In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization’s defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements. KCI Citation Count: 0 In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements. 본 논문에서는 산업 애플리케이션을 위한 5G Non-Public Network에서의 보안 이슈를 다룬다. 일반 대중에게 모바일 네트워크 서비스를 제공하는 공공 네트워크와는 달리, 5G Non-Public Network는 명확하게 정의된 사용자 조직이나 조직들의 그룹에게 5G 네트워크 서비스를 제공하며, 캠퍼스나 공장과 같이 사용자 조직이 지정한 영역 내에 구축된다. 본 논문의 주목적은 5G-ACIA (5G Alliance for Connected Industries and Automation)에서 제안한 네 가지 구축 모델에 따라 5G Non-Public Network가 이산 산업 및 공정 산업을 위하여 구축될 경우 고려되어야 할 보안 위협 및 잠재적 보안 요구사항을 도출하는 것이다. 본 논문의 범위를 명확하게 하기 위해 먼저 5G Non-Public Network에 적용할 보안 툴박스를 심층 방어 개념으로 표현한다. 일반적인 5G 이동통신 서비스와 관련된 보안 이슈는 본 논문의 범위에 포함되지 않는다. 그 다음, 산업 도메인에 5G-ACIA의 구축 모델을 적용할 때 고려해야 할 보안 이슈를 도출한다. 도출된 보안 이슈들은 세 가지 범주로 나뉘며 각각의 보안 이슈들은 개요, 보안 위협 및 잠재적 보안 요구사항의 순서로 서술된다. |
Author | Tae-Keun Park(박태근) Keewon Kim(김기원) Jong-Geun Park(박종근) |
Author_xml | – sequence: 1 fullname: Park, Tae-Keun – sequence: 2 fullname: Park, Jong-Geun – sequence: 3 fullname: Kim, Keewon |
BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002649881$$DAccess content in National Research Foundation of Korea (NRF) |
BookMark | eNpFkElPwzAQhS0EEmX5Bxx84cAhwbHj7VixlAJqq9IDN8t2bDApTrFTIf49YRGc3mjeN6OndwB2YxcdACcVKiVH4vylzTaUGGFUYlpWVVkhugNGmAhSSFnTXTCqqBSFqOXjPjjOORhEGOYSUzYCLw_OblPoP-DqOTndZ6hjAxdd72If9Br-2Uv3tg3JvQ77DEOEdAJnXSwWW7MOFs5c_96lNkPfJTiNzTb36et8vNkMtu5DF_MR2PN6nd3xrx6C1fXV6uKmuJ9Pphfj-6Id0hbOGk4Nq73XjGFjjceIMyu1ozXmVnjGHRKiYY4bjzw1WGhOvESGSKsNJofg7OdtTF61NqhOh2996lSb1Hi5mirJkKSCDezpD9uG3AcVm7xWt-O7-VebpCYUEy6Y5P9cHMp4dU3QajMMOn2o2fzyqkK1JDWm5BPRa3ku |
ContentType | Journal Article |
DBID | DBRKI TDB JDI ACYCR |
DEWEY | 651.8 |
DOI | 10.9708/jksci.2020.25.11.105 |
DatabaseName | DBPIA - 디비피아 Nurimedia DBPIA Journals KoreaScience Korean Citation Index |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Business |
EISSN | 2383-9945 |
EndPage | 114 |
ExternalDocumentID | oai_kci_go_kr_ARTI_9609586 JAKO202034352378697 NODE10493425 |
GroupedDBID | .UV ALMA_UNASSIGNED_HOLDINGS DBRKI TDB JDI ACYCR |
ID | FETCH-LOGICAL-k945-ecb75b64ffa662bcbf2076c9ae5427c8f67e088d6e7bf0f5b28a73f90b39cab23 |
ISSN | 1598-849X |
IngestDate | Sun Mar 09 07:51:04 EDT 2025 Fri Dec 22 12:03:31 EST 2023 Thu Feb 06 13:35:19 EST 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 11 |
Keywords | 5G Industrial Domain Security Requirement Deployment Non-Public Network 보안 요구사항 구축 산업 도메인 |
Language | Korean |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-k945-ecb75b64ffa662bcbf2076c9ae5427c8f67e088d6e7bf0f5b28a73f90b39cab23 |
Notes | KISTI1.1003/JNL.JAKO202034352378697 |
OpenAccessLink | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO202034352378697&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 |
PageCount | 10 |
ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_9609586 kisti_ndsl_JAKO202034352378697 nurimedia_primary_NODE10493425 |
PublicationCentury | 2000 |
PublicationDate | 2020 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – year: 2020 text: 2020 |
PublicationDecade | 2020 |
PublicationTitle | 韓國컴퓨터情報學會論文誌 |
PublicationTitleAlternate | Journal of the Korea Society of Computer and Information |
PublicationYear | 2020 |
Publisher | 한국컴퓨터정보학회 |
Publisher_xml | – name: 한국컴퓨터정보학회 |
SSID | ssib036279256 ssib001107257 ssib044738270 ssib012146333 ssib008451689 ssib053377514 |
Score | 1.7100437 |
Snippet | In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network... 본 논문에서는 산업 애플리케이션을 위한 5G Non-Public Network에서의 보안 이슈를 다룬다. 일반 대중에게 모바일 네트워크 서비스를 제공하는 공공 네트워크와는 달리, 5G Non-Public Network는명확하게 정의된 사용자 조직이나 조직들의 그룹에게 5G 네트워크... |
SourceID | nrf kisti nurimedia |
SourceType | Open Website Open Access Repository Publisher |
StartPage | 105 |
SubjectTerms | 컴퓨터학 |
Title | Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications |
URI | https://www.dbpia.co.kr/journal/articleDetail?nodeId=NODE10493425 http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO202034352378697&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002649881 |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
ispartofPNX | 한국컴퓨터정보학회논문지, 2020, 25(11), 200, pp.105-114 |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Jb9NAFB6FIgEXxKqWpRoh5hQ52B7PdrQbt6VVF0GQerM8zrikQQ4qiZA48Bf5S7zxOqoqsVwc603sxPM-zfve-C0IvS3BpMp5QL3cVz44KJx60sy1V0Z-LriYGyNsovDJKT_8FB1dsIvR6JcTtbRZ60nx49a8kv_RKshArzZL9h80298UBHAO-oUjaBiOf6Xjj23zufHss-V-Tbnl89XaRgDZKh_d8Adj431Nk822qMbsYHy6qrxmy87m_NrorLoww9hp5RE777ZdDktSRdQ-UZSkjKg9IhOS7pEkIUlE0qmVx9KeyIgkPkk5kZRIZr8c-yQJ6pMpSaQdspfDffZJzIDT1hL4viCpJHFMZL-Fe96FdOfGOzab6qb8aFVdegfOQNsl-tiY7y3w2q2N0HfXYSU9GdVddsFM1TIAFfWUaqpPdot3kzXdgTRwluLAZ45VD5pU1ZsGQ4k6CeJqCXxjYv_CJGRgRSb9xW597ht2s49mPIqPz-y1FKhnSIXkStxBd0MhAhtjevIzHfgpONuh85pZ2jbJQ7n_wHZZpwP_BnIhVDgUO4oiQWU4LLBA1YVo6tf3E9akh9rnenfbU4EPZh2TBVCp6hoY2P1qY9tIwFrk0KrZI_Sw9Ydw3ID7MRotV0_QvS4d4ym66kCMW4xjwDjuMY77YRfjeFFhdoAHjOMO4xgwjgeMYxfjz9BsP53tHXptfxBvCSjwTKEF0zwqy5zzUBe6DH3BC5UbFoWikCUXBmzonBuhS79kOpS5oKXyNVVFrkP6HG1Vq8psI8wKUWilDJMlzCGPFCsMZ4Epg5waHbEdtFvPWlbNv33JbtH3DnoD05kti0Vm67Xbz8tVtrzOwCt9n9VVHSWHu_SznX1tislkp2fTNAA3nYLxfPGnn3mJHlhJswX4Cm2trzfmNZDitd6tgfYbDuyeog |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+Threats+and+Potential+Security+Requirements+in+5G+Non-Public+Networks+for+Industrial+Applications&rft.jtitle=%E9%9F%93%E5%9C%8B%EC%BB%B4%ED%93%A8%ED%84%B0%E6%83%85%E5%A0%B1%E5%AD%B8%E6%9C%83%EF%A5%81%E6%96%87%E8%AA%8C&rft.au=Park%2C+Tae-Keun&rft.au=Park%2C+Jong-Geun&rft.au=Kim%2C+Keewon&rft.date=2020&rft.issn=1598-849X&rft.eissn=2383-9945&rft.volume=25&rft.issue=11&rft.spage=105&rft.epage=114&rft_id=info:doi/10.9708%2Fjksci.2020.25.11.105&rft.externalDBID=n%2Fa&rft.externalDocID=JAKO202034352378697 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1598-849X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1598-849X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1598-849X&client=summon |