ZSM security : threat surface and best practices
|Author:||Benzaïd, Chafika1; Taleb, Tarik1|
1Aalto University, Finland
|Online Access:||PDF Full Text (PDF, 2.7 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe2020110288964
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2020-11-02
The ETSI’s Zero touch network and Service Management (ZSM) framework is a prominent initiative to tame the envisioned complexity in operating and managing 5G and beyond networks. To this end, the ZSM framework promotes the shift toward full Automation of Network and Service Management and Operation (ANSMO) by leveraging the flexibility of SDN/NFV technologies along with Artificial Intelligence, combined with the portability and reusability of model-driven, open interfaces. Besides its benefits, each leveraged enabler will bring its own security threats, which should be carefully tackled to make the ANSMO vision a reality. This paper introduces the ZSM’s potential attack surface and recommends possible mitigation measures along with some research directions to safeguard ZSM system security.
|Pages:||124 - 133|
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
This work was supported in part by the Academy of Finland Project 6Genesis Flagship (Grant No. 318927), CSN (Grant No. 311654) and the European Unions Horizon 2020 research and innovation programme under the INSPIRE-5Gplus project (Grant No. 871808).
|Academy of Finland Grant Number:||
318927 (Academy of Finland Funding decision)
© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.