Redirecting to original paper in 30 seconds...

Click below to go immediately or wait for automatic redirect

arxiv_crypto 90% Match Research Paper Network architects,Telecom engineers,Security professionals,Standardization bodies,Researchers in network management 1 month ago

Managing Differentiated Secure Connectivity using Intents

ai-safety › robustness
📄 Abstract

Abstract: Mobile networks in the 5G and 6G era require to rethink how to manage security due to the introduction of new services, use cases, each with its own security requirements, while simultaneously expanding the threat landscape. Although automation has emerged as a key enabler to address complexity in networks, existing approaches lack the expressiveness to define and enforce complex, goal-driven, and measurable security requirements. In this paper, we propose the concept of differentiated security levels and leveraging intents as a management framework. We discuss the requirements and enablers to extend the currently defined intent-based management frameworks to pave the path for intent-based security management in mobile networks. Our approach formalizes both functional and non-functional security requirements and demonstrates how these can be expressed and modeled using an extended TM Forum (TMF) intent security ontology. We further discuss the required standardization steps to achieve intent-based security management. Our work aims at advance security automation, improve adaptability, and strengthen the resilience and security posture of the next-generation mobile networks.

Key Contributions

This paper proposes using intents as a management framework for differentiated security levels in mobile networks (5G/6G). It formalizes functional and non-functional security requirements and demonstrates how they can be expressed using an extended TM Forum security ontology, paving the way for intent-based security management.

Business Value

Allows telecom operators to offer tailored security services for different applications and users, improving network resilience and enabling new business models based on differentiated security guarantees.