Navigating the Security and Energy Efficiency Trade-Off in O-RAN: Challenges and Solutions
Security in O-RAN: A Zero-Trust Architecture Approach
O-RAN Alliance has placed a high priority on security, with WG11 leading the charge to develop security-focused specifications for a secure-by-design O-RAN architecture [1]. This involves identifying security threats, risks, requirements, and protocols specific to O-RAN components, and outlining corresponding test specifications. Notably, the O-RAN Security Threat Modeling and Risk Assessment report [2] defines critical assets, threat models, security principles, and risk assessments. Technical reports [3] and [4] delve into specific security requirements, control specifications, and relevant security protocols. By embracing a zero-trust architecture (ZTA), O-RAN enables continuous monitoring and assessment of security risks, ensuring trust across the system. The architecture’s control loops and RICs allow comprehensive monitoring of all components through data streams, enabling dynamic security operations. Additionally, O-RAN can support context-aware security management using adaptive protocols for a high Quality of Security (QoSec) [5]. Knowing security requirements, the question is: How can the Security and Energy Efficiency Trade-Off in O-RAN be made?
In this blog post, we discuss the interplay between the level of cybersecurity provided by O-RAN applications (xApps and rApps) and the energy cost of such security. Is it possible to minimize energy consumption, while not compromising the security level in O-RAN?
(Note: You can find more about security in O-RAN in our dedicated whitepaper: „The O-RAN Whitepaper 2023 – Security in O-RAN”)
Energy Efficiency in O-RAN
Energy efficiency has also been a key focus in O-RAN’s pursuit of sustainable network operations. Through cloudification, disaggregation, and the integration of AI, O-RAN aims to surpass traditional RANs in energy efficiency. The four key pillars for improving energy efficiency in O-RAN, as outlined in [6], cover the selection of power-efficient hardware, KPI reporting on energy efficiency across hardware and software layers, the adoption of O-RAN features that enhance energy efficiency at the functional level, and the use of intelligence and orchestration to automate energy efficiency features. Notably, radio features such as symbol shutdown, cell switch-off, and RF transceiver switch-off, along with power management options at both hardware and software platform levels, offer granular optimization of energy efficiency [7]. The integration of intelligence and orchestration with RICs and SMO further enhances energy efficiency through automatic control loops. Moreover, leveraging external information in these pursuits is highly beneficial.
(Note: You can find more about energy saving in O-RAN in our dedicated whitepaper: „The O-RAN Whitepaper 2023 – Energy Efficiency in O-RAN”)
O-RAN Security and Energy Efficiency Trade-Off
While refining security configurations such as authentication methods and encryption techniques can enhance security, it also impacts energy consumption. Stronger encryption algorithms and real-time intrusion detection, while valuable, require additional computational resources and processing time, leading to increased energy consumption. This trade-off is particularly evident in O-RAN deployments in energy-constrained environments, such as IoT networks in remote areas. Operators must carefully balance robust security with limited energy resources in such scenarios. In urban environments and smart city applications, adopting adaptable security protocols based on energy availability and threat levels can be a strategic approach. Ultimately, achieving an optimal balance between security and energy efficiency in O-RAN requires careful consideration and tailored approaches based on specific operational contexts.
Stakeholders in Managing Security-Energy efficiency Trade-Off
In various scenarios, O-RAN deployments must balance robust security with limited energy resources. For instance, in energy-constrained environments like rural IoT networks, efficient security measures might be preferred to conserve energy while still providing adequate protection. Conversely, in environments with ample power supply, the focus might shift to prioritizing security even if it means consuming more energy. Balancing security and energy efficiency also depends on the perspectives of different stakeholders, including chipset and hardware component manufacturers prioritizing energy efficiency and end-users prioritizing security. Network operators aim to balance security with energy efficiency to manage operational costs effectively while minimizing security risks. Collaborative efforts from stakeholders are crucial for ensuring high security and energy performance. Regulatory bodies and standards organizations also play a critical role in ensuring industry-wide compliance and promoting best practices.
Jointly Optimizing Security and QoS
Ensuring sustainability and security is essential in the design of any system. Security measures must be robust and energy efficient. Achieving this requires developing security operations and configurations to consider factors such as resource allocation, Quality of Service (QoS) parameters, and overall performance. In O-RAN, balancing security with QoS optimization is a complex task, requiring fine-tuning security mechanisms to enhance performance while maintaining strong protection. Service level agreements (SLAs) can help establish this equilibrium [8]. As discussed in [8], existing SLAs could be updated to include energy-related metrics, such as carbon footprint measurements. Leveraging AI/ML workflows within O-RAN makes it possible to dynamically optimize security without breaking these SLAs. In addition, integrating a Network Digital Twin (NDT) with O-RAN allows for testing and optimizing changes before implementation in the live network (find out more about Digital Twin and Network Digital Twin in our blog: Digital Twin – What Is It and How Can It Affect Future Networks). Inherent intelligence in O-RAN enables the prediction of energy usage and security threats. Furthermore, optimization and game-theoretic approaches are useful for joint optimization of security and QoS, and some economic principles are also beneficial [9]. For example, consider a scenario described in [8] involving an energy-sensitive SLA related to intrusion detection. We can implement an energy-aware security policy that includes N sub-policies, each with predefined performance and energy consumption thresholds. These sub-policies are associated with several intrusion-detection system models that were trained using NDT. This could be expanded into a holistic security-energy efficiency management framework that covers the entire O-RAN security operation.

Conclusions
Balancing security and energy efficiency in O-RAN is a complex but essential challenge. As the leading architecture for future RAN, O-RAN must evolve to cater to the increasing demands of security and strict energy efficiency standards. This evolution requires a unified approach that addresses both aspects simultaneously. O-RAN can achieve this balance between security and energy efficiency by integrating advanced security methods and protocols with energy-saving technologies and hardware, supported by strong collaboration among stakeholders. O-RAN can dynamically adjust its security measures in real-time while optimizing energy consumption by leveraging AI/ML through RICs, xApps, and rApps, along with NDT. This adaptive strategy will ensure that O-RAN remains resilient against cyber threats without compromising energy goals. Moving forward, continuous innovation is crucial to ensure O-RAN adapts to the ever-evolving technological landscape. By prioritizing both security and energy efficiency, O-RAN can lead the way for a sustainable and secure future in the mobile communication industry.
References
[1] O-RAN ALLIANCE website [Online]. Available: https://www.o-ran.org/
[2] O-RAN ALLIANCE WG11, “O-RAN Security Threat Modeling and Risk Assessment,” 2024.
[3] O-RAN ALLIANCE WG11, “Security Requirements and Controls Specifications,” 2024.
[4] O-RAN ALLIANCE WG11, “Security Protocols Specifications,” 2024.
[5] A. Chorti et al., “Context-aware security for 6G wireless: The role of physical layer security,” IEEE Communications Standards Magazine, vol. 6, no. 1, pp. 102–108, 2022.
[6] D. Telekom, Orange, Telefonica, TIM, and Vodafone, “Open RAN Technical Priorities, Focus on Energy Efficiency,” Jun. 2021.
[7] O-RAN ALLIANCE WG1, “Network Energy Saving Use Cases Technical Report,” 2023.
[8] D. Attanayaka, Y. Rumesh, J. Pinola, and P. Porambage, “Security Framework in Digital Twin for O-RAN,” in 2024 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2024, pp. 889–894.
[9] Z. M. Fadlullah, B. Mao, and N. Kato, “Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning,” IEEE Communications Surveys & Tutorials, vol. 24, no. 4, pp. 2419–2448, 2022.
Acknowledgment
Many thanks to Hanna Bogucka for her guidance during my internship at Rimedo Labs and tips for this blog post.
Author Bio
Dinaj Attanayaka is a research scientist at VTT Technical Research Centre of Finland, specializing in network security. His research interests include the joint optimization of security and Quality of Service (QoS) in O-RAN and network digital twins. Over the past years, Dinaj has worked as a system engineer and entity specification engineer. He is gaining scientific experience through involvement in both national and international research projects. Dinaj received a Bachelor of Science in Electronics and Telecommunications Engineering from the University of Moratuwa in 2018 and a Master of Science in Electronics and Communications Engineering from the University of Oulu in 2022. He is currently pursuing a doctoral degree at the University of Oulu. Dinay conducted internship at Rimedo Labs working on security and energy efficiency topics.