Wiley 5G Ref 2019
DOI: 10.1002/9781119471509.w5gref151
|View full text |Cite
|
Sign up to set email alerts
|

5G‐Core Network Security

Abstract: The emergence of new services in 5G has necessitated a paradigm shift in the core network, as compared to 4G. New disruptive technological concepts such as softwarized and virtualized network functions, and multi‐access edge computing have been used in the core network. Thus, network function virtualization (NFV), software‐defined networking (SDN) and mobile edge computing have brought dynamicity and elasticity into the core network. Albeit the benefits, these technologies also bring their own limitations into… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…Ref. [31] presents the network architecture and the security issues within the core layer of the 5G network. Figure 1 gives the layered architecture of the 5G network, which includes a device layer, radio layer, edge layer, core layer and service layer.…”
Section: Layered 5g Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Ref. [31] presents the network architecture and the security issues within the core layer of the 5G network. Figure 1 gives the layered architecture of the 5G network, which includes a device layer, radio layer, edge layer, core layer and service layer.…”
Section: Layered 5g Architecturementioning
confidence: 99%
“…The consequence of a successful breach in this case can range from compromise of user privacy to a potential full-scale attack on the network infrastructure and services. [31,33], which need to be assessed while designing any 5G core network. Both control and user planes may be affected by these attacks, which include DoS and spoofing attacks on AMF, routing attacks on AUSF and UPF and SIP relay attacks on IMS AF.…”
mentioning
confidence: 99%
“…Such centralization would invite DoS and other resource exhaustion attacks. On the core network side, most of the security challenges are related to signaling storms, DoS attacks, and the security dependability on SDN and NFV [49]. In the following, we discuss the security challenges in cloud platforms from the core network to the edge of the network.…”
Section: B Security Of Cloud Platformsmentioning
confidence: 99%
“…Such centralization would invite DoS and other resource exhaustion attacks. On the core network side, most of the security challenges are related to signaling storms, DoS attacks, and the security dependability on SDN and NFV [23].…”
Section: Security Of Cloud Platformsmentioning
confidence: 99%