2021 World Automation Congress (WAC) 2021
DOI: 10.23919/wac50355.2021.9559450
|View full text |Cite
|
Sign up to set email alerts
|

5G and beyond telco cloud: architecture and cybersecurity challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 32 publications
0
1
0
Order By: Relevance
“…Solutions in using 5G and other networks (e.g., Wi-Fi). Bhuyan et al, 2021;Ksentini and Frangoudis, 2020;Gonzalez et al, 2020;Liyanage et al, 2018;Wang and Yan, 2015;Tahir et al, 2020;Azzaoui et al, 2020;Nieto et al, 2017Nieto et al, , 2018Zhang and Lin, 2017;Compagno et al, 2017;Dik and Berger, 2021;Benzaid and Taleb, 2020;Zhao et al, 2021a;Bitsikas and Pöpper, 2021;Chaudhary et al, 2020;Gao et al, 2021;Sood et al, 2021;Cao et al, 2020;Ding et al, 2022b;Wu et al, 2018;Shi and Sagduyu, 2021;Sullivan et al, 2021;Mei et al, 2018;Gebremariam et al, 2021;Ginzboorg and Niemi, 2016;Rotinsulu and Fitri Sari, 2018;Vassilakis et al, 2017;Ar-joune and Faruque, 2020]. An adversary can maliciously (1) use legitimate orchestrator access to manipulate the configuration and run a compromised network function, (2) take advantage of malicious insiders attacks, (3) perform unauthorized access (e.g., to confidential data [Isaksson and Norrman, 2020] and to RFID tags [Rahimi et al, 2018]), (4) tampering, (5) perform resource exhaustion, (6) turn services unavailable, ( 7) analyze or modify traffic, (8) perform data leakage (e.g., capturing valuable personal information [Bordel et al, 2021;Annessi et al, 2018;Vreman and Maggio, 2019]), (…”
Section: Item Description Item Descriptionmentioning
confidence: 99%
“…Solutions in using 5G and other networks (e.g., Wi-Fi). Bhuyan et al, 2021;Ksentini and Frangoudis, 2020;Gonzalez et al, 2020;Liyanage et al, 2018;Wang and Yan, 2015;Tahir et al, 2020;Azzaoui et al, 2020;Nieto et al, 2017Nieto et al, , 2018Zhang and Lin, 2017;Compagno et al, 2017;Dik and Berger, 2021;Benzaid and Taleb, 2020;Zhao et al, 2021a;Bitsikas and Pöpper, 2021;Chaudhary et al, 2020;Gao et al, 2021;Sood et al, 2021;Cao et al, 2020;Ding et al, 2022b;Wu et al, 2018;Shi and Sagduyu, 2021;Sullivan et al, 2021;Mei et al, 2018;Gebremariam et al, 2021;Ginzboorg and Niemi, 2016;Rotinsulu and Fitri Sari, 2018;Vassilakis et al, 2017;Ar-joune and Faruque, 2020]. An adversary can maliciously (1) use legitimate orchestrator access to manipulate the configuration and run a compromised network function, (2) take advantage of malicious insiders attacks, (3) perform unauthorized access (e.g., to confidential data [Isaksson and Norrman, 2020] and to RFID tags [Rahimi et al, 2018]), (4) tampering, (5) perform resource exhaustion, (6) turn services unavailable, ( 7) analyze or modify traffic, (8) perform data leakage (e.g., capturing valuable personal information [Bordel et al, 2021;Annessi et al, 2018;Vreman and Maggio, 2019]), (…”
Section: Item Description Item Descriptionmentioning
confidence: 99%