2016
DOI: 10.1117/12.2229608
|View full text |Cite
|
Sign up to set email alerts
|

Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Overall, 5G requires the use of many new types of security, due to the new business applications, new architectures, new technologies, and new scenarios involved. In this respect, new business applications, which are represented by the Internet of things, pose unprecedented challenges to security [14], and open and shared network architectures, with cloud, virtualization, and pooling technology traits are expected to substitute closed-type network architectures entirely in traditional mobile networks, thereby bringing new security challenges that currently have limited security means to combat them [15]. The development and evolution of air interface technologies not only involve higher requirements of wireless secure transmission, but also create better conditions to fundamentally resolve information leakage problems due to the openness of wireless broadcasts [16].…”
Section: G Security Requirementsmentioning
confidence: 99%
“…Overall, 5G requires the use of many new types of security, due to the new business applications, new architectures, new technologies, and new scenarios involved. In this respect, new business applications, which are represented by the Internet of things, pose unprecedented challenges to security [14], and open and shared network architectures, with cloud, virtualization, and pooling technology traits are expected to substitute closed-type network architectures entirely in traditional mobile networks, thereby bringing new security challenges that currently have limited security means to combat them [15]. The development and evolution of air interface technologies not only involve higher requirements of wireless secure transmission, but also create better conditions to fundamentally resolve information leakage problems due to the openness of wireless broadcasts [16].…”
Section: G Security Requirementsmentioning
confidence: 99%
“…Its integration with the IoT paradigm is mainly motivated by lower latency and network throughput reduction. FC has a very large number of nodes that can provide localized storage, data filtering, and analysis, support device mobility, and facilitate the Cloud interplay with low-end IoT devices (BOTTA et al, 2016;UHER et al, 2016).…”
Section: Computationmentioning
confidence: 99%
“…Fog Computing also helps on the system scalability and distributionas the number of devices increase, it is possible to create more Fog nodes at a lower cost when comparing to a new Cloud data-center. At the same time, a single Fog node can interact with more than one Cloud provider, making it easier to provide one service in multiple platforms (BOTTA et al, 2016;CAVALCANTE et al, 2016;UHER et al, 2016).…”
Section: Fog Computingmentioning
confidence: 99%
See 2 more Smart Citations