2019 IEEE SmartWorld, Ubiquitous Intelligence &Amp; Computing, Advanced &Amp; Trusted Computing, Scalable Computing &Amp; Commu 2019
DOI: 10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00296
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Network Services Abstraction in 5G Enabled Device-to-Device (D2D) Communications

Abstract: Full bibliographic details must be given when referring to, or quoting from full items including the author's name, the title of the work, publication details where relevant (place, publisher, date), pagination, and for theses or dissertations the awarding institution, the degree type awarded, and the date of the award.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

4
3

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 20 publications
(24 reference statements)
0
8
0
Order By: Relevance
“…The use of federation relationships between domains should be used for seamless authentication and authorization to variety of services. 5G should address security with unified multi-level security solutions using abstraction frameworks such as the one mentioned in press [23] as each level of the network and application have different security requirements and can be complimented by FIdM solutions. Through PKI trust with IdP, MNO/SP can choose an IdP, agree on policies, security parameters and mechanisms then direct the UE to IdP via IdPB for federated authentication services and before being authorized to access the services.…”
Section: Discussionmentioning
confidence: 99%
“…The use of federation relationships between domains should be used for seamless authentication and authorization to variety of services. 5G should address security with unified multi-level security solutions using abstraction frameworks such as the one mentioned in press [23] as each level of the network and application have different security requirements and can be complimented by FIdM solutions. Through PKI trust with IdP, MNO/SP can choose an IdP, agree on policies, security parameters and mechanisms then direct the UE to IdP via IdPB for federated authentication services and before being authorized to access the services.…”
Section: Discussionmentioning
confidence: 99%
“…6. Furthermore, D2D can be used in online gaming, multicasting, local advertising, cognitive-communication, cooperative communication, and the Internet of things (IoT) [35], [50]- [52].…”
Section: D2d Communication Applicationsmentioning
confidence: 99%
“…This section presents the proposed security solution and explains how protocols coexist and interact with each other in the context of the framework. This article adopts a network service abstraction concept from [32], the system architecture from [33] and the security architecture from [6]. The UE registers with HN and starts receiving roaming services from a visiting network (VN).…”
Section: Proposed Network Service Security (Nss) Frameworkmentioning
confidence: 99%