2019
DOI: 10.1109/comst.2019.2916180
|View full text |Cite
|
Sign up to set email alerts
|

Security for 5G and Beyond

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
199
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 291 publications
(200 citation statements)
references
References 305 publications
0
199
0
1
Order By: Relevance
“…Software-based transformation (i.e., softwarization) [72] cannot be implemented within the defined 5G implementation time frame. Other areas of beyond 5G include security [73,74], spectral and energy efficiency, resiliency (i.e., tolerance to interference and maintaining QoS), and MEC [58]. MEC and softwarization are among the promising candidates to provide a cost-effective, secure, manageable, and flexible architecture for 5G and beyond.…”
Section: G and Beyondmentioning
confidence: 99%
“…Software-based transformation (i.e., softwarization) [72] cannot be implemented within the defined 5G implementation time frame. Other areas of beyond 5G include security [73,74], spectral and energy efficiency, resiliency (i.e., tolerance to interference and maintaining QoS), and MEC [58]. MEC and softwarization are among the promising candidates to provide a cost-effective, secure, manageable, and flexible architecture for 5G and beyond.…”
Section: G and Beyondmentioning
confidence: 99%
“…Moreover, SDN and NFVs are vulnerable to various types of attacks including the following: (i) DoS, hijacking, and saturation attack on SDN controller, switches, and hypervisor, (ii) network slice theft from hypervisor and shared cloud resources and SDN (virtual) switches, (iii) routers configuration attacks, (iv) SDN configuration attacks, (v) penetration attack on SDN virtual resources, (vi) TCP-level attack on SDN controllerswitch communication, and (vii) man-in-the-middle attack on the SDN controller-communication [56,58,61,69].…”
Section: Security Challengesmentioning
confidence: 99%
“…b) Artificial Intelligence, Deep Learning and Machine Learning for 5G Security Threat Intelligence: Since the UK is one of the leaders in artificial intelligence research, 5G security can leverage this strength. Various use case scenarios of AI-based security for 5G and beyond applications can be found at [69]. Blockchain and AI methods can together form a strong platform to support secure and intelligent resource management, flexible networking, and reliable orchestration in 5G and beyond scenarios such as spectrum sharing, D2D caching, V2V energy optimization, and computation off-loading [81].…”
Section: Security Challengesmentioning
confidence: 99%
“…An attacker can exploit this phenomenon maliciously. An attacker can maliciously drive the NAS layer's traffic by requesting re-authentication by constantly modifying device information, or by continuously generating unnecessary authentication signals [16]. NAS signal traffic is affected by the number of devices connected to the network, which means that as the network expands, the entire network may become vulnerable.…”
Section: Threat Modeling On Authenticationmentioning
confidence: 99%
“…Many industries and academia have extensively researched 5G for more advanced wireless technologies such as innovative speed, high bandwidth, and high availability [16]. 5G must meet many requirements, and to achieve this, integration of various technologies, rather than improved existing cellular communications, must be achieved.…”
mentioning
confidence: 99%