2017
DOI: 10.1007/s11432-016-9013-0
|View full text |Cite
|
Sign up to set email alerts
|

Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…They defined 5G availability as a function of radio access network, control plane and support system and that any attack on these systems impacts availability; while Authentication is a means to Non-Repudiation for device-to-device communication on the network. Integrity is applicable to user plane integrity protection and they reported that the radio access of the 5G works closely with cloud services whose security threats centres around Denial of service (DoS), this affects the operation of the network slice, jamming attack that impact the resources of the 5G radio access in [17], 5G security architecture was divided into Application layer security (such as smart grid, smart city, web application), service layer security (such as IoT, IoE), virtual layer security (virtual network, virtual compute), physical layer security (core network security), SDN security (data and control), Slicing security, Management and orchestration. They reported the architecture and challenges of 5G technology.…”
Section: G Security Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…They defined 5G availability as a function of radio access network, control plane and support system and that any attack on these systems impacts availability; while Authentication is a means to Non-Repudiation for device-to-device communication on the network. Integrity is applicable to user plane integrity protection and they reported that the radio access of the 5G works closely with cloud services whose security threats centres around Denial of service (DoS), this affects the operation of the network slice, jamming attack that impact the resources of the 5G radio access in [17], 5G security architecture was divided into Application layer security (such as smart grid, smart city, web application), service layer security (such as IoT, IoE), virtual layer security (virtual network, virtual compute), physical layer security (core network security), SDN security (data and control), Slicing security, Management and orchestration. They reported the architecture and challenges of 5G technology.…”
Section: G Security Architecturementioning
confidence: 99%
“…This makes them inherit the 5G security threats that are associated with these 5G technologies. New threats and security loop holes have been uncovered in networks including 5G, this makes assessment and evaluation of the 5G security to be checked from time to time to ascertain its capability to ward off emerging threats [17]. The work by [17] surveyed possible known and unknown threats that could affect 5G technology and suggested that more resilience is needed for security measures that will be appropriate for implementation in all aspects of the 5G technology.…”
Section: Mitigations To 5g Network Security Issuesmentioning
confidence: 99%
“…At the same time, C-RAN had been presented as a new promising network and received much interest in both industry and academia [3], [4], [47]. However, there are fewer studies of integration between MEC and C-RAN.…”
Section: Related Workmentioning
confidence: 99%
“…SDN/NFV technologies are introduced into new 5G network architectures, thereby decoupling the control and data planes of the equipment [28,29], which creates favorable conditions for building new device trust relationships based on general IT hardware platforms from multiple manufacturers. The concept of being more open, and cloudy/pooling architecture designs also promote many security challenges [15,27,30]. In addition, security boundaries and protection modes in the traditional closed management mode are undergoing profound changes, and the openness of a business, the user's customization, and the ability to visualize the application of resources bring unprecedented challenges to providing security and credibility to cloud platforms [31].…”
Section: Security Requirements Of New Network Architecturementioning
confidence: 99%