I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "5G security: Analysis of threats and solutions," 2017 IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, 2017, pp. 193-199
5G security : analysis of threats and solutions
|Author:||Ahmad, Ijaz1; Kumar, Tanesh1; Liyanage, Madhusanka1;|
1Centre for Wireless Communications, University of Oulu, Finland
2Department of Computer and Information Science, Linköping University, SE-581 83 Linköping, Sweden
|Online Access:||PDF Full Text (PDF, 5.8 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe2018073033104
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2018-07-30
5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G. However, there are pressing security challenges in these technologies besides the growing concerns for user privacy. In this paper, we provide an overview of the security challenges in these technologies and the issues of privacy in 5G. Furthermore, we present security solutions to these challenges and future directions for secure 5G systems.
|Pages:||193 - 199|
2017 IEEE conference on standards for communications and networking (CSCN)
IEEE conference on standards for communications and networking
|Type of Publication:||
A4 Article in conference proceedings
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
This work was supported by TEKES Finland and Academy of Finland under projects: The Naked Approach, Towards Digital Paradise and SecureConnect. Andrei Gurtov was supported by the Center for Industrial Information Technology (CENIIT).
© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.