I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "Overview of 5G Security Challenges and Solutions," in IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 36-43, MARCH 2018. doi: 10.1109/MCOMSTD.2018.1700063
Overview of 5G security challenges and solutions
|Author:||Ahmad, Ijaz1; Kumar, Tanesh1; Liyanage, Madhusanka1;|
1Centre for Wireless Communications, University of Oulu
2Linköping University, Sweden
|Online Access:||PDF Full Text (PDF, 1.1 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe201902124647
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2019-02-12
5G networks will use novel technological concepts to meet the requirements of broadband access everywhere, high user and device mobility, and connectivity of massive number of devices (e.g., the Internet of Things) in an ultra-reliable and affordable way. Software defined networking and network functions virtualization leveraging the advances in cloud computing such as mobile edge computing are the most sought out technologies to meet these requirements. However, securely using these technologies and providing user privacy in future wireless networks are the new concerns. Therefore, this article provides an overview of the security challenges in clouds, software defined networking, and network functions virtualization, and the challenges of user privacy. Henceforth, this article presents solutions to these challenges and future directions for secure 5G systems.
IEEE communications standards magazine
|Pages:||36 - 43|
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
113 Computer and information sciences
213 Electronic, automation and communications engineering, electronics
This work was supported by TEKES Finland and the Academy of Finland under projects The Naked Approach, Towards Digital Paradise, and SecureConnect. Andrei Gurtov was supported by the Center for Industrial Information Technology (CENIIT).
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.