University of Oulu

I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "Overview of 5G Security Challenges and Solutions," in IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 36-43, MARCH 2018. doi: 10.1109/MCOMSTD.2018.1700063

Overview of 5G security challenges and solutions

Saved in:
Author: Ahmad, Ijaz1; Kumar, Tanesh1; Liyanage, Madhusanka1;
Organizations: 1Centre for Wireless Communications, University of Oulu
2Linköping University, Sweden
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 1.1 MB)
Persistent link: http://urn.fi/urn:nbn:fi-fe201902124647
Language: English
Published: Institute of Electrical and Electronics Engineers, 2018
Publish Date: 2019-02-12
Description:

Abstract

5G networks will use novel technological concepts to meet the requirements of broadband access everywhere, high user and device mobility, and connectivity of massive number of devices (e.g., the Internet of Things) in an ultra-reliable and affordable way. Software defined networking and network functions virtualization leveraging the advances in cloud computing such as mobile edge computing are the most sought out technologies to meet these requirements. However, securely using these technologies and providing user privacy in future wireless networks are the new concerns. Therefore, this article provides an overview of the security challenges in clouds, software defined networking, and network functions virtualization, and the challenges of user privacy. Henceforth, this article presents solutions to these challenges and future directions for secure 5G systems.

see all

Series: IEEE communications standards magazine
ISSN: 2471-2825
ISSN-E: 2471-2833
ISSN-L: 2471-2825
Volume: 2
Issue: 1
Pages: 36 - 43
DOI: 10.1109/MCOMSTD.2018.1700063
OADOI: https://oadoi.org/10.1109/MCOMSTD.2018.1700063
Type of Publication: A1 Journal article – refereed
Field of Science: 113 Computer and information sciences
213 Electronic, automation and communications engineering, electronics
Subjects:
Funding: This work was supported by TEKES Finland and the Academy of Finland under projects The Naked Approach, Towards Digital Paradise, and SecureConnect. Andrei Gurtov was supported by the Center for Industrial Information Technology (CENIIT).
Copyright information: © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.