Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3286606.3286795acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmartcityappConference Proceedingsconference-collections
research-article

5G: Interconnection of Services and Security Approaches

Published: 10 October 2018 Publication History

Abstract

5G-NextGen Core (5GC) refers to the new 5G core networkarchitecture developed by 3GPP. This 5G architecture offers great flexibility for managing heterogeneous devices and applications. But the advanced features of this architecture present new requirements and newchallenges in security. This article presents a comprehensive study on thesecurity of 5G network systems. The document begins with the overallarchitecture of 5GC. After the potential attacks that can exist in the 5G.then the security requirements in the 5G and some solutions that can fight against these attacks finally discussion about 5G services.

References

[1]
Architectures of Networks and TelecommunicationServices, http://www.efort.com/. Last accessed 02 March 2018.
[2]
Dongfeng Fang, Rose QingyangHu, Yi Qian.: Security for 5G Mobile Wireless Networks. IEEE Journals & Magazine (2017).
[3]
Jonathan Rodriguez, Georgios Mantas, Nikos Komninos, Jonathan Rodriguez, EvaristeL ogota, Higo Marques.: Security for 5G Communications. (2015).
[4]
Fei Pan, Huanhuan Song, Tang Jie, LongyeWang.:5G security architecture and lightweight security authentication.IEEE/CIC International Conference on Communications in China: First International Workshop on Green and Secure CommunicationsTechnology (2015).
[5]
Jonathan Rodriguez, Georgios Mantas, Nikos Komninos, EvaristeLogota, Higo Marques.: Security for 5G Communications.(2015).
[6]
Peter Schneider, Gunther Horn.:Towards 5G Security.IEEE Trust-com/BigDataSE/ISPA (2015).
[7]
Machine To Machine (M2M) definition, http://www.efort.com/r tutoriels/M2M EFORT.pdf. Last accessed 20 April 2018
[8]
Architectures of Networks and Telecommunication Services, http://www.efort.com.Last accessed 2 March 2018.
[9]
Jonathan Rodriguez, Georgios Mantas, NikosKomninos, EvaristeLogota, Higo Marques.: Security for 5G Communications.(2015)
[10]
M. Tao, K. Ota, M. Dong.: Foud: Integrating Fog and Cloud for 5G-Enabled V2G Networks. IEEE Network (2017)
[11]
Changsheng Xu, Ying Li, Josu Bilbao, Abdulmotaleb El Saddik.:Advances inNextGeneration Technologies for Smart Healthcare.IEEE CommunicationsMagazine(2018).

Cited By

View all
  • (2023)Applications of Artificial Intelligence in Public Procurement—Case Study of NigeriaComputational Intelligence for Modern Business Systems10.1007/978-981-99-5354-7_27(513-522)Online publication date: 4-Nov-2023
  • (2021)From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A SurveyApplied Sciences10.3390/app1117811711:17(8117)Online publication date: 31-Aug-2021

Index Terms

  1. 5G: Interconnection of Services and Security Approaches

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SCA '18: Proceedings of the 3rd International Conference on Smart City Applications
      October 2018
      580 pages
      ISBN:9781450365628
      DOI:10.1145/3286606
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 10 October 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. 5G Network
      2. 5G services
      3. Security

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      SCA '18

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)14
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Applications of Artificial Intelligence in Public Procurement—Case Study of NigeriaComputational Intelligence for Modern Business Systems10.1007/978-981-99-5354-7_27(513-522)Online publication date: 4-Nov-2023
      • (2021)From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A SurveyApplied Sciences10.3390/app1117811711:17(8117)Online publication date: 31-Aug-2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media