2019 TEQIP III Sponsored International Conference on Microwave Integrated Circuits, Photonics and Wireless Networks (IMICPW) 2019
DOI: 10.1109/imicpw.2019.8933271
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Network Functions Virtualization for Telecom Paradigm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 7 publications
0
5
0
2
Order By: Relevance
“…Of course, this type of business model is very popular because it is open for many companies that do not have their own network [125]. On the other hand, it gives an opportunity for better utilization of hardware resources [128]. Moreover, the physical infrastructure provider is obligated by governments and the regulatory agencies to ensure proper isolation and protection following security regulations [129].…”
Section: ) Characteristicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Of course, this type of business model is very popular because it is open for many companies that do not have their own network [125]. On the other hand, it gives an opportunity for better utilization of hardware resources [128]. Moreover, the physical infrastructure provider is obligated by governments and the regulatory agencies to ensure proper isolation and protection following security regulations [129].…”
Section: ) Characteristicsmentioning
confidence: 99%
“…The principal vulnerabilities for Telecommunications verticals are caused by network virtualization, shared resources, and edge paradigm ecosystem. This trend is noticeable, especially in the case when more and more typical network functions (NF) are virtualized (VNF) and launched in different places in the network [135]. Their location often depends on the requirements of latency or bandwidth limits, so they are hosted where necessary (see [136]) or for economic purposes where the resources are available.…”
Section: ) Threats and Vulnerabilitiesmentioning
confidence: 99%
“…Extensive literature has been carried out on the various aspects of NFV such as architectural designs [191], [192], resource allocation [193], [194], energy efficiency [195], performance improvement [196] and security [197], [198]. More details can be found in [191], [199], [200].…”
Section: A Network Function Virtualization (Nfv)mentioning
confidence: 99%
“…Furthermore, NFV and SDN are mutually beneficial to each other. For example, SDN can accelerate NFV deployment by offering a flexible and automated approach to chaining functions, configuring network connectivity and bandwidth, and automating the security and policy control [19][20][21]. Additionally, it can be used to support SFC to reduce both the management complexity and the operational cost.…”
Section: Introductionmentioning
confidence: 99%