2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High P 2018
DOI: 10.1109/bds/hpsc/ids18.2018.00038
|View full text |Cite
|
Sign up to set email alerts
|

An Approach for End-to-End (E2E) Security of 5G Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…As already mentioned, ML can be used in functional modules in multiple layers of the networks. Thus, the use of ML should be synchronized across the network [135] to ensure overall secure communications [136].…”
Section: ML For Security Managementmentioning
confidence: 99%
“…As already mentioned, ML can be used in functional modules in multiple layers of the networks. Thus, the use of ML should be synchronized across the network [135] to ensure overall secure communications [136].…”
Section: ML For Security Managementmentioning
confidence: 99%
“…5G is expected to bring a drastic change in recent technology. As a result, several reviews and research were conducted in 5G [5][6][7]. Although security was one of the main requirements in 5G, however, limited research was proposed in that domain such as [8][9][10] are some of few a survey that emphasizes on the security challenges and communications security of 5G.…”
Section: Introductionmentioning
confidence: 99%
“…Using network slicing to control encryption is relatively novel, but nevertheless has already been considered theoretically in [10] and [11] by utilising QKD in tandem with a QRA (specifically, a QRA version of Elliptic-Curve Cryptography), and has also performed experimentally over the Bristol City 5G UK Test Network in the works of [12][13][14], by applying QKD to 5G networking. Moreover, in [15], proof-of-transit of the 5G data traffic is demonstrated, using cryptographic techniques with QKD over the Madrid Quantum Network [16] -this network has also been used to demonstrate securing the management of the SDN control plane through QKD in [17,18].…”
Section: Introductionmentioning
confidence: 99%