2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) 2020
DOI: 10.23919/apnoms50412.2020.9236966
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Identifier (HID)-based 5G Architecture with Backup Slice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…A hierarchical authentication mechanism is suggested by [245]. In this scheme, users are rst required to link with the less secure slice by authentication and then access the fully secured slice-a famous vulnerability in any communication system a the denial of service.…”
Section: Network Slicing In 5gmentioning
confidence: 99%
See 1 more Smart Citation
“…A hierarchical authentication mechanism is suggested by [245]. In this scheme, users are rst required to link with the less secure slice by authentication and then access the fully secured slice-a famous vulnerability in any communication system a the denial of service.…”
Section: Network Slicing In 5gmentioning
confidence: 99%
“…Several limiting factors exist for employing mm-Wave or THz technology in 5G "beachfront spectrum" [252]. However, the performance gains in bandwidth are worthy of such limiting factors [15,245]. The primary problem of mm-Wave and THz is the properties related to signal fading and distortion problems during the propagation process in Beyond 5G networks [252].…”
Section: Mm-wave or Tera-hertz Spectrummentioning
confidence: 99%