2018
DOI: 10.25103/jestr.111.24
|View full text |Cite
|
Sign up to set email alerts
|

On Virtualization and Security-Awareness Performance Analysis in 5G Cellular Networks

Abstract: Recently, Fifth Generation (5G) cellular networks have gained promise as a paradigm that could provide rich computational resources for users. Virtualization is a key technology for wireless communications, especially in standard Long Term Evolution (LTE) systems, which enable cloud based multi-tenancy business models through providing a shared scalable resource platform for all users. Despite the potential significance of virtualization for cellular networks, several challenges remain to be addressed. For cel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 23 publications
(36 reference statements)
0
3
0
Order By: Relevance
“…D2D networks [14][15][16] are key networks that will serve the communication, coverage, and data rate demands for any future applications. Currently, D2D has received much attention from Some examples are Relay-By-Smartphone [5] and Data Spotting [6], and FlashlineQ [5] can provide connectivity up to 1 KM [6].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…D2D networks [14][15][16] are key networks that will serve the communication, coverage, and data rate demands for any future applications. Currently, D2D has received much attention from Some examples are Relay-By-Smartphone [5] and Data Spotting [6], and FlashlineQ [5] can provide connectivity up to 1 KM [6].…”
Section: Related Workmentioning
confidence: 99%
“…D2D networks [14][15][16] are key networks that will serve the communication, coverage, and data rate demands for any future applications. Currently, D2D has received much attention from academia and industry due to its potential advantages and reliable Quality of Service (QoS).…”
Section: Related Workmentioning
confidence: 99%
“…Considering the reachability and number of devices active in 5G networks, the scale and the impact of these attacks becomes severe and allows zero time to respond. Efficient mutual authentication, strong key agreements should be followed while deploying applications in 5G networks, however, these should come without affecting the performance of the network [25]- [27]. Although 5G networks aim at increasing the speed as well as the quality of the transmissions, this reduces the time window for applying security mechanisms to prevent any active attacks on the networks.…”
Section: Introductionmentioning
confidence: 99%