2017 IEEE Conference on Standards for Communications and Networking (CSCN) 2017
DOI: 10.1109/cscn.2017.8088619
|View full text |Cite
|
Sign up to set email alerts
|

Overview of 5G security in 3GPP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(30 citation statements)
references
References 2 publications
0
27
0
1
Order By: Relevance
“…Security is still a big issue for the successful deployment of 5G-V2X communications. A security architecture summarized by [107] is shown in Fig. 9.…”
Section: Security In Cellular Based V2x Communicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Security is still a big issue for the successful deployment of 5G-V2X communications. A security architecture summarized by [107] is shown in Fig. 9.…”
Section: Security In Cellular Based V2x Communicationsmentioning
confidence: 99%
“…For the application of V2X communications, new application layer security protocols can be added to enhance security and privacy protection over users. Recently, the 3GPP standardization endeavored to solve problems in several domains as shown below [107]. [115].…”
Section: Security In Cellular Based V2x Communicationsmentioning
confidence: 99%
“…As the landscape of a new generation of communication technologies evolves, for example with the development of 5G [17], we can see that there is a reliance on standards to provide security to the communications. They use an Extensible Authentication Protocol (EAP) for network access and secondary authentication [18], and AAA infrastructures.…”
Section: Related Workmentioning
confidence: 99%
“…It is expected that 5G will have a broader bandwidth, a denser number of users, lower latency, and that it will provide more reliable transmission [35]. However, to ensure that the key performance indicator (KPI) requirements grow at the correct orders of magnitude, it is necessary to design a secure mechanism to provide high level security without affecting network performance [36,37].…”
Section: Security Requirements Of New Air Interface Technologymentioning
confidence: 99%