2015
DOI: 10.1002/sec.1253
|View full text |Cite
|
Sign up to set email alerts
|

Policy-based communications for 5G mobile with customer edge switching

Abstract: Besides more capacity and faster connections, 5G is expected to provide ultra-reliable services, for example, for machineto-machine communications. In this paper, we advocate that 5G must do its best to eliminate malicious traffic as a cause of failure of legitimate services. This paper proposes that all communications in 5G should be controlled by policy. The policies facilitate cooperation of customer networks against misbehaving actors and collecting evidence of malicious activity. Dynamic policies can reac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 39 publications
0
9
0
Order By: Relevance
“…An encryption based video sharing scheme is also presented in [79]. Kantola et al [67] proposed a policy-based scheme that can prevent DoS and spoofing attacks. A solution to secure handoff is given in [40] and discussed in Section 5.2.…”
Section: Security and Privacy Management In 5g Networkmentioning
confidence: 99%
“…An encryption based video sharing scheme is also presented in [79]. Kantola et al [67] proposed a policy-based scheme that can prevent DoS and spoofing attacks. A solution to secure handoff is given in [40] and discussed in Section 5.2.…”
Section: Security and Privacy Management In 5g Networkmentioning
confidence: 99%
“…Their solution focused on the resolution of hierarchical security issues without affecting the network layout. Some other solutions can be studied from Refs [77][78][79][80]. In short, 5G should be adopted with a reliable and scalable architecture for the mobility management to support a high data rate with the minimum delays and latency.…”
Section: Secure Mobility Management In 5gmentioning
confidence: 99%
“…For the trust decision the destination network or host will need reliable information on the past behavior of all kinds of Internet entities. A proof of concept implementation of this kind of IP/locator split using host names as IDs is reported in [6] showing that it is feasible to deploy the solution one customer network at a time and without compulsory changes to hosts or applications.…”
Section: Framework For Embedding Trust Into the Networkmentioning
confidence: 99%