2019
DOI: 10.1155/2019/4582391
|View full text |Cite
|
Sign up to set email alerts
|

Policy-Based Security Management System for 5G Heterogeneous Networks

Abstract: Advances in mobile phone technology and the growth of associated networks have been phenomenal over the last decade. Therefore, they have been the focus of much academic research, driven by commercial and end-user demands for increasingly faster technology. The most recent generation of mobile network technology is the fifth generation (5G). 5G networks are expected to launch across the world by 2020 and to work with existing 3G and 4G technologies to provide extreme speed despite being limited to wireless tec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…This calls for proactive measures like encryption, authentication, and access control to safeguard data in transit and at rest. It also calls for intrusion detection and threat intelligence to quickly identify and neutralize cyber threats (Alquhayz et al, 2019). Additionally, AI and machine learning can enhance cyber defenses by providing predictive analytics, anomaly detection, and automatic reaction mechanisms.…”
Section: Strategies For Securing 6g Networkmentioning
confidence: 99%
“…This calls for proactive measures like encryption, authentication, and access control to safeguard data in transit and at rest. It also calls for intrusion detection and threat intelligence to quickly identify and neutralize cyber threats (Alquhayz et al, 2019). Additionally, AI and machine learning can enhance cyber defenses by providing predictive analytics, anomaly detection, and automatic reaction mechanisms.…”
Section: Strategies For Securing 6g Networkmentioning
confidence: 99%
“…Alquhayz et al implemented a policy-based security management system to ensure that end-user devices cannot be used as weapons or tools of attack. They evaluated the proposed framework by implementing it using threat models such as IP spoofing and man-in-the-middle (MITM) attacks [145]. However, the framework is limited by a methodology that gives isolated end-user devices their privileges back [145].…”
Section: B Security Solutions Challenges and Gapsmentioning
confidence: 99%
“…They evaluated the proposed framework by implementing it using threat models such as IP spoofing and man-in-the-middle (MITM) attacks [145]. However, the framework is limited by a methodology that gives isolated end-user devices their privileges back [145]. Zhou et al noted that sharing of large-scale spectrum in 5G heterogeneous networks leads to many security and privacy challenges [146].…”
Section: B Security Solutions Challenges and Gapsmentioning
confidence: 99%
“…Self-optimisation capabilities in 5G networks require advanced network control. Such control involves the dynamic generation of network policies and the subsequent execution of those policies, requiring less human intervention and effort [3], [4]. The anatomy of such policy (or control rule, indistinctly) consists mainly of two differentiating parts.…”
Section: Introductionmentioning
confidence: 99%