2022
DOI: 10.1007/978-3-030-91149-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges in 5G Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Establish a secure TLS connection between the client and the server; (5) Retrieve local data X i and associated labels Y i (6) Initialize: Local model parameters W i � W t ; (7) for e � 1 to E do (8) Update W i using X i and Y i through local training; ( 9) end (10) Securely send the updated local model W i to the server using the established TLS connection; (11) end (12) Aggregate and update the global model W t+1 using the received local models; (13) Send the updated global model W t+1 to all participating clients using the TLS connection; (14) end ALGORITHM 1: Federated averaging learning procedure with TLS encryption.…”
Section: Tls Version 13 For More Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Establish a secure TLS connection between the client and the server; (5) Retrieve local data X i and associated labels Y i (6) Initialize: Local model parameters W i � W t ; (7) for e � 1 to E do (8) Update W i using X i and Y i through local training; ( 9) end (10) Securely send the updated local model W i to the server using the established TLS connection; (11) end (12) Aggregate and update the global model W t+1 using the received local models; (13) Send the updated global model W t+1 to all participating clients using the TLS connection; (14) end ALGORITHM 1: Federated averaging learning procedure with TLS encryption.…”
Section: Tls Version 13 For More Securitymentioning
confidence: 99%
“…However, VNFs hosted in the cloud are susceptible to a range of security threats, while integrating numerous VNFs from various vendors with diferent security measures is necessary to meet 5G requirements [5]. Tis creates a complex and diverse network, resulting in new security challenges [6], as well as exacerbating existing security vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%