Wiley 5G Ref 2019
DOI: 10.1002/9781119471509.w5gref156
|View full text |Cite
|
Sign up to set email alerts
|

Security for Vertical Industries

Abstract: Having a changing ecosystem in 5G requires coordinating and adapting new security capabilities for Mobile Virtual Network Operators (MVNOs) that can cover several verticals, their new business models, and mode of operation. In such an ecosystem, cloud service providers should offer corresponding security services to MNVOs, regarding the deployment, layer, and configuration of security functions. Furthermore, 5G network slicing requires automated security and orchestration functionality, especially in complex n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…On the other hand, several papers consider specific security models and approach helpful in this topic. For instance, the paper [29] investigates mobile network operators' security challenges and mitigation mechanisms for cloud layers as well cloud deployments. The chapter [30] provides an overview of different IoT-based verticals, associated security requirements, threats, and possible mitigations.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, several papers consider specific security models and approach helpful in this topic. For instance, the paper [29] investigates mobile network operators' security challenges and mitigation mechanisms for cloud layers as well cloud deployments. The chapter [30] provides an overview of different IoT-based verticals, associated security requirements, threats, and possible mitigations.…”
Section: Introductionmentioning
confidence: 99%
“…For example, ref. [22] analyzes security problems in mobile network deployment and proposes mitigation mechanisms for cloud layers. Ref.…”
mentioning
confidence: 99%