2019
DOI: 10.48550/arxiv.1906.11427
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Security of 5G-Mobile Backhaul Networks: A Survey

Gaurav Choudhary,
Jiyoon Kim,
Vishal Sharma

Abstract: The rapid involution of the mobile generation with incipient data networking capabilities and utilization has exponentially increased the data traffic volumes. Such traffic drains various key issues in 5G mobile backhaul networks. Security of mobile backhaul is of utmost importance; however, there are a limited number of articles, which have explored such a requirement. This paper discusses the potential design issues and key challenges of the secure 5G mobile backhaul architecture. The comparisons of the exis… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 90 publications
0
2
0
Order By: Relevance
“…Therefore secure link management, communication, and handover security are some of the challenges that need to be addressed. In addition to that, network optimization, architectural enhancement, and performance metrics are considered in literature [157]. There is a growing trend of using reinforcement and machine learning methods to backhaul and core networks.…”
Section: Security Of Core and Backhaul Networkmentioning
confidence: 99%
“…Therefore secure link management, communication, and handover security are some of the challenges that need to be addressed. In addition to that, network optimization, architectural enhancement, and performance metrics are considered in literature [157]. There is a growing trend of using reinforcement and machine learning methods to backhaul and core networks.…”
Section: Security Of Core and Backhaul Networkmentioning
confidence: 99%
“…A comprehensive work on this topic is given by Choudhary, Kim and Sharma [118]. In this work, authors mention various key security requirements.…”
Section: Security Aspects Of Wireless Backhaulmentioning
confidence: 99%