2017
DOI: 10.1007/978-3-319-64653-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements for Multi-operator Virtualized Network and Service Orchestration for 5G

Abstract: The fifth generation of mobile networks (5G) will support new business and service models. A particular model of business and technical interest is multi-operator service orchestration, where service chains are created dynamically with coordination across multiple administrative domains. In such a scenario, resource sharing among operators is expected to be enabled by emerging network softwarization technologies such as Software-Defined Networking (SDN) and Network Functions Virtualization (NFV). On top of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Other works, e.g., [8], [9], address decision-making in 5G networks and the associated challenges, including computational complexity. Finally, orchestration, including the decision-making involved entities and the arising security concerns have been tackled in, e.g., [10] and [11], respectively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Other works, e.g., [8], [9], address decision-making in 5G networks and the associated challenges, including computational complexity. Finally, orchestration, including the decision-making involved entities and the arising security concerns have been tackled in, e.g., [10] and [11], respectively.…”
Section: Related Workmentioning
confidence: 99%
“…(13) The intuition behind constraints ( 11)-( 13) is that Φ(h, l, q, r) mimics the behavior of the product Ã(h, q) Ã(l, r): if either Ã(h, q) or Ã(l, r) are close to 0, then (11) and (12) guarantee that Φ(h, l, q, r) will also be close to zero; if both values are close to one, then (13) allows also Φ(h, l, q, r) to be close to one.…”
Section: Steps 1-2: Convex Formulationmentioning
confidence: 99%
“…5G networks based on network slicing have attracted substantial attention, with several works focusing on 5G architecture [3], [31], associated decision-making issues [32], [33], and security [34], [35].…”
Section: Related Workmentioning
confidence: 99%
“…5G networks based on network slicing have attracted substantial attention, with several works focusing on 5G architecture [2], [23], associated decision-making issues [24], and security [25].…”
Section: Related Workmentioning
confidence: 99%