Skip to main content

2019 | OriginalPaper | Buchkapitel

A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

verfasst von : Gaurav Choudhary, Vishal Sharma

Erschienen in: 5G Enabled Secure Wireless Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The 5G networks have the capability to provide high compatibility for the new applications, industries, and business models. These networks can tremendously improve the quality of life by enabling various use cases that require high data rate, low latency, and continuous connectivity for applications pertaining to eHealth, automatic vehicles, smart cities, smart grid, and the Internet of Things (IoT). However, these applications need secure servicing as well as resource policing for effective network formations. There have been a lot of studies, which emphasized the security aspects of 5G networks while focusing only on the adaptability features of these networks. However, there is a gap in the literature which particularly needs to follow recent computing paradigms as alternative mechanisms for the enhancement of security. To cover this, a detailed description of the security for the 5G networks is presented in this article along with the discussions on the evolution of osmotic and catalytic computing based security modules. The taxonomy on the basis of security requirements is presented, which also includes the comparison of the existing state-of-the-art solutions. This article also provides a security model, “CATMOSIS,” which idealizes the incorporation of security features on the basis of catalytic and osmotic computing in the 5G networks. Finally, various security challenges and open issues are discussed to emphasize the works to follow in this direction of research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat E. Hossain, M. Rasti, H. Tabassum, A. Abdelnasser, Evolution toward 5G multi-tier cellular wireless networks: an interference management perspective. IEEE Wirel. Commun. 21(3), 118–127 (2014)CrossRef E. Hossain, M. Rasti, H. Tabassum, A. Abdelnasser, Evolution toward 5G multi-tier cellular wireless networks: an interference management perspective. IEEE Wirel. Commun. 21(3), 118–127 (2014)CrossRef
2.
Zurück zum Zitat X. Ge, H. Cheng, M. Guizani, T. Han, 5G wireless backhaul networks: challenges and research advances. IEEE Netw. 28(6), 6–11 (2014)CrossRef X. Ge, H. Cheng, M. Guizani, T. Han, 5G wireless backhaul networks: challenges and research advances. IEEE Netw. 28(6), 6–11 (2014)CrossRef
3.
Zurück zum Zitat V. Sharma, J.D. Lim, J.N. Kim, I. You, SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers. Mobile Information Systems. 2017; (2017) V. Sharma, J.D. Lim, J.N. Kim, I. You, SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers. Mobile Information Systems. 2017; (2017)
4.
Zurück zum Zitat P. Rost, C.J. Bernardos, A. De Domenico, M. Di Girolamo, M. Lalam, A. Maeder, D. Sabella, D. Wübben, Cloud technologies for flexible 5G radio access networks. IEEE Commun. Mag. 52(5), 68–76 (2014)CrossRef P. Rost, C.J. Bernardos, A. De Domenico, M. Di Girolamo, M. Lalam, A. Maeder, D. Sabella, D. Wübben, Cloud technologies for flexible 5G radio access networks. IEEE Commun. Mag. 52(5), 68–76 (2014)CrossRef
5.
Zurück zum Zitat Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, H.V. Poor, Application of non-orthogonal multiple access in LTE and 5G networks. arXiv preprint arXiv:1511.08610 (2015) Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, H.V. Poor, Application of non-orthogonal multiple access in LTE and 5G networks. arXiv preprint arXiv:1511.08610 (2015)
6.
Zurück zum Zitat V. Sharma, R. Sabatini, S. Ramasamy, UAVs assisted delay optimization in heterogeneous wireless networks. IEEE Commun. Lett. 20(12), 2526–2529 (2016)CrossRef V. Sharma, R. Sabatini, S. Ramasamy, UAVs assisted delay optimization in heterogeneous wireless networks. IEEE Commun. Lett. 20(12), 2526–2529 (2016)CrossRef
7.
Zurück zum Zitat V. Sharma, R. Kumar, P.S. Rana, Self-healing neural model for stabilization against failures over networked UAVs. IEEE Commun. Lett. 19(11), 2013–2016 (2015)CrossRef V. Sharma, R. Kumar, P.S. Rana, Self-healing neural model for stabilization against failures over networked UAVs. IEEE Commun. Lett. 19(11), 2013–2016 (2015)CrossRef
8.
Zurück zum Zitat Z. Zhang, X. Chai, K. Long, A.V. Vasilakos, L. Hanzo, Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection. IEEE Commun. Mag. 53(5), 128–137 (2015)CrossRef Z. Zhang, X. Chai, K. Long, A.V. Vasilakos, L. Hanzo, Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection. IEEE Commun. Mag. 53(5), 128–137 (2015)CrossRef
9.
Zurück zum Zitat A.I. Sulyman, A.T. Nassar, M.K. Samimi, G.R. MacCartney, T.S. Rappaport, A. Alsanie, Radio propagation path loss models for 5G cellular networks in the 28 GHz and 38 GHz millimeter-wave bands. IEEE Commun. Mag. 52(9), 78–86 (2014)CrossRef A.I. Sulyman, A.T. Nassar, M.K. Samimi, G.R. MacCartney, T.S. Rappaport, A. Alsanie, Radio propagation path loss models for 5G cellular networks in the 28 GHz and 38 GHz millimeter-wave bands. IEEE Commun. Mag. 52(9), 78–86 (2014)CrossRef
10.
Zurück zum Zitat D. Shin, V. Sharma, J. Kim, S. Kwon, I. You, Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks. IEEE Access. 5, 11100–11117 (2017)CrossRef D. Shin, V. Sharma, J. Kim, S. Kwon, I. You, Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks. IEEE Access. 5, 11100–11117 (2017)CrossRef
11.
Zurück zum Zitat H. Elshaer, F. Boccardi, M. Dohler, R. Irmer, Downlink and uplink decoupling: a disruptive architectural design for 5G networks. In Global Communications Conference (GLOBECOM), 2014 IEEE 2014 Dec 8 (pp. 1798–1803). IEEE H. Elshaer, F. Boccardi, M. Dohler, R. Irmer, Downlink and uplink decoupling: a disruptive architectural design for 5G networks. In Global Communications Conference (GLOBECOM), 2014 IEEE 2014 Dec 8 (pp. 1798–1803). IEEE
12.
Zurück zum Zitat V. Sharma, G. Choudhary, I. You, J.D. Lim, J.N. Kim, Self-enforcing game theory-based resource allocation for LoRaWAN assisted public safety communications. arXiv preprint arXiv:1804.07204 (2018) V. Sharma, G. Choudhary, I. You, J.D. Lim, J.N. Kim, Self-enforcing game theory-based resource allocation for LoRaWAN assisted public safety communications. arXiv preprint arXiv:1804.07204 (2018)
13.
Zurück zum Zitat T.D. Perera, D.N. Jayakody, S. Chatzinotas, V. Sharma, Wireless information and power transfer: issues, advances, and challenges. In Vehicular Technology Conference (VTC-Fall), 2017 IEEE 86th 2017 Sep 24 (pp. 1–7). IEEE T.D. Perera, D.N. Jayakody, S. Chatzinotas, V. Sharma, Wireless information and power transfer: issues, advances, and challenges. In Vehicular Technology Conference (VTC-Fall), 2017 IEEE 86th 2017 Sep 24 (pp. 1–7). IEEE
14.
Zurück zum Zitat M.N. Tehrani, M. Uysal, H. Yanikomeroglu, Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Commun. Mag. 52(5), 86–92 (2014)CrossRef M.N. Tehrani, M. Uysal, H. Yanikomeroglu, Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Commun. Mag. 52(5), 86–92 (2014)CrossRef
15.
Zurück zum Zitat X. Duan, X. Wang, Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun. Mag. 53(4), 28–35 (2015)CrossRef X. Duan, X. Wang, Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun. Mag. 53(4), 28–35 (2015)CrossRef
16.
Zurück zum Zitat V. Sharma, K. Lee, S. Kwon, J. Kim, H. Park, K. Yim, S.Y. Lee, A consensus framework for reliability and mitigation of zero-day attacks in IoT. Security and Communication Networks. 2017; (2017) V. Sharma, K. Lee, S. Kwon, J. Kim, H. Park, K. Yim, S.Y. Lee, A consensus framework for reliability and mitigation of zero-day attacks in IoT. Security and Communication Networks. 2017; (2017)
17.
Zurück zum Zitat V. Sharma, I. You, G. Kul, Socializing drones for inter-service operability in ultra-dense wireless networks using Blockchain. In Proceedings of the 2017 International Workshop on Managing Insider Security Threats 2017 Oct 30 (pp. 81–84). ACM V. Sharma, I. You, G. Kul, Socializing drones for inter-service operability in ultra-dense wireless networks using Blockchain. In Proceedings of the 2017 International Workshop on Managing Insider Security Threats 2017 Oct 30 (pp. 81–84). ACM
18.
Zurück zum Zitat M. Chen, Y. Qian, S. Mao, W. Tang, X. Yang, Software-defined mobile networks security. Mobile Netw. Appl. 21(5), 729–743 (2016)CrossRef M. Chen, Y. Qian, S. Mao, W. Tang, X. Yang, Software-defined mobile networks security. Mobile Netw. Appl. 21(5), 729–743 (2016)CrossRef
19.
Zurück zum Zitat S. Sun, M. Kadoch, L. Gong, B. Rong, Integrating network function virtualization with SDR and SDN for 4G/5G networks. IEEE Netw. 29(3), 54–59 (2015)CrossRef S. Sun, M. Kadoch, L. Gong, B. Rong, Integrating network function virtualization with SDR and SDN for 4G/5G networks. IEEE Netw. 29(3), 54–59 (2015)CrossRef
20.
Zurück zum Zitat K. Xiao, L. Gong, M. Kadoch, Opportunistic multicast NOMA with security concerns in a 5G massive MIMO system. IEEE Commun. Mag. 56(3), 91–95 (2018)CrossRef K. Xiao, L. Gong, M. Kadoch, Opportunistic multicast NOMA with security concerns in a 5G massive MIMO system. IEEE Commun. Mag. 56(3), 91–95 (2018)CrossRef
21.
Zurück zum Zitat Y. Wu, A. Khisti, C. Xiao, G. Caire, K.K. Wong, X. Gao, A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 36, 679–695 (2018)CrossRef Y. Wu, A. Khisti, C. Xiao, G. Caire, K.K. Wong, X. Gao, A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 36, 679–695 (2018)CrossRef
22.
Zurück zum Zitat V. Sharma, I. You, R. Kumar, ISMA: Intelligent sensing model for anomalies detection in cross platform OSNs with a case study on IoT. IEEE Access 5, 3284–3301 (2017)CrossRef V. Sharma, I. You, R. Kumar, ISMA: Intelligent sensing model for anomalies detection in cross platform OSNs with a case study on IoT. IEEE Access 5, 3284–3301 (2017)CrossRef
23.
Zurück zum Zitat M. Condoluci, M.A. Lema, T. Mahmoodi, M. Dohler, 5g IoT industry verticals and network requirements. In Powering the Internet of Things With 5G Networks 2018 (pp. 148–175). IGI Global M. Condoluci, M.A. Lema, T. Mahmoodi, M. Dohler, 5g IoT industry verticals and network requirements. In Powering the Internet of Things With 5G Networks 2018 (pp. 148–175). IGI Global
24.
Zurück zum Zitat V. Sharma, I. You, D.N. Jayakody, M. Atiquzzaman, Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things. Future Generation Computer Systems. 2017 Dec 28 V. Sharma, I. You, D.N. Jayakody, M. Atiquzzaman, Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things. Future Generation Computer Systems. 2017 Dec 28
25.
Zurück zum Zitat M. Alenezi, K. Almustafa, M. Hussein, On virtualization and security-awareness performance analysis in 5G cellular networks. J. Eng. Sci. Technol. Rev. 11(1), 1–9 (2018) M. Alenezi, K. Almustafa, M. Hussein, On virtualization and security-awareness performance analysis in 5G cellular networks. J. Eng. Sci. Technol. Rev. 11(1), 1–9 (2018)
26.
Zurück zum Zitat D. Schinianakis, Alternative security options in the 5G and IoT era. IEEE Circuits Syst. Mag. 17(4), 6–28 (2017)CrossRef D. Schinianakis, Alternative security options in the 5G and IoT era. IEEE Circuits Syst. Mag. 17(4), 6–28 (2017)CrossRef
27.
Zurück zum Zitat Y.H. Lee, A.S. Wang, Y.D. Liao, T.W. Lin, Y.J. Chi, C.C. Wong, N. Shinohara, Q. Yuan, Q. Chen, Wireless power IoT system using polarization switch antenna as polling protocol for 5G mobile network. In Wireless Power Transfer Conference (WPTC), 2017 IEEE 2017 May 10 (pp. 1–3). IEEE Y.H. Lee, A.S. Wang, Y.D. Liao, T.W. Lin, Y.J. Chi, C.C. Wong, N. Shinohara, Q. Yuan, Q. Chen, Wireless power IoT system using polarization switch antenna as polling protocol for 5G mobile network. In Wireless Power Transfer Conference (WPTC), 2017 IEEE 2017 May 10 (pp. 1–3). IEEE
28.
Zurück zum Zitat A. Costanzo, D. Masotti, Energizing 5G: near-and far-field wireless energy and data trantransfer as an enabling technology for the 5G IoT. IEEE Microw. Mag. 18(3), 125–136 (2017)CrossRef A. Costanzo, D. Masotti, Energizing 5G: near-and far-field wireless energy and data trantransfer as an enabling technology for the 5G IoT. IEEE Microw. Mag. 18(3), 125–136 (2017)CrossRef
29.
Zurück zum Zitat A. Rajaram, D.N. Jayakody, K. Srinivasan, B. Chen, V. Sharma, Opportunistic-harvesting: RF wireless power transfer scheme for multiple access relays system. IEEE Access. 5, 16084–16099 (2017)CrossRef A. Rajaram, D.N. Jayakody, K. Srinivasan, B. Chen, V. Sharma, Opportunistic-harvesting: RF wireless power transfer scheme for multiple access relays system. IEEE Access. 5, 16084–16099 (2017)CrossRef
30.
Zurück zum Zitat J. Guan, V. Sharma, I. You, M. Atiquzzaman, Extension of MIH to support FPMIPv6 for optimized heterogeneous handover. arXiv preprint arXiv:1705.09835 (2017) J. Guan, V. Sharma, I. You, M. Atiquzzaman, Extension of MIH to support FPMIPv6 for optimized heterogeneous handover. arXiv preprint arXiv:1705.09835 (2017)
31.
Zurück zum Zitat M. Villari, M. Fazio, S. Dustdar, O. Rana, R. Ranjan, Osmotic computing: a new paradigm for edge/cloud integration. IEEE Cloud Comput. 3(6), 76–83 (2016)CrossRef M. Villari, M. Fazio, S. Dustdar, O. Rana, R. Ranjan, Osmotic computing: a new paradigm for edge/cloud integration. IEEE Cloud Comput. 3(6), 76–83 (2016)CrossRef
32.
Zurück zum Zitat V. Sharma, K. Srinivasan, D.N. Jayakody, O. Rana, R. Kumar, Managing service-heterogeneity using osmotic computing. arXiv preprint arXiv:1704.04213 (2017) V. Sharma, K. Srinivasan, D.N. Jayakody, O. Rana, R. Kumar, Managing service-heterogeneity using osmotic computing. arXiv preprint arXiv:1704.04213 (2017)
33.
Zurück zum Zitat Maksimović M. The Role of Osmotic Computing in Internet of Things.Infoteh-Jahorina.2018 March Maksimović M. The Role of Osmotic Computing in Internet of Things.Infoteh-Jahorina.2018 March
34.
Zurück zum Zitat V. Sharma, I. You, R. Kumar, P. Kim, Computational offloading for efficient trust management in pervasive online social networks using osmotic computing. IEEE Access. 5, 5084–5103 (2017)CrossRef V. Sharma, I. You, R. Kumar, P. Kim, Computational offloading for efficient trust management in pervasive online social networks using osmotic computing. IEEE Access. 5, 5084–5103 (2017)CrossRef
35.
Zurück zum Zitat M. Nardelli, S. Nastic, S. Dustdar, M. Villari, R. Ranjan, Osmotic flow: Osmotic computing+ IoT workflow. IEEE Cloud Comput. 4(2), 68–75 (2017)CrossRef M. Nardelli, S. Nastic, S. Dustdar, M. Villari, R. Ranjan, Osmotic flow: Osmotic computing+ IoT workflow. IEEE Cloud Comput. 4(2), 68–75 (2017)CrossRef
36.
Zurück zum Zitat A. Morshed, P.P. Jayaraman, T. Sellis, D. Georgakopoulos, M. Villari, R. Ranjan, Deep osmosis: holistic distributed deep learning in osmotic computing. IEEE Cloud Comput. 4(6), 22–32 (2018)CrossRef A. Morshed, P.P. Jayaraman, T. Sellis, D. Georgakopoulos, M. Villari, R. Ranjan, Deep osmosis: holistic distributed deep learning in osmotic computing. IEEE Cloud Comput. 4(6), 22–32 (2018)CrossRef
37.
Zurück zum Zitat T. Rausch, S. Dustdar, R. Ranjan, Osmotic message-oriented middleware for the internet of things. IEEE Cloud Comput. 5(2), 17–25 (2018)CrossRef T. Rausch, S. Dustdar, R. Ranjan, Osmotic message-oriented middleware for the internet of things. IEEE Cloud Comput. 5(2), 17–25 (2018)CrossRef
38.
Zurück zum Zitat A. Buzachis, A. Galletta, L. Carnevale, A. Celesti, M. Fazio, M. Villari, Towards osmotic computing: analyzing overlay network solutions to optimize the deployment of container-based microservices in fog, edge and IoT environments. In Fog and Edge Computing (ICFEC), 2018 IEEE 2nd International Conference on 2018 May 1 (pp. 1–10). IEEE A. Buzachis, A. Galletta, L. Carnevale, A. Celesti, M. Fazio, M. Villari, Towards osmotic computing: analyzing overlay network solutions to optimize the deployment of container-based microservices in fog, edge and IoT environments. In Fog and Edge Computing (ICFEC), 2018 IEEE 2nd International Conference on 2018 May 1 (pp. 1–10). IEEE
39.
Zurück zum Zitat V. Sharma, I. You, R. Kumar, Resource-based mobility management for video users in 5G using catalytic computing. Comput. Commun. 118, 120–139 (2018)CrossRef V. Sharma, I. You, R. Kumar, Resource-based mobility management for video users in 5G using catalytic computing. Comput. Commun. 118, 120–139 (2018)CrossRef
40.
Zurück zum Zitat G. Chopra, R.K. Jha, S. Jain, A survey on ultra-dense network and emerging technologies: security challenges and possible solutions. J. Netw. Comput. Appl. 95, 54–78 (2017)CrossRef G. Chopra, R.K. Jha, S. Jain, A survey on ultra-dense network and emerging technologies: security challenges and possible solutions. J. Netw. Comput. Appl. 95, 54–78 (2017)CrossRef
41.
Zurück zum Zitat M.A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, H. Janicke, Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101, 55–82 (2017)CrossRef M.A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, H. Janicke, Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101, 55–82 (2017)CrossRef
42.
Zurück zum Zitat D. Fang, Y. Qian, R.Q. Hu, Security for 5G mobile wireless networks. IEEE Access. 6, 4850–4874 (2018)CrossRef D. Fang, Y. Qian, R.Q. Hu, Security for 5G mobile wireless networks. IEEE Access. 6, 4850–4874 (2018)CrossRef
43.
Zurück zum Zitat H. Lin, Z. Yan, Y. Chen, L. Zhang, A survey on network security-related data collection technologies. IEEE Access. 6, 18345–18365 (2018)CrossRef H. Lin, Z. Yan, Y. Chen, L. Zhang, A survey on network security-related data collection technologies. IEEE Access. 6, 18345–18365 (2018)CrossRef
44.
Zurück zum Zitat D. Rupprecht, A. Dabrowski, T. Holz, E. Weippl, C. Pöpper, On security research towards future mobile network generations. IEEE Commun. Surv. Tutorials 20, 2518–2542 (2018)CrossRef D. Rupprecht, A. Dabrowski, T. Holz, E. Weippl, C. Pöpper, On security research towards future mobile network generations. IEEE Commun. Surv. Tutorials 20, 2518–2542 (2018)CrossRef
45.
Zurück zum Zitat I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, A. Gurtov, Overview of 5G security challenges and solutions. IEEE Commun. Standards Mag. 2(1), 36–43 (2018)CrossRef I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, A. Gurtov, Overview of 5G security challenges and solutions. IEEE Commun. Standards Mag. 2(1), 36–43 (2018)CrossRef
46.
Zurück zum Zitat Y. Gao, S. Hu, W. Tang, Y. Li, Y. Sun, D. Huang, S. Cheng, X. Li, Physical layer security in 5G based large scale social networks: opportunities and challenges. IEEE Access 6, 26350–26357 (2018)CrossRef Y. Gao, S. Hu, W. Tang, Y. Li, Y. Sun, D. Huang, S. Cheng, X. Li, Physical layer security in 5G based large scale social networks: opportunities and challenges. IEEE Access 6, 26350–26357 (2018)CrossRef
47.
Zurück zum Zitat X. Ji, K. Huang, L. Jin, H. Tang, C. Liu, Z. Zhong, W. You, X. Xu, H. Zhao, J. Wu, M. Yi, Overview of 5G security technology. SCIENCE CHINA Inf. Sci. 61(8), 081301 (2018)CrossRef X. Ji, K. Huang, L. Jin, H. Tang, C. Liu, Z. Zhong, W. You, X. Xu, H. Zhao, J. Wu, M. Yi, Overview of 5G security technology. SCIENCE CHINA Inf. Sci. 61(8), 081301 (2018)CrossRef
48.
Zurück zum Zitat N. Panwar, S. Sharma, A.K. Singh, A survey on 5G: the next generation of mobile communication. Phys. Commun. 18, 64–84 (2016)CrossRef N. Panwar, S. Sharma, A.K. Singh, A survey on 5G: the next generation of mobile communication. Phys. Commun. 18, 64–84 (2016)CrossRef
49.
Zurück zum Zitat N.T. Le, M.A. Hossain, A. Islam, D.Y. Kim, Y.J. Choi, Y.M. Jang. Survey of promising technologies for 5G networks. Mobile information systems. 2016 N.T. Le, M.A. Hossain, A. Islam, D.Y. Kim, Y.J. Choi, Y.M. Jang. Survey of promising technologies for 5G networks. Mobile information systems. 2016
50.
Zurück zum Zitat R. Yu, J. Ding, X. Huang, M.T. Zhou, S. Gjessing, Y. Zhang, Optimal resource sharing in 5G-enabled vehicular networks: a matrix game approach. IEEE Trans. Veh. Technol. 65(10), 7844–7856 (2016)CrossRef R. Yu, J. Ding, X. Huang, M.T. Zhou, S. Gjessing, Y. Zhang, Optimal resource sharing in 5G-enabled vehicular networks: a matrix game approach. IEEE Trans. Veh. Technol. 65(10), 7844–7856 (2016)CrossRef
51.
Zurück zum Zitat N.C. Luong, P. Wang, D. Niyato, Y.C. Liang, F. Hou, Z. Han. Applications of economic and pricing models for resource management in 5G wireless networks: a survey. arXiv preprint arXiv:1710.04771 (2017) N.C. Luong, P. Wang, D. Niyato, Y.C. Liang, F. Hou, Z. Han. Applications of economic and pricing models for resource management in 5G wireless networks: a survey. arXiv preprint arXiv:1710.04771 (2017)
52.
Zurück zum Zitat H. Zhang, H. Xing, J. Cheng, A. Nallanathan, V.C. Leung, Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Industr. Inf. 12(5), 1714–1725 (2016)CrossRef H. Zhang, H. Xing, J. Cheng, A. Nallanathan, V.C. Leung, Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Industr. Inf. 12(5), 1714–1725 (2016)CrossRef
53.
Zurück zum Zitat M.R. Abedi, N. Mokari, M.R. Javan, H. Yanikomeroglu, Limited rate feedback scheme for resource allocation in secure relay-assisted OFDMA networks. IEEE Trans. Wirel. Commun. 15(4), 2604–2618 (2016)CrossRef M.R. Abedi, N. Mokari, M.R. Javan, H. Yanikomeroglu, Limited rate feedback scheme for resource allocation in secure relay-assisted OFDMA networks. IEEE Trans. Wirel. Commun. 15(4), 2604–2618 (2016)CrossRef
54.
Zurück zum Zitat A.M. Akhtar, X. Wang, L. Hanzo, Synergistic spectrum sharing in 5G HetNets: a harmonized SDN-enabled approach. IEEE Commun. Mag. 54(1), 40–47 (2016)CrossRef A.M. Akhtar, X. Wang, L. Hanzo, Synergistic spectrum sharing in 5G HetNets: a harmonized SDN-enabled approach. IEEE Commun. Mag. 54(1), 40–47 (2016)CrossRef
55.
Zurück zum Zitat X. Liu, Y. Liu, X. Wang, H. Lin, Highly efficient 3-D resource allocation techniques in 5G for NOMA-enabled massive MIMO and relaying systems. IEEE J. Sel. Areas Commun. 35(12), 2785–2797 (2017)CrossRef X. Liu, Y. Liu, X. Wang, H. Lin, Highly efficient 3-D resource allocation techniques in 5G for NOMA-enabled massive MIMO and relaying systems. IEEE J. Sel. Areas Commun. 35(12), 2785–2797 (2017)CrossRef
56.
Zurück zum Zitat H. Yang, B.C. Seet, S.F. Hasan, P.H. Chong, M.Y. Chung, Radio resource allocation for D2D-enabled massive machine communication in the 5G era. In Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2016 IEEE 14th Intl C 2016 Aug 8 (pp. 55–60). IEEE H. Yang, B.C. Seet, S.F. Hasan, P.H. Chong, M.Y. Chung, Radio resource allocation for D2D-enabled massive machine communication in the 5G era. In Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2016 IEEE 14th Intl C 2016 Aug 8 (pp. 55–60). IEEE
57.
Zurück zum Zitat H. Zhang, N. Liu, X. Chu, K. Long, A.H. Aghvami, V.C. Leung, Network slicing based 5G and future mobile networks: mobility, resource management, and challenges. IEEE Commun. Mag. 55(8), 138–145 (2017)CrossRef H. Zhang, N. Liu, X. Chu, K. Long, A.H. Aghvami, V.C. Leung, Network slicing based 5G and future mobile networks: mobility, resource management, and challenges. IEEE Commun. Mag. 55(8), 138–145 (2017)CrossRef
58.
Zurück zum Zitat K. Samdanis, X. Costa-Perez, V. Sciancalepore, From network sharing to multi-tenancy: the 5G network slice broker. IEEE Commun. Mag. 54(7), 32–39 (2016)CrossRef K. Samdanis, X. Costa-Perez, V. Sciancalepore, From network sharing to multi-tenancy: the 5G network slice broker. IEEE Commun. Mag. 54(7), 32–39 (2016)CrossRef
59.
Zurück zum Zitat B. Wang, K. Huang, X. Xu, L. Jin, Z. Zhong, Y. Wang, Resource allocation for secure communication in $ K $-tier heterogeneous cellular networks: a spatial-temporal perspective. IEEE Access. 6, 772–782 (2018)CrossRef B. Wang, K. Huang, X. Xu, L. Jin, Z. Zhong, Y. Wang, Resource allocation for secure communication in $ K $-tier heterogeneous cellular networks: a spatial-temporal perspective. IEEE Access. 6, 772–782 (2018)CrossRef
60.
Zurück zum Zitat J. Li, N. Zhang, Q. Ye, W. Shi, W. Zhuang, X. Shen, Joint resource allocation and online virtual network embedding for 5G networks. In GLOBECOM 2017–2017 IEEE Global Communications Conference 2017 Dec 4 (pp. 1–6). IEEE J. Li, N. Zhang, Q. Ye, W. Shi, W. Zhuang, X. Shen, Joint resource allocation and online virtual network embedding for 5G networks. In GLOBECOM 2017–2017 IEEE Global Communications Conference 2017 Dec 4 (pp. 1–6). IEEE
61.
Zurück zum Zitat I. Alqerm, B. Shihada, Sophisticated online learning scheme for green resource allocation in 5g heterogeneous cloud radio access networks. IEEE Trans. Mob. Comput. 17, 2423–2437 (2018)CrossRef I. Alqerm, B. Shihada, Sophisticated online learning scheme for green resource allocation in 5g heterogeneous cloud radio access networks. IEEE Trans. Mob. Comput. 17, 2423–2437 (2018)CrossRef
62.
Zurück zum Zitat H. Zhang, N. Yang, K. Long, M. Pan, G.K. Karagiannidis, V.C. Leung, Secure communications in NOMA system: Subcarrier assignment and power allocation. IEEE J. Sel. Areas Commun. 36(7), 1441–1452 (2018) H. Zhang, N. Yang, K. Long, M. Pan, G.K. Karagiannidis, V.C. Leung, Secure communications in NOMA system: Subcarrier assignment and power allocation. IEEE J. Sel. Areas Commun. 36(7), 1441–1452 (2018)
63.
Zurück zum Zitat I.P. Belikaidis, A. Georgakopoulos, E. Kosmatos, V. Frascolla, P. Demestichas, Management of 3.5-GHz spectrum in 5G dense networks: a hierarchical radio resource management scheme. IEEE Veh. Technol. Mag. 13(2), 57–64 (2018)CrossRef I.P. Belikaidis, A. Georgakopoulos, E. Kosmatos, V. Frascolla, P. Demestichas, Management of 3.5-GHz spectrum in 5G dense networks: a hierarchical radio resource management scheme. IEEE Veh. Technol. Mag. 13(2), 57–64 (2018)CrossRef
64.
Zurück zum Zitat A. Martin, J. Egaña, J. Flórez, J. Montalbán, I.G. Olaizola, M. Quartulli, R. Viola, M. Zorrilla, Network resource allocation system for QoE-aware delivery of media services in 5G networks. IEEE Trans. Broadcast. 64(2), 561–574 (2018)CrossRef A. Martin, J. Egaña, J. Flórez, J. Montalbán, I.G. Olaizola, M. Quartulli, R. Viola, M. Zorrilla, Network resource allocation system for QoE-aware delivery of media services in 5G networks. IEEE Trans. Broadcast. 64(2), 561–574 (2018)CrossRef
65.
Zurück zum Zitat Y. He, F.R. Yu, N. Zhao, H. Yin, Secure social networks in 5G systems with mobile edge computing, caching, and device-to-device communications. IEEE Wirel. Commun. 25(3), 103–109 (2018)CrossRef Y. He, F.R. Yu, N. Zhao, H. Yin, Secure social networks in 5G systems with mobile edge computing, caching, and device-to-device communications. IEEE Wirel. Commun. 25(3), 103–109 (2018)CrossRef
66.
Zurück zum Zitat L. Tan, Resource Allocation and Performance Optimization in Communication Networks and the Internet (CRC Press, Boca Raton, 2017)CrossRef L. Tan, Resource Allocation and Performance Optimization in Communication Networks and the Internet (CRC Press, Boca Raton, 2017)CrossRef
67.
Zurück zum Zitat M. Jiang, M. Condoluci, T. Mahmoodi, Network slicing management & prioritization in 5G mobile systems. In European wireless 2016 May 18 (pp. 1–6) M. Jiang, M. Condoluci, T. Mahmoodi, Network slicing management & prioritization in 5G mobile systems. In European wireless 2016 May 18 (pp. 1–6)
68.
Zurück zum Zitat AlQerm I, Shihada B. Enhanced machine learning scheme for energy efficient resource allocation in 5G heterogeneous cloud radio access networks. In IEEE Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2017 Oct 8 (pp. 1–7) AlQerm I, Shihada B. Enhanced machine learning scheme for energy efficient resource allocation in 5G heterogeneous cloud radio access networks. In IEEE Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2017 Oct 8 (pp. 1–7)
69.
Zurück zum Zitat X. Duan, Software-defined Networking enabled Resource Management and Security Provsioning in 5G Heterogeneous Networks. Electronic Thesis and Dissertation Repository. 4666. https://ir.lib.uwo.ca/etd/4666 [Last Accessed November 2018] X. Duan, Software-defined Networking enabled Resource Management and Security Provsioning in 5G Heterogeneous Networks. Electronic Thesis and Dissertation Repository. 4666. https://​ir.​lib.​uwo.​ca/​etd/​4666 [Last Accessed November 2018]
70.
Zurück zum Zitat Y. Zhu, Efficient resource allocation for 5G hybrid wireless networks (Doctoral dissertation, UCL (University College London)) Y. Zhu, Efficient resource allocation for 5G hybrid wireless networks (Doctoral dissertation, UCL (University College London))
71.
Zurück zum Zitat V. Sharma, I. You, F.Y. Leu, M. Atiquzzaman, Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. J. Netw. Comput. Appl. 102, 38–57 (2018)CrossRef V. Sharma, I. You, F.Y. Leu, M. Atiquzzaman, Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. J. Netw. Comput. Appl. 102, 38–57 (2018)CrossRef
72.
Zurück zum Zitat I. You, J.H. Lee, SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks. Comput. Netw. 129, 363–372 (2017)CrossRef I. You, J.H. Lee, SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks. Comput. Netw. 129, 363–372 (2017)CrossRef
73.
Zurück zum Zitat C.I. Fan, J.J. Huang, M.Z. Zhong, R.H. Hsu, W.T. Chen, J. Lee, ReHand: secure region-based fast handover with user anonymity for small cell networks in 5G. arXiv preprint arXiv:1806.03406 (2018) C.I. Fan, J.J. Huang, M.Z. Zhong, R.H. Hsu, W.T. Chen, J. Lee, ReHand: secure region-based fast handover with user anonymity for small cell networks in 5G. arXiv preprint arXiv:1806.03406 (2018)
74.
Zurück zum Zitat S. Chen, F. Qin, B. Hu, X. Li, Z. Chen, User-centric ultra-dense networks for 5G: challenges, methodologies, and directions. IEEE Wirel. Commun. 23(2), 78–85 (2016)CrossRef S. Chen, F. Qin, B. Hu, X. Li, Z. Chen, User-centric ultra-dense networks for 5G: challenges, methodologies, and directions. IEEE Wirel. Commun. 23(2), 78–85 (2016)CrossRef
75.
Zurück zum Zitat K. Munir, E. Zahoor, R. Rahim, X. Lagrange, J.H. Lee, Secure and fault-tolerant distributed location management for Intelligent 5G wireless networks. IEEE Access. 6, 18117–18127 (2018)CrossRef K. Munir, E. Zahoor, R. Rahim, X. Lagrange, J.H. Lee, Secure and fault-tolerant distributed location management for Intelligent 5G wireless networks. IEEE Access. 6, 18117–18127 (2018)CrossRef
76.
Zurück zum Zitat V. Sharma, I. You, F. Palmieri, D.N. Jayakody, J. Li, Secure and energy-efficient handover in fog networks using blockchain-based DMM. IEEE Commun. Mag. 56(5), 22–31 (2018)CrossRef V. Sharma, I. You, F. Palmieri, D.N. Jayakody, J. Li, Secure and energy-efficient handover in fog networks using blockchain-based DMM. IEEE Commun. Mag. 56(5), 22–31 (2018)CrossRef
77.
Zurück zum Zitat A. Prasad, P. Lundén, M. Moisio, M.A. Uusitalo, Z. Li, Efficient mobility and traffic management for delay tolerant cloud data in 5G networks. In PIMRC 2015 Aug 30 (pp. 1740–1745) A. Prasad, P. Lundén, M. Moisio, M.A. Uusitalo, Z. Li, Efficient mobility and traffic management for delay tolerant cloud data in 5G networks. In PIMRC 2015 Aug 30 (pp. 1740–1745)
78.
Zurück zum Zitat R. Kantola, J. Llorente Santos, N. Beijar, Policy-based communications for 5G mobile with customer edge switching. Secur. Commun. Netw. 9(16), 3070–3082 (2016)CrossRef R. Kantola, J. Llorente Santos, N. Beijar, Policy-based communications for 5G mobile with customer edge switching. Secur. Commun. Netw. 9(16), 3070–3082 (2016)CrossRef
79.
Zurück zum Zitat M. Kantor, T. Engel, G. Ormazabal, A policy-based per-flow mobility management system design. In Proceedings of the Principles, Systems and Applications on IP Telecommunications 2015 Oct 6 (pp. 35–42). ACM M. Kantor, T. Engel, G. Ormazabal, A policy-based per-flow mobility management system design. In Proceedings of the Principles, Systems and Applications on IP Telecommunications 2015 Oct 6 (pp. 35–42). ACM
80.
Zurück zum Zitat A. Compagno, X. Zeng, L. Muscariello, G. Carofiglio, J. Auge, Secure producer mobility in information-centric network. In Proceedings of the 4th ACM Conference on Information-Centric Networking 2017 Sep 26 (pp. 163–169). ACM A. Compagno, X. Zeng, L. Muscariello, G. Carofiglio, J. Auge, Secure producer mobility in information-centric network. In Proceedings of the 4th ACM Conference on Information-Centric Networking 2017 Sep 26 (pp. 163–169). ACM
81.
Zurück zum Zitat J. Guan, Z. Wei, I. You, GRBC-based network security functions placement scheme in SDS for 5G security. J. Netw. Comput. Appl. 114, 48–56 (2018)CrossRef J. Guan, Z. Wei, I. You, GRBC-based network security functions placement scheme in SDS for 5G security. J. Netw. Comput. Appl. 114, 48–56 (2018)CrossRef
82.
Zurück zum Zitat Y. Jung, E. Festijo, M. Peradilla, Joint operation of routing control and group key management for 5G ad hoc D2D networks. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on 2014 May 11 (pp. 1–8). IEEE Y. Jung, E. Festijo, M. Peradilla, Joint operation of routing control and group key management for 5G ad hoc D2D networks. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on 2014 May 11 (pp. 1–8). IEEE
83.
Zurück zum Zitat M. Wang, Z. Yan, Security in D2D communications: a review. In Trustcom/BigDataSE/ISPA, 2015 IEEE 2015 Aug 20 (Vol. 1, pp. 1199–1204). IEEE M. Wang, Z. Yan, Security in D2D communications: a review. In Trustcom/BigDataSE/ISPA, 2015 IEEE 2015 Aug 20 (Vol. 1, pp. 1199–1204). IEEE
84.
Zurück zum Zitat V.K. Choyi, A. Abdel-Hamid, Y. Shah, S. Ferdi, A. Brusilovsky, Network slice selection, assignment and routing within 5G Networks. In Standards for Communications and Networking (CSCN), 2016 IEEE Conference on 2016 Oct 31 (pp. 1–7). IEEE V.K. Choyi, A. Abdel-Hamid, Y. Shah, S. Ferdi, A. Brusilovsky, Network slice selection, assignment and routing within 5G Networks. In Standards for Communications and Networking (CSCN), 2016 IEEE Conference on 2016 Oct 31 (pp. 1–7). IEEE
85.
Zurück zum Zitat I.F. Naqvi, A.K. Siddiqui, A. Farooq, IPv6 adoption rate and performance in the 5G wireless internets. In Region 10 Conference (TENCON), 2016 IEEE 2016 Nov 22 (pp. 3850–3858). IEEE I.F. Naqvi, A.K. Siddiqui, A. Farooq, IPv6 adoption rate and performance in the 5G wireless internets. In Region 10 Conference (TENCON), 2016 IEEE 2016 Nov 22 (pp. 3850–3858). IEEE
86.
Zurück zum Zitat M. Schmittner, A. Asadi, M. Hollick, SEMUD: secure multi-hop device-to-device communication for 5G public safety networks. In IFIP Networking Conference (IFIP Networking) and Workshops, 2017 2017 Jun 12 (pp. 1–9). IEEE M. Schmittner, A. Asadi, M. Hollick, SEMUD: secure multi-hop device-to-device communication for 5G public safety networks. In IFIP Networking Conference (IFIP Networking) and Workshops, 2017 2017 Jun 12 (pp. 1–9). IEEE
87.
Zurück zum Zitat Y. Zhao, G. Li, W. Qu, A novel cluster-based ultra-dense network technique for 5G and its security issues. In Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence & Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2017 IEEE 15th Intl 2017 Nov 6 (pp. 362–367). IEEE Y. Zhao, G. Li, W. Qu, A novel cluster-based ultra-dense network technique for 5G and its security issues. In Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence & Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2017 IEEE 15th Intl 2017 Nov 6 (pp. 362–367). IEEE
88.
Zurück zum Zitat S. Othmen, F. Zarai, A. Belghith, L. Kamoun, Secure Routing Protocol based on Weil Paring for Multi-hop Cellular Network (SRP-MCN). IJCSNS 16(6), 117 (2016) S. Othmen, F. Zarai, A. Belghith, L. Kamoun, Secure Routing Protocol based on Weil Paring for Multi-hop Cellular Network (SRP-MCN). IJCSNS 16(6), 117 (2016)
89.
Zurück zum Zitat G. Gomez, F.J. Martin-Vega, F.J. Lopez-Martinez, Y. Liu, M. Elkashlan, Uplink NOMA in large-scale systems: coverage and physical layer security. arXiv preprint arXiv:1709.04693 (2017) G. Gomez, F.J. Martin-Vega, F.J. Lopez-Martinez, Y. Liu, M. Elkashlan, Uplink NOMA in large-scale systems: coverage and physical layer security. arXiv preprint arXiv:1709.04693 (2017)
90.
Zurück zum Zitat M. Forouzesh, P. Azmi, N. Mokari, K.K. Wong, Robust physical layer security for power domain non-orthogonal multiple access-based HetNets and HUDNs, SIC avoidance at eavesdroppers. arXiv preprint arXiv:1806.02013 (2018) M. Forouzesh, P. Azmi, N. Mokari, K.K. Wong, Robust physical layer security for power domain non-orthogonal multiple access-based HetNets and HUDNs, SIC avoidance at eavesdroppers. arXiv preprint arXiv:1806.02013 (2018)
91.
Zurück zum Zitat D. Kapetanovic, G. Zheng, F. Rusek, Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks. IEEE Commun. Mag. 53(6), 21–27 (2015)CrossRef D. Kapetanovic, G. Zheng, F. Rusek, Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks. IEEE Commun. Mag. 53(6), 21–27 (2015)CrossRef
92.
Zurück zum Zitat H.M. Wang, T.X. Zheng, J. Yuan, D. Towsley, M.H. Lee, Physical layer security in heterogeneous cellular networks. IEEE Trans. Commun. 64(3), 1204–1219 (2016)CrossRef H.M. Wang, T.X. Zheng, J. Yuan, D. Towsley, M.H. Lee, Physical layer security in heterogeneous cellular networks. IEEE Trans. Commun. 64(3), 1204–1219 (2016)CrossRef
93.
Zurück zum Zitat Z. Qin, Y. Liu, Z. Ding, Y. Gao, M. Elkashlan, Physical layer security for 5G non-orthogonal multiple access in large-scale networks. In Communications (ICC), 2016 IEEE International Conference on 2016 May 22 (pp. 1–6). IEEE Z. Qin, Y. Liu, Z. Ding, Y. Gao, M. Elkashlan, Physical layer security for 5G non-orthogonal multiple access in large-scale networks. In Communications (ICC), 2016 IEEE International Conference on 2016 May 22 (pp. 1–6). IEEE
94.
Zurück zum Zitat Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, L. Hanzo, Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 16(3), 1656–1672 (2017)CrossRef Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, L. Hanzo, Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 16(3), 1656–1672 (2017)CrossRef
95.
Zurück zum Zitat C. Zhang, J. Ge, Z. Xia, H. Du, Graph theory based cooperative transmission for physical-layer security in 5G large-scale wireless relay networks. IEEE Access 5, 21640–21649 (2017)CrossRef C. Zhang, J. Ge, Z. Xia, H. Du, Graph theory based cooperative transmission for physical-layer security in 5G large-scale wireless relay networks. IEEE Access 5, 21640–21649 (2017)CrossRef
96.
Zurück zum Zitat J. Chen, L. Yang, M.S. Alouini, Physical layer security for cooperative NOMA systems. IEEE Trans. Veh. Technol. 67(5), 4645–4649 (2018)CrossRef J. Chen, L. Yang, M.S. Alouini, Physical layer security for cooperative NOMA systems. IEEE Trans. Veh. Technol. 67(5), 4645–4649 (2018)CrossRef
97.
Zurück zum Zitat F. Pan, Y. Jiang, H. Wen, R. Liao, A. Xu, Physical layer security assisted 5G network security. In Vehicular Technology Conference (VTC-Fall), 2017 IEEE 86th 2017 Sep 24 (pp. 1–5). IEEE F. Pan, Y. Jiang, H. Wen, R. Liao, A. Xu, Physical layer security assisted 5G network security. In Vehicular Technology Conference (VTC-Fall), 2017 IEEE 86th 2017 Sep 24 (pp. 1–5). IEEE
98.
Zurück zum Zitat F. Zhu, F. Gao, H. Lin, S. Jin, J. Zhao, G. Qian, Robust beamforming for physical layer security in BDMA massive MIMO. IEEE J. Sel. Areas Commun. 36, 775–787 (2018)CrossRef F. Zhu, F. Gao, H. Lin, S. Jin, J. Zhao, G. Qian, Robust beamforming for physical layer security in BDMA massive MIMO. IEEE J. Sel. Areas Commun. 36, 775–787 (2018)CrossRef
99.
Zurück zum Zitat W.Q. Wang, Z. Zheng, Hybrid MIMO and phased-Array directional modulation for physical layer security in mmWave wireless communications. IEEE J. Sel Areas Commun. 36(7), 1383–1396 (2018) W.Q. Wang, Z. Zheng, Hybrid MIMO and phased-Array directional modulation for physical layer security in mmWave wireless communications. IEEE J. Sel Areas Commun. 36(7), 1383–1396 (2018)
100.
Zurück zum Zitat A. Morgado, K.M. Huq, S. Mumtaz, J. Rodriguez, A survey of 5G technologies: regulatory, standardization and industrial perspectives. Digital Commun. Netw. 4(2), 87–97 (2018)CrossRef A. Morgado, K.M. Huq, S. Mumtaz, J. Rodriguez, A survey of 5G technologies: regulatory, standardization and industrial perspectives. Digital Commun. Netw. 4(2), 87–97 (2018)CrossRef
101.
Zurück zum Zitat J. Cheng, W. Chen, F. Tao, C.L. Lin, Industrial IoT in 5G environment towards smart manufacturing. J. Ind. Inf. Integr. 10, 10–19 (2018) J. Cheng, W. Chen, F. Tao, C.L. Lin, Industrial IoT in 5G environment towards smart manufacturing. J. Ind. Inf. Integr. 10, 10–19 (2018)
102.
Zurück zum Zitat I. Mavromatis, A. Tassi, G. Rigazzi, R.J. Piechocki, A. Nix, Multi-radio 5G architecture for connected and autonomous vehicles: application and design insights. arXiv preprint arXiv:1801.09510 (2018) I. Mavromatis, A. Tassi, G. Rigazzi, R.J. Piechocki, A. Nix, Multi-radio 5G architecture for connected and autonomous vehicles: application and design insights. arXiv preprint arXiv:1801.09510 (2018)
103.
Zurück zum Zitat P.K. Agyapong, M. Iwamura, D. Staehle, W. Kiess, A. Benjebbour, Design considerations for a 5G network architecture. IEEE Commun. Mag. 52(11), 65–75 (2014)CrossRef P.K. Agyapong, M. Iwamura, D. Staehle, W. Kiess, A. Benjebbour, Design considerations for a 5G network architecture. IEEE Commun. Mag. 52(11), 65–75 (2014)CrossRef
104.
Zurück zum Zitat Q. Han, S. Liang, H. Zhang, Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world. IEEE Netw. 29(2), 40–45 (2015)CrossRef Q. Han, S. Liang, H. Zhang, Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world. IEEE Netw. 29(2), 40–45 (2015)CrossRef
105.
Zurück zum Zitat M.A. Lema, A. Laya, T. Mahmoodi, M. Cuevas, J. Sachs, J. Markendahl, M. Dohler, Business case and technology analysis for 5g low latency applications. IEEE Access 5, 5917–5935 (2017) M.A. Lema, A. Laya, T. Mahmoodi, M. Cuevas, J. Sachs, J. Markendahl, M. Dohler, Business case and technology analysis for 5g low latency applications. IEEE Access 5, 5917–5935 (2017)
106.
Zurück zum Zitat F.B. Saghezchi, G. Mantas, J. Ribeiro, M. Al-Rawi, S. Mumtaz, J. Rodriguez, Towards a secure network architecture for smart grids in 5G era. In Wireless Communications and Mobile Computing Conference (IWCMC), 2017 13th International 2017 Jun 26 (pp. 121–126). IEEE F.B. Saghezchi, G. Mantas, J. Ribeiro, M. Al-Rawi, S. Mumtaz, J. Rodriguez, Towards a secure network architecture for smart grids in 5G era. In Wireless Communications and Mobile Computing Conference (IWCMC), 2017 13th International 2017 Jun 26 (pp. 121–126). IEEE
107.
Zurück zum Zitat G. Arfaoui, P. Bisson, R. Blom, R. Borgaonkar, H. Englund, E. Félix, F. Klaedtke, P.K. Nakarmi, M. Näslund, P. O’Hanlon, J. Papay, A security architecture for 5G networks. IEEE Access 6, 22466–22479 (2018)CrossRef G. Arfaoui, P. Bisson, R. Blom, R. Borgaonkar, H. Englund, E. Félix, F. Klaedtke, P.K. Nakarmi, M. Näslund, P. O’Hanlon, J. Papay, A security architecture for 5G networks. IEEE Access 6, 22466–22479 (2018)CrossRef
108.
Zurück zum Zitat J. Santos, T. Wauters, B. Volckaert, F. DeTurck, Fog computing: Enabling the management and orchestration of smart city applications in 5g networks. Entropy 20(1), 4 (2017)CrossRef J. Santos, T. Wauters, B. Volckaert, F. DeTurck, Fog computing: Enabling the management and orchestration of smart city applications in 5g networks. Entropy 20(1), 4 (2017)CrossRef
109.
Zurück zum Zitat A.H. Celdrán, M.G. Pérez, F.J. Clemente, G.M. Pérez, Towards the autonomous provision of self-protection capabilities in 5G networks. J. Ambient. Intell. Humaniz. Comput. 2018, 1–4 A.H. Celdrán, M.G. Pérez, F.J. Clemente, G.M. Pérez, Towards the autonomous provision of self-protection capabilities in 5G networks. J. Ambient. Intell. Humaniz. Comput. 2018, 1–4
110.
Zurück zum Zitat J. Santos, P. Leroux, T. Wauters, B. Volckaert, F. De Turck, Anomaly detection for Smart City applications over 5G low power wide area networks. In NOMS 2018–2018 IEEE/IFIP Network Operations and Management Symposium 2018 Apr 23. IEEE J. Santos, P. Leroux, T. Wauters, B. Volckaert, F. De Turck, Anomaly detection for Smart City applications over 5G low power wide area networks. In NOMS 2018–2018 IEEE/IFIP Network Operations and Management Symposium 2018 Apr 23. IEEE
111.
Zurück zum Zitat M. Lichtman, R.M. Rao, V. Marojevic, J.H. Reed, R.P. Jover, 5G NR jamming, spoofing, and sniffing: threat assessment and mitigation. arXiv preprint arXiv:1803.03845 (2018) M. Lichtman, R.M. Rao, V. Marojevic, J.H. Reed, R.P. Jover, 5G NR jamming, spoofing, and sniffing: threat assessment and mitigation. arXiv preprint arXiv:1803.03845 (2018)
112.
Zurück zum Zitat P. Schneider, G. Horn, Towards 5G security. In Trustcom/BigDataSE/ISPA, 2015 IEEE 2015 Aug 20 (Vol. 1, pp. 1165–1170). IEEE P. Schneider, G. Horn, Towards 5G security. In Trustcom/BigDataSE/ISPA, 2015 IEEE 2015 Aug 20 (Vol. 1, pp. 1165–1170). IEEE
113.
Zurück zum Zitat S. Luo, J. Wu, J. Li, L. Guo, B. Pei, Toward vulnerability assessment for 5G mobile communication networks. In Smart City/SocialCom/SustainCom (SmartCity), 2015 IEEE International Conference on 2015 Dec 19 (pp. 72–76). IEEE S. Luo, J. Wu, J. Li, L. Guo, B. Pei, Toward vulnerability assessment for 5G mobile communication networks. In Smart City/SocialCom/SustainCom (SmartCity), 2015 IEEE International Conference on 2015 Dec 19 (pp. 72–76). IEEE
114.
Zurück zum Zitat A. Mohseni-Ejiyeh, M. Ashouri-Talouki, SeVR+: Secure and privacy-aware cloud-assisted video reporting service for 5G vehicular networks. In Electrical Engineering (ICEE), 2017 Iranian Conference on 2017 May 2 (pp. 2159–2164). IEEE A. Mohseni-Ejiyeh, M. Ashouri-Talouki, SeVR+: Secure and privacy-aware cloud-assisted video reporting service for 5G vehicular networks. In Electrical Engineering (ICEE), 2017 Iranian Conference on 2017 May 2 (pp. 2159–2164). IEEE
115.
Zurück zum Zitat C. Bouras, A. Kollia, A. Papazois, Teaching network security in mobile 5G using ONOS SDN controller. In Ubiquitous and Future Networks (ICUFN), 2017 Ninth International Conference on 2017 Jul 4 (pp. 465–470). IEEE C. Bouras, A. Kollia, A. Papazois, Teaching network security in mobile 5G using ONOS SDN controller. In Ubiquitous and Future Networks (ICUFN), 2017 Ninth International Conference on 2017 Jul 4 (pp. 465–470). IEEE
116.
Zurück zum Zitat G. Mantas, N. Komninos, J. Rodriuez, E. Logota, H. Marques, in Fundamentals of 5G mobile networks, ed. J. Rodriguez. Security for 5G communications (John Wiley & Sons, Ltd.), p. 207–220. ISBN 9781118867464 G. Mantas, N. Komninos, J. Rodriuez, E. Logota, H. Marques, in Fundamentals of 5G mobile networks, ed. J. Rodriguez. Security for 5G communications (John Wiley & Sons, Ltd.), p. 207–220. ISBN 9781118867464
117.
Zurück zum Zitat M. Svensson, N. Paladi, R. Giustolisi, 5G: Towards Secure Ubiquitous Connectivity Beyond 2020, Kista (Sweden: Swedish Institute of Computer Science, 2015), p. 24. SICS Technical Report, ISSN 1100-3154; 2015:08. M. Svensson, N. Paladi, R. Giustolisi, 5G: Towards Secure Ubiquitous Connectivity Beyond 2020, Kista (Sweden: Swedish Institute of Computer Science, 2015), p. 24. SICS Technical Report, ISSN 1100-3154; 2015:08.
118.
Zurück zum Zitat A. Gupta, R.K. Jha, S. Jain, Attack modeling and intrusion detection system for 5G wireless communication network. Int. J. Commun. Syst. 30(10), e3237 (2017)CrossRef A. Gupta, R.K. Jha, S. Jain, Attack modeling and intrusion detection system for 5G wireless communication network. Int. J. Commun. Syst. 30(10), e3237 (2017)CrossRef
119.
Zurück zum Zitat I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, A. Gurtov, 5G security: analysis of threats and solutions. In Standards for Communications and Networking (CSCN), 2017 IEEE Conference on 2017 Sep 18 (pp. 193–199). IEEE I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, A. Gurtov, 5G security: analysis of threats and solutions. In Standards for Communications and Networking (CSCN), 2017 IEEE Conference on 2017 Sep 18 (pp. 193–199). IEEE
121.
Zurück zum Zitat C. Felita, M. Suryanegara, 5G key technologies: identifying innovation opportunity. In QiR (Quality in Research), 2013 International Conference on 2013 Jun 25 (pp. 235–238). IEEE C. Felita, M. Suryanegara, 5G key technologies: identifying innovation opportunity. In QiR (Quality in Research), 2013 International Conference on 2013 Jun 25 (pp. 235–238). IEEE
122.
Zurück zum Zitat N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, M. Di Renzo, Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20–27 (2015)CrossRef N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, M. Di Renzo, Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20–27 (2015)CrossRef
123.
Zurück zum Zitat L. Sun, Q. Du, Physical layer security with its applications in 5G networks: a review. China Commun. 14(12), 1–4 (2017)CrossRef L. Sun, Q. Du, Physical layer security with its applications in 5G networks: a review. China Commun. 14(12), 1–4 (2017)CrossRef
124.
Zurück zum Zitat K. Gai, M. Qiu, L. Tao, Y. Zhu, Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Secur. Commun Netw. 9(16), 3049–3058 (2016)CrossRef K. Gai, M. Qiu, L. Tao, Y. Zhu, Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Secur. Commun Netw. 9(16), 3049–3058 (2016)CrossRef
125.
Zurück zum Zitat R. Atat, L. Liu, H. Chen, J. Wu, H. Li, Y. Yi, Enabling cyber-physical communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-security. IET Cyber-Phys. Syst. Theor. Appl. 2(1), 49–54 (2017)CrossRef R. Atat, L. Liu, H. Chen, J. Wu, H. Li, Y. Yi, Enabling cyber-physical communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-security. IET Cyber-Phys. Syst. Theor. Appl. 2(1), 49–54 (2017)CrossRef
126.
Zurück zum Zitat O. Mämmelä, J. Hiltunen, J. Suomalainen, K. Ahola, P. Mannersalo, J. Vehkaperä, Towards micro-segmentation in 5G network security. In European Conference on Networks and Communications (EuCNC 2016) Workshop on Network Management, Quality of Service and Security for 5G Networks 2016 Jun O. Mämmelä, J. Hiltunen, J. Suomalainen, K. Ahola, P. Mannersalo, J. Vehkaperä, Towards micro-segmentation in 5G network security. In European Conference on Networks and Communications (EuCNC 2016) Workshop on Network Management, Quality of Service and Security for 5G Networks 2016 Jun
127.
Zurück zum Zitat P. Gandotra, R.K. Jha, A survey on green communication and security challenges in 5G wireless communication networks. J. Netw. Comput. Appl. 96, 39–61 (2017)CrossRef P. Gandotra, R.K. Jha, A survey on green communication and security challenges in 5G wireless communication networks. J. Netw. Comput. Appl. 96, 39–61 (2017)CrossRef
128.
Zurück zum Zitat A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: the case study of a smart home. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on 2017 Mar 13 (pp. 618–623). IEEE A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: the case study of a smart home. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on 2017 Mar 13 (pp. 618–623). IEEE
129.
Zurück zum Zitat T. Gupta, G. Choudhary, V. Sharma, A survey on the security of Pervasive Online Social Networks (POSNs). arXiv preprint arXiv:1806.07526 (2018) T. Gupta, G. Choudhary, V. Sharma, A survey on the security of Pervasive Online Social Networks (POSNs). arXiv preprint arXiv:1806.07526 (2018)
130.
Zurück zum Zitat J.A. Oravec, Emerging “cyber hygiene” practices for the Internet of Things (IoT): professional issues in consulting clients and educating users on IoT privacy and security. In Professional Communication Conference (ProComm), 2017 IEEE International 2017 Jul 23 (pp. 1–5). IEEE J.A. Oravec, Emerging “cyber hygiene” practices for the Internet of Things (IoT): professional issues in consulting clients and educating users on IoT privacy and security. In Professional Communication Conference (ProComm), 2017 IEEE International 2017 Jul 23 (pp. 1–5). IEEE
131.
Zurück zum Zitat A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, LSB: a lightweight scalable BlockChain for IoT security and privacy. arXiv preprint arXiv:1712.02969 (2017) A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, LSB: a lightweight scalable BlockChain for IoT security and privacy. arXiv preprint arXiv:1712.02969 (2017)
132.
Zurück zum Zitat V. Sharma, R. Kumar, W.H. Cheng, M. Atiquzzaman, K. Srinivasan, A. Zomaya, NHAD: Neuro-fuzzy based Horizontal Anomaly Detection in online social networks. IEEE Trans. Knowl. Data Eng. 30, 2171–2184 (2018) V. Sharma, R. Kumar, W.H. Cheng, M. Atiquzzaman, K. Srinivasan, A. Zomaya, NHAD: Neuro-fuzzy based Horizontal Anomaly Detection in online social networks. IEEE Trans. Knowl. Data Eng. 30, 2171–2184 (2018)
133.
Zurück zum Zitat V. Sharma, J. Kum, S. Kwon, I. You, F.-Y. Leu, An overview of 802.21a-2012 and its incorporation into IoT-Fog networks using osmotic framework. In IoTaaS 2017 – 3rd EAI International Conference on IoT as a Service, vol. 3, pp. 1–6. EAI, Sept. 2017 V. Sharma, J. Kum, S. Kwon, I. You, F.-Y. Leu, An overview of 802.21a-2012 and its incorporation into IoT-Fog networks using osmotic framework. In IoTaaS 2017 – 3rd EAI International Conference on IoT as a Service, vol. 3, pp. 1–6. EAI, Sept. 2017
134.
Zurück zum Zitat I. You, S. Kwon, G. Choudhary, V. Sharma, J.T. Seo, An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors (Basel, Switzerland) 18(6), 1888 (2018)CrossRef I. You, S. Kwon, G. Choudhary, V. Sharma, J.T. Seo, An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors (Basel, Switzerland) 18(6), 1888 (2018)CrossRef
135.
Zurück zum Zitat M.A. Khan, K. Salah, IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)CrossRef M.A. Khan, K. Salah, IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)CrossRef
136.
Zurück zum Zitat B. Baranidharan, Internet of Things (IoT) technologies, architecture, protocols, security, and applications: a survey, in In Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science, (IGI Global, 2018), pp. 149–174 B. Baranidharan, Internet of Things (IoT) technologies, architecture, protocols, security, and applications: a survey, in In Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science, (IGI Global, 2018), pp. 149–174
137.
Zurück zum Zitat V. Sharma, J. Kim, S. Kwon, I. You, K. Lee, K. Yim, A framework for mitigating zero-day attacks in IoT. arXiv preprint arXiv:1804.05549 (2018) In: Conference on Information Security and Cryptography (CISC-S’17) (South Korea, 2017), pp. 1–6 V. Sharma, J. Kim, S. Kwon, I. You, K. Lee, K. Yim, A framework for mitigating zero-day attacks in IoT. arXiv preprint arXiv:1804.05549 (2018) In: Conference on Information Security and Cryptography (CISC-S’17) (South Korea, 2017), pp. 1–6
138.
Zurück zum Zitat V. Sharma, J. Kum, S. Kwon, I. You, F.-Y. Leu, Fuzzy-based protocol for secure remote diagnosis of IoT devices in 5g networks. In IoTaaS 2017 – 3rd EAI International Conference on IoT as a Service, vol. 3, pp. 1–6. EAI, Taiwan, Sept. 2017 V. Sharma, J. Kum, S. Kwon, I. You, F.-Y. Leu, Fuzzy-based protocol for secure remote diagnosis of IoT devices in 5g networks. In IoTaaS 2017 – 3rd EAI International Conference on IoT as a Service, vol. 3, pp. 1–6. EAI, Taiwan, Sept. 2017
139.
Zurück zum Zitat J. Ni, X. Lin, X.S. Shen, Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun. 36(3), 644–657 (2018)CrossRef J. Ni, X. Lin, X.S. Shen, Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun. 36(3), 644–657 (2018)CrossRef
Metadaten
Titel
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
verfasst von
Gaurav Choudhary
Vishal Sharma
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-03508-2_3

Neuer Inhalt