![]() ![]() In particular, 5G standards will address network management challenges and ease the deployment of secure services over complex multi-domain, multi-operator, and multi-technology networking environments. Fifth generation systems exploit software networking and network virtualization technologies to enable new stakeholders such as virtual operators, infrastructure providers, or third-party service providers to cooperate more easily and create end-to-end services. ![]() In the future, 5G standards will support heterogeneous access methods with high-speed, low-latency, and high-availability, and optimize mobile networks, e.g., for safety-critical (traffic, ehealth) and massive-scale (Internet of things-IoT) applications. We explore the security characteristics of data flows in software networks dedicated to different applications with a mobile network testbed.įifth generation (5G) standards are opening mobile networks to new kinds of applications, devices, and business actors. We describe scenarios where the correlation of multi-domain information improves the accuracy of security measures with respect to two threats: end-user location tracking and Internet of things (IoT) authentication storms. We present an approach for sharing security measurements across administrative domains. The framework leverages software-defined networking and big data technologies to customize monitoring for different applications. We describe a novel framework and enablers for security monitoring, inferencing, and trust measuring. However, solutions are needed to enable users, operators, and service providers to gain an up-to-date awareness of the security and trustworthiness of 5G systems. Emerging virtualization and softwarization technologies enable more flexible customization of network services and facilitate cooperation between different actors. Fifth generation (5G) technologies will boost the capacity and ease the management of mobile networks.
0 Comments
Leave a Reply. |