Novel Protocols to Mitigate Network Slice Topology Learning Attacks and Protect Privacy of Users’ Service Access Behavior in Softwarized 5G Networks

IEEE Transactions on Dependable and Secure Computing(2021)

引用 16|浏览20
暂无评分
摘要
In the softwarized fifth generation (5G) networks, authentication protocols are deployed by both the mobile network operators and the third-party service providers to enable secure slice formation at the network side and user validation at the service provider side, respectively. However, the usage of static key-based authentication protocols in 5G networks gives rise to two major problems: (i) ne...
更多
查看译文
关键词
Protocols,Authentication,Privacy,5G mobile communication,Topology,Network topology,Peer-to-peer computing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要