5G-Core Network Security

    Research output: Chapter in Book/Report/Conference proceedingChapter or book articleScientificpeer-review

    Abstract

    The emergence of new services in 5G has necessitated a paradigm shift in the core network, as compared to 4G. New disruptive technological concepts such as softwarized and virtualized network functions, and multi‐access edge computing have been used in the core network. Thus, network function virtualization (NFV), software‐defined networking (SDN) and mobile edge computing have brought dynamicity and elasticity into the core network. Albeit the benefits, these technologies also bring their own limitations into the core network. Security challenges, for instance, constitute one such challenge dimension that need proper investigation into the loopholes existing in these technologies, and thus seek solution to those challenges. In this article, we discuss the security of 5G core network. The potential security challenges and possible solutions for the core network as a whole, and its key functions and technologies are discussed in this article.
    Original languageEnglish
    Title of host publicationWiley 5G Ref
    Subtitle of host publicationThe Essential 5G Reference Online
    EditorsRahim Tafazolli, Chin-Liang Wang, Periklis Chatzimisios
    PublisherWiley-Blackwell
    Number of pages19
    ISBN (Print)978-1-119-47150-9
    DOIs
    Publication statusPublished - 29 Dec 2019
    MoE publication typeA3 Part of a book or another research book

    Fingerprint

    Dive into the research topics of '5G-Core Network Security'. Together they form a unique fingerprint.

    Cite this