5G-Core Network Security

Research output: Chapter in Book/Report/Conference proceedingChapter or book articleScientificpeer-review

Abstract

The emergence of new services in 5G has necessitated a paradigm shift in the core network, as compared to 4G. New disruptive technological concepts such as softwarized and virtualized network functions, and multi‐access edge computing have been used in the core network. Thus, network function virtualization (NFV), software‐defined networking (SDN) and mobile edge computing have brought dynamicity and elasticity into the core network. Albeit the benefits, these technologies also bring their own limitations into the core network. Security challenges, for instance, constitute one such challenge dimension that need proper investigation into the loopholes existing in these technologies, and thus seek solution to those challenges. In this article, we discuss the security of 5G core network. The potential security challenges and possible solutions for the core network as a whole, and its key functions and technologies are discussed in this article.
Original languageEnglish
Title of host publicationWiley 5G Ref
Subtitle of host publicationThe Essential 5G Reference Online
EditorsRahim Tafazolli, Chin-Liang Wang, Periklis Chatzimisios
PublisherWiley-Blackwell
Number of pages19
ISBN (Print)978-1-119-47150-9
DOIs
Publication statusPublished - 29 Dec 2019
MoE publication typeA3 Part of a book or another research book

Fingerprint Dive into the research topics of '5G-Core Network Security'. Together they form a unique fingerprint.

Cite this