Novel Protocols to Mitigate Network Slice Topology Learning Attacks and Protect Privacy of Users’ Service Access Behavior in Softwarized 5G Networks
IEEE Transactions on Dependable and Secure Computing(2021)
摘要
In the softwarized fifth generation (5G) networks, authentication protocols are deployed by both the mobile network operators and the third-party service providers to enable secure slice formation at the network side and user validation at the service provider side, respectively. However, the usage of static key-based authentication protocols in 5G networks gives rise to two major problems: (i) ne...
更多查看译文
关键词
Protocols,Authentication,Privacy,5G mobile communication,Topology,Network topology,Peer-to-peer computing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络