Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

A survey on emerging SDN and NFV security mechanisms for IoT systems

I Farris, T Taleb, Y Khettab… - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
The explosive rise of Internet of Things (IoT) systems have notably increased the potential
attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices …

NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures

M Pattaranantakul, R He, Q Song… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Network functions virtualization (NFV), along with software-defined networking (SDN), drives
a new change in networking infrastructure with respect to designing, deploying, and …

Service Function Chaining security survey: Addressing security challenges and threats

M Pattaranantakul, C Vorakulpipat, T Takahashi - Computer Networks, 2023 - Elsevier
Abstract Service function chaining (SFC) is a trending paradigm and it has attracted
considerable attention from both the industry and academia because of its potential to …

Map** the VNFs and VLs of a RAN slice onto intelligent PoPs in beyond 5G mobile networks

MA Habibi, FZ Yousaf… - IEEE Open Journal of the …, 2022 - ieeexplore.ieee.org
The map** of a virtual network service onto a physical network infrastructure is a
challenging task due to the joint allocation of virtual resources across nodes and links, the …

From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models

M Compastié, R Badonnel, O Festor, R He - Computers & Security, 2020 - Elsevier
Virtualization methods and techniques play an important role in the development of cloud
infrastructures and their services. They enable the decoupling of virtualized resources from …

Securing configuration management and migration of virtual network functions using blockchain

ID Alvarenga, GAF Rebello… - NOMS 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
The integration of network function visualization (NFV) and service function chaining (SFC)
adds intelligence to the core of the network. The programmability of the network core …

Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security

AK Alnaim - International Journal of Information Security, 2024 - Springer
Abstract 5G, the current generation of communication networks is based on the standards
defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define …

Leveraging network functions virtualization orchestrators to achieve software-defined access control in the clouds

M Pattaranantakul, R He, Z Zhang… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Network Functions Virtualization (NFV) has been widely recognized as an effective way to
implement and consolidate hardware-based network functions by using software-based …