Investigating End-to-End Security in the Fifth Generation Wireless Capabilities and IoT Extensions

被引:6
作者
Uher, J. [1 ]
Harper, J. [1 ]
Mennecke, R. G., III [1 ]
Patton, P. [1 ]
Farroha, B. [2 ]
机构
[1] Johns Hopkins Univ, Appl Phys Lab, Laurel, MD 20723 USA
[2] Dept Def, Lab Telecommun Sci, College Pk, MD 20740 USA
来源
CYBER SENSING 2016 | 2016年 / 9826卷
关键词
5G; IoT; Device-to-Device; enhanced Mobile Broadband; Machine Type Communication; NFV; SDN; TRUST;
D O I
10.1117/12.2229608
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
The emerging 5th generation wireless network will be architected and specified to meet the vision of allowing the billions of devices and millions of human users to share spectrum to communicate and deliver services. The expansion of wireless networks from its current role to serve these diverse communities of interest introduces new paradigms that require multi-tiered approaches. The introduction of inherently low security components, like IoT devices, necessitates that critical data be better secured to protect the networks and users. Moreover high-speed communications that are meant to enable the autonomous vehicles require ultra reliable and low latency paths. This research explores security within the proposed new architectures and the cross interconnection of the highly protected assets with low cost/low security components forming the overarching 5th generation wireless infrastructure.
引用
收藏
页数:16
相关论文
共 15 条
[1]  
Aazam M., 2014 IEEE 9 INT C IN
[2]  
[Anonymous], 2014, NFVSEC001 ETSI GSN
[3]  
[Anonymous], 2015, IEEE 5G C PRINC SEP
[4]  
[Anonymous], 2015, Standard ITU-R M.2083-0
[5]  
[Anonymous], 2007, DISTRIB COMPUT
[6]  
Bilogrevic, SECURITY ISSUES NEXT
[7]  
Cirani S., IOT HUB FOG NODE SEA
[8]  
Kish D., 2015, COMPETITIVE LANDSCAP
[9]  
Nair Karan, OPTIMIZING POWER CON
[10]  
Rohde & Schwarz, IMA252