Policy-Based Security Management System for 5G Heterogeneous Networks

被引:5
|
作者
Alquhayz, Hani [1 ]
Alalwan, Nasser [2 ]
Alzahrani, Ahmed Ibrahim [2 ]
Al-Bayatti, Ali H. [3 ]
Sharif, Mhd Saeed [4 ]
机构
[1] Majmaah Univ, Coll Sci Zulfi, Dept Comp Sci & Informat, Al Majmaah 11952, Saudi Arabia
[2] King Saud Univ, Dept Comp Sci, Community Coll, Riyadh 11437, Saudi Arabia
[3] De Montfort Univ, Sch Comp Sci & Informat, Leicester LE1 9BH, Leics, England
[4] UEL, Sch Architecture Comp & Engn, Univ Way,Dockland Campus, London E16 2RD, England
来源
WIRELESS COMMUNICATIONS & MOBILE COMPUTING | 2019年 / 2019卷
关键词
CHALLENGES;
D O I
10.1155/2019/4582391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in mobile phone technology and the growth of associated networks have been phenomenal over the last decade. Therefore, they have been the focus of much academic research, driven by commercial and end-user demands for increasingly faster technology. The most recent generation of mobile network technology is the fifth generation (5G). 5G networks are expected to launch across the world by 2020 and to work with existing 3G and 4G technologies to provide extreme speed despite being limited to wireless technologies. An alternative network, Y-Communication (Y-Comm), proposes to integrate the current wired and wireless networks, attempting to achieve the main service requirements of 5G by converging the existing networks and providing an improved service anywhere at any time. Quality of service (QoS), vertical handover, and security are some of the technical concerns resulting from this heterogeneity. In addition, it is believed that the Y-Comm convergence will have a greater influence on security than was the case with the previous long-term evolution (LTE) 4G networks and with future 5G networks. The purpose of this research is to satisfy the security recommendations for 5G mobile networks. This research provides a policy-based security management system, ensuring that end-user devices cannot be used as weapons or tools of attack, for example, IP spoofing and man-in-the-middle (MITM) attacks. The results are promising, with a low disconnection rate of less than 4% and 7%. This shows the system to be robust and reliable.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Policy-based mobility management for heterogeneous networks
    Mihovska, Albena
    Luo, Jijun
    Mino, Emilio
    Tragos, Elias
    Mensing, Christian
    Vivier, Guillaume
    Fracchia, Roberta
    2007 PROCEEDINGS OF THE 16TH IST MOBILE AND WIRELESS COMMUNICATIONS, VOLS 1-3, 2007, : 894 - +
  • [2] POSITIF: a policy-based security management system
    Basile, Cataldo
    Lioy, Antonio
    Perez, Gregorio Martinez
    Garcia Clemente, Felix J.
    Skarmeta, Antonio F. Gomez
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 280 - 280
  • [3] SoftSLICE: Policy-based Dynamic Spectrum Slicing in 5G Cellular Networks
    Gebremariam, Anteneh A.
    Chowdhury, Mainak
    Usman, Muhammad
    Goldsmith, Andrea
    Granelli, Fabrizio
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [4] Analysis of Policy-Based Security Management System in Software-Defined Networks
    Sood, Keshav
    Karmakar, Kallol Krishna
    Varadharajan, Vijay
    Tupakula, Uday
    Yu, Shui
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (04) : 612 - 615
  • [5] Policy-based mobility in heterogeneous networks
    Zhang, Ping
    Durresi, Arjan
    Barolli, Leonard
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2013, 4 (03) : 331 - 338
  • [6] Policy-based mobility in heterogeneous networks
    Ping Zhang
    Arjan Durresi
    Leonard Barolli
    Journal of Ambient Intelligence and Humanized Computing, 2013, 4 : 331 - 338
  • [7] Deep Learning for Security Problems in 5G Heterogeneous Networks
    Lv, Zhihan
    Singh, Amit Kumar
    Li, Jinhua
    IEEE NETWORK, 2021, 35 (02): : 67 - 73
  • [8] Smart mobility management in 5G heterogeneous networks
    Omheni, Nouri
    Bouabidi, Imen
    Gharsallah, Amina
    Zarai, Faouzi
    Obaidat, Mohammad S.
    IET NETWORKS, 2018, 7 (03) : 119 - 128
  • [9] Sec-SNMP: Policy-based security management for sensor networks
    Wang, Qinghua
    Zhang, Tingting
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 222 - 226
  • [10] Security checker architecture for policy-based security management
    Tishkov, A
    Kotenko, I
    Sidelnikova, E
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465