Overview of Security of Virtual Mobile Networks

07/17/2020
by   Ijaz Ahmad, et al.
0

5G is enabling different services over the same physical infrastructure through the concepts and technologies of virtualization, softwarization, slicing and cloud computing. Virtual Mobile Networks (VMNs), using these concepts, provide an opportunity to share the same physical infrastructure among multiple operators. Each VMN Operator (VMNO) can have own distinct operating and support systems. However, the technologies used to enable VMNs have their own explicit security challenges and solutions. The integrated environment built upon virtualization, softwarization, and cloudification, thus, will have complex security requirements and implications. In this vain, this article provides an overview of the security challenges and potential solutions for VMNs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/30/2018

Towards Efficient Dynamic Virtual Network Embedding Strategy for Cloud IoT Networks

Network Virtualization is one of the most promising technologies for fut...
research
11/16/2021

Moving the Network to the Cloud: the Cloud Central Office Revolution and its Implications for the Optical Layer

SDN and NFV have recently changed the way we operate networks. By decoup...
research
09/25/2020

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

National disasters can threaten national security and require several or...
research
09/06/2019

The Disruptions of 5G on Data-driven Technologies and Applications

With 5G on the verge of being adopted as the next mobile network, there ...
research
03/25/2017

Smart Spaces: Challenges and Opportunities of BLE-Centered Mobile Systems for Public Environments

The application of mobile computing is currently altering patterns of ou...
research
04/15/2020

An efficient deception architecture for cloud-based virtual networks

Emerging deceptive systems present a new promise for the uprising securi...
research
07/29/2018

Virtualization Technologies and Cloud Security: advantages, issues, and perspectives

Virtualization technologies allow multiple tenants to share physical res...

Please sign up or login with your details

Forgot password? Click here to reset