Overview of Security of Virtual Mobile Networks

07/17/2020
by   Ijaz Ahmad, et al.
0

5G is enabling different services over the same physical infrastructure through the concepts and technologies of virtualization, softwarization, slicing and cloud computing. Virtual Mobile Networks (VMNs), using these concepts, provide an opportunity to share the same physical infrastructure among multiple operators. Each VMN Operator (VMNO) can have own distinct operating and support systems. However, the technologies used to enable VMNs have their own explicit security challenges and solutions. The integrated environment built upon virtualization, softwarization, and cloudification, thus, will have complex security requirements and implications. In this vain, this article provides an overview of the security challenges and potential solutions for VMNs.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

01/30/2018

Towards Efficient Dynamic Virtual Network Embedding Strategy for Cloud IoT Networks

Network Virtualization is one of the most promising technologies for fut...
11/16/2021

Moving the Network to the Cloud: the Cloud Central Office Revolution and its Implications for the Optical Layer

SDN and NFV have recently changed the way we operate networks. By decoup...
09/25/2020

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

National disasters can threaten national security and require several or...
09/06/2019

The Disruptions of 5G on Data-driven Technologies and Applications

With 5G on the verge of being adopted as the next mobile network, there ...
03/25/2017

Smart Spaces: Challenges and Opportunities of BLE-Centered Mobile Systems for Public Environments

The application of mobile computing is currently altering patterns of ou...
04/15/2020

An efficient deception architecture for cloud-based virtual networks

Emerging deceptive systems present a new promise for the uprising securi...
05/30/2019

The Security Implications of Data Subject Rights

Data protection regulations give individuals rights to obtain the inform...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.