Matches in SemOpenAlex for { <https://semopenalex.org/work/W4323646099> ?p ?o ?g. }
- W4323646099 abstract "The digital transformation brought on by 5G is redefining current models of end-to-end (E2E) connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights the importance of embedding security capabilities from the very beginning while the 5G architecture is being defined and standardized. Security requirements need to overlay and permeate through the different layers of 5G systems (physical, network, and application) as well as different parts of an E2E 5G architecture within a risk-management framework that takes into account the evolving security-threats landscape. 5G presents a typical use-case of wireless communication and computer networking convergence, where 5G fundamental building blocks include components such as Software Defined Networks (SDN), Network Functions Virtualization (NFV) and the edge cloud. This convergence extends many of the security challenges and opportunities applicable to SDN/NFV and cloud to 5G networks. Thus, 5G security needs to consider additional security requirements (compared to previous generations) such as SDN controller security, hypervisor security, orchestrator security, cloud security, edge security, etc. At the same time, 5G networks offer security improvement opportunities that should be considered. Here, 5G architectural flexibility, programmability and complexity can be harnessed to improve resilience and reliability. The working group scope fundamentally addresses the following: •5G security considerations need to overlay and permeate through the different layers of the 5G systems (physical, network, and application) as well as different parts of an E2E 5G architecture including a risk management framework that takes into account the evolving security threats landscape. •5G exemplifies a use-case of heterogeneous access and computer networking convergence, which extends a unique set of security challenges and opportunities (e.g., related to SDN/NFV and edge cloud, etc.) to 5G networks. Similarly, 5G networks by design offer potential security benefits and opportunities through harnessing the architecture flexibility, programmability and complexity to improve its resilience and reliability. •The IEEE FNI security WG's roadmap framework follows a taxonomic structure, differentiating the 5G functional pillars and corresponding cybersecurity risks. As part of cross collaboration, the security working group will also look into the security issues associated with other roadmap working groups within the IEEE Future Network Initiative." @default.
- W4323646099 created "2023-03-10" @default.
- W4323646099 creator A5001492651 @default.
- W4323646099 creator A5009251259 @default.
- W4323646099 creator A5009541463 @default.
- W4323646099 creator A5011110507 @default.
- W4323646099 creator A5011473915 @default.
- W4323646099 creator A5013263487 @default.
- W4323646099 creator A5014972132 @default.
- W4323646099 creator A5020148516 @default.
- W4323646099 creator A5021448776 @default.
- W4323646099 creator A5026015448 @default.
- W4323646099 creator A5026510927 @default.
- W4323646099 creator A5048629084 @default.
- W4323646099 creator A5053656504 @default.
- W4323646099 creator A5053749805 @default.
- W4323646099 creator A5058357394 @default.
- W4323646099 creator A5060532910 @default.
- W4323646099 creator A5062161664 @default.
- W4323646099 creator A5063614876 @default.
- W4323646099 creator A5068065234 @default.
- W4323646099 creator A5068209807 @default.
- W4323646099 creator A5070800300 @default.
- W4323646099 creator A5070876645 @default.
- W4323646099 creator A5076135193 @default.
- W4323646099 creator A5077986894 @default.
- W4323646099 creator A5078462517 @default.
- W4323646099 creator A5080302208 @default.
- W4323646099 creator A5082465376 @default.
- W4323646099 creator A5087787101 @default.
- W4323646099 creator A5088427890 @default.
- W4323646099 date "2022-10-01" @default.
- W4323646099 modified "2023-10-16" @default.
- W4323646099 title "Security and Privacy" @default.
- W4323646099 cites W2590373591 @default.
- W4323646099 cites W2781284772 @default.
- W4323646099 cites W2944879713 @default.
- W4323646099 cites W2985336933 @default.
- W4323646099 cites W3076696063 @default.
- W4323646099 doi "https://doi.org/10.1109/fnwf55208.2022.00131" @default.
- W4323646099 hasPublicationYear "2022" @default.
- W4323646099 type Work @default.
- W4323646099 citedByCount "0" @default.
- W4323646099 crossrefType "proceedings-article" @default.
- W4323646099 hasAuthorship W4323646099A5001492651 @default.
- W4323646099 hasAuthorship W4323646099A5009251259 @default.
- W4323646099 hasAuthorship W4323646099A5009541463 @default.
- W4323646099 hasAuthorship W4323646099A5011110507 @default.
- W4323646099 hasAuthorship W4323646099A5011473915 @default.
- W4323646099 hasAuthorship W4323646099A5013263487 @default.
- W4323646099 hasAuthorship W4323646099A5014972132 @default.
- W4323646099 hasAuthorship W4323646099A5020148516 @default.
- W4323646099 hasAuthorship W4323646099A5021448776 @default.
- W4323646099 hasAuthorship W4323646099A5026015448 @default.
- W4323646099 hasAuthorship W4323646099A5026510927 @default.
- W4323646099 hasAuthorship W4323646099A5048629084 @default.
- W4323646099 hasAuthorship W4323646099A5053656504 @default.
- W4323646099 hasAuthorship W4323646099A5053749805 @default.
- W4323646099 hasAuthorship W4323646099A5058357394 @default.
- W4323646099 hasAuthorship W4323646099A5060532910 @default.
- W4323646099 hasAuthorship W4323646099A5062161664 @default.
- W4323646099 hasAuthorship W4323646099A5063614876 @default.
- W4323646099 hasAuthorship W4323646099A5068065234 @default.
- W4323646099 hasAuthorship W4323646099A5068209807 @default.
- W4323646099 hasAuthorship W4323646099A5070800300 @default.
- W4323646099 hasAuthorship W4323646099A5070876645 @default.
- W4323646099 hasAuthorship W4323646099A5076135193 @default.
- W4323646099 hasAuthorship W4323646099A5077986894 @default.
- W4323646099 hasAuthorship W4323646099A5078462517 @default.
- W4323646099 hasAuthorship W4323646099A5080302208 @default.
- W4323646099 hasAuthorship W4323646099A5082465376 @default.
- W4323646099 hasAuthorship W4323646099A5087787101 @default.
- W4323646099 hasAuthorship W4323646099A5088427890 @default.
- W4323646099 hasConcept C103377522 @default.
- W4323646099 hasConcept C111919701 @default.
- W4323646099 hasConcept C114869243 @default.
- W4323646099 hasConcept C121822524 @default.
- W4323646099 hasConcept C184842701 @default.
- W4323646099 hasConcept C29983905 @default.
- W4323646099 hasConcept C31258907 @default.
- W4323646099 hasConcept C38652104 @default.
- W4323646099 hasConcept C41008148 @default.
- W4323646099 hasConcept C527648132 @default.
- W4323646099 hasConcept C79974875 @default.
- W4323646099 hasConceptScore W4323646099C103377522 @default.
- W4323646099 hasConceptScore W4323646099C111919701 @default.
- W4323646099 hasConceptScore W4323646099C114869243 @default.
- W4323646099 hasConceptScore W4323646099C121822524 @default.
- W4323646099 hasConceptScore W4323646099C184842701 @default.
- W4323646099 hasConceptScore W4323646099C29983905 @default.
- W4323646099 hasConceptScore W4323646099C31258907 @default.
- W4323646099 hasConceptScore W4323646099C38652104 @default.
- W4323646099 hasConceptScore W4323646099C41008148 @default.
- W4323646099 hasConceptScore W4323646099C527648132 @default.
- W4323646099 hasConceptScore W4323646099C79974875 @default.
- W4323646099 hasLocation W43236460991 @default.
- W4323646099 hasOpenAccess W4323646099 @default.
- W4323646099 hasPrimaryLocation W43236460991 @default.
- W4323646099 hasRelatedWork W1576192870 @default.
- W4323646099 hasRelatedWork W1840370807 @default.