102 research outputs found

    A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

    Full text link
    The 5G networks have the capability to provide high compatibility for the new applications, industries, and business models. These networks can tremendously improve the quality of life by enabling various use cases that require high data-rate, low latency, and continuous connectivity for applications pertaining to eHealth, automatic vehicles, smart cities, smart grid, and the Internet of Things (IoT). However, these applications need secure servicing as well as resource policing for effective network formations. There have been a lot of studies, which emphasized the security aspects of 5G networks while focusing only on the adaptability features of these networks. However, there is a gap in the literature which particularly needs to follow recent computing paradigms as alternative mechanisms for the enhancement of security. To cover this, a detailed description of the security for the 5G networks is presented in this article along with the discussions on the evolution of osmotic and catalytic computing-based security modules. The taxonomy on the basis of security requirements is presented, which also includes the comparison of the existing state-of-the-art solutions. This article also provides a security model, "CATMOSIS", which idealizes the incorporation of security features on the basis of catalytic and osmotic computing in the 5G networks. Finally, various security challenges and open issues are discussed to emphasize the works to follow in this direction of research.Comment: 34 pages, 7 tables, 7 figures, Published In 5G Enabled Secure Wireless Networks, pp. 69-102. Springer, Cham, 201

    Security management for backhaul-aware 5G-V2X

    Full text link
    Security is a primary concern for the networks aiming at the utilization of Cellular (C) services for connecting Vehicles to Everything (V2X). At present, C-V2X is observing a paradigm shift from Long Term Evolution (LTE) - Evolved Universal Terrestrial Radio Access Network (E-UTRAN) to Fifth Generation (5G) based functional architecture. However, security and credential management are still concerns to be resolved under 5G-V2X. A sizably voluminous number of key updates and non-availability of sub-functions at the edge cause adscititious overheads and decrement the performance while alarming the possibilities of variants of cyber attacks. In this paper, security management is studied as a principle of sustainability and its tradeoff is evaluated with the number of key-updates required to maintain an authenticated connection of a vehicle to the 5G-terminals keeping intact the security functions at the backhaul. A numerical study is presented to determine the claims and understand the proposed tradeoff.Comment: 4 pages, 3 figures, 1 table, Conference on Information Security and Cryptography-Winter (CISC-W), December 8, 2018, Seoul, South Kore

    A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future

    Get PDF
    End-user privacy in mobile telephony systems is nowadays of great interest because of the envisaged hyper-connectivity and the potential of the unprecedented services (virtual reality, machine-type communication, vehicle-to-everything, IoT, etc.) being offered by the new 5G system. This paper reviews the state of subscription privacy in 5G systems. As the work on 5G Release 15 -- the first full set of 5G standards -- has recently been completed, this seems to be an appropriate occasion for such a review. The scope of the privacy study undertaken is limited to the wireless part of the 5G system which occurs between the service provider\u27s base station and the subscriber\u27s mobile phone. Although 5G offers better privacy guarantees than its predecessors, this work highlights that there still remain significant issues which need rectifying. We undertook an endeavor to (i) compile the privacy vulnerabilities that already existed in the previous mobile telephony generations. Thereafter, (ii) the privacy improvements offered by the recently finalized 5G standard were aggregated. Consequently, (iii) we were able to highlight privacy issues from previous generations that remain unresolved in 5G Release 15. For completeness, (iv) we also explore new privacy attacks which surfaced after the publication of the 5G standard. To address the identified privacy gaps, we also present future research directions in the form of proposed improvements

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    5G wireless network support using umanned aerial vehicles for rural and low-Income areas

    Get PDF
    >Magister Scientiae - MScThe fifth-generation mobile network (5G) is a new global wireless standard that enables state-of-the-art mobile networks with enhanced cellular broadband services that support a diversity of devices. Even with the current worldwide advanced state of broadband connectivity, most rural and low-income settings lack minimum Internet connectivity because there are no economic incentives from telecommunication providers to deploy wireless communication systems in these areas. Using a team of Unmanned Aerial Vehicles (UAVs) to extend or solely supply the 5G coverage is a great opportunity for these zones to benefit from the advantages promised by this new communication technology. However, the deployment and applications of innovative technology in rural locations need extensive research

    Polar Microbiology: Recent Advances and Future Perspectives

    Get PDF

    Dissecting molecular mechanisms of disease in the wheat pathogen, Parastagonospora nodorum

    Get PDF
    Dissecting molecular mechanisms of disease in the wheat pathogen, Parastagonospora nodorum Parastagonospora nodorum is a wheat specific pathogen that causes annual losses to the Australian wheat industry in excess of $100 million AUD. This necrotrophic fungus kills the host tissue generating necrotic lesions within which fruiting bodies develop, spreading spores and continuing the disease cycle. This polycyclic infection cycle leads to field epidemics resulting in the losses to growers. Sporulation and virulence are the two crucial aspects for disease development in the P. nodorum-wheat pathosystem and form the basis of this project. A forward genetics approach was employed to discover novel mechanisms by which P. nodorum facilitates infection on wheat. A library of random P. nodorum insertion mutants was generated, and subsequently screened for gain and loss of virulence phenotypes on non-susceptible and susceptible wheat cultivars. From a library of 950 transformants seven displayed a consistent avirulent phenotype on the susceptible wheat cultivar. To identify the disrupted loci leading to avirulence, genomes of the seven avirulent P. nodorum strains were sequenced elucidating a Catechol-1,2-dioxygenase and a Copper dependent amine oxidase. To complement the virulence investigation, a combined transcriptomics and metabolomics approach was employed to decipher sporulation in this pathogen. This is of particular interest as the canonical sporulation pathways in other, model fungi, were previously shown to be not applicable in P. nodorum. A differential gene analysis of fungal material collected at critical developmental time points identified several key genes involved in initiating a sporulation cascade. Notably, a WetA homolog was identified, along with an uncharacterised Aquaporin-like protein and a Pr1-like protein. Metabolomics and subsequent sporulation assays revealed a polyamine pathway plays an integral role in initiating and coordinating asexual development of P. nodorum
    corecore