Towards secure 5G networks: A Survey
暂无分享,去创建一个
[1] Quanyan Zhu,et al. PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[2] Abdallah Shami,et al. NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC) , 2014, IEEE Network.
[3] Wei Yang,et al. A survey on security in network functions virtualization , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).
[4] Gerhard Wunder,et al. A Novel Key Generating Architecture for Wireless Low-Resource Devices , 2014, 2014 International Workshop on Secure Internet of Things.
[5] Deepak H. Sharma,et al. Homomorphic Encryption for Security of Cloud Data , 2016 .
[6] Mathieu Bouet,et al. DISCO: Distributed multi-domain SDN controllers , 2013, 2014 IEEE Network Operations and Management Symposium (NOMS).
[7] Juan Carlos De Martin,et al. Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[8] Mabry Tyson,et al. A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.
[9] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[10] Zonghua Zhang,et al. Controller DAC: Securing SDN controller with dynamic access control , 2017, 2017 IEEE International Conference on Communications (ICC).
[11] Yu-Lun Huang,et al. Security Impacts of Virtualization on a Network Testbed , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.
[12] Wang Chen. An IBE-based security scheme on Internet of Things , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[13] Paulo S. L. M. Barreto,et al. Impact of Operating Systems on Wireless Sensor Networks (Security) Applications and Testbeds , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[14] Vladimir A. Oleshchuk,et al. An improvement of the batch-authentication and key agreement framework for P2P-based online social networks , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[15] Olivier Festor,et al. Anomaly traceback using software defined networking , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[16] Fei Peng,et al. Interference Coordination with Vertical Beamforming in 3D MIMO-OFDMA Networks , 2014, IEEE Communications Letters.
[17] Weixin Xie,et al. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[18] Aiqing Zhang,et al. Security-Aware and Privacy-Preserving D2D Communications in 5G , 2017, IEEE Network.
[19] Taskin Koçak,et al. A Survey on Smart Grid Potential Applications and Communication Requirements , 2013, IEEE Transactions on Industrial Informatics.
[20] Donald F. Towsley,et al. Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.
[21] Yacine Challal,et al. Security in device-to-device communications: a survey , 2018, IET Networks.
[22] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[23] Sanjeev Jain,et al. A survey on device-to-device (D2D) communication: Architecture and security issues , 2017, J. Netw. Comput. Appl..
[24] Mohamed Amine Ferrag,et al. Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.
[25] Peter Schneider,et al. Towards 5G Security , 2015, TrustCom 2015.
[26] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[27] Tarik Taleb,et al. Virtual security as a service for 5G verticals , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[28] Axel Küpper,et al. Applying Attribute-Based Encryption on Publish Subscribe Messaging Patterns for the Internet of Things , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.
[29] Amr M. Youssef,et al. Ultra-Dense Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[30] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[31] Xuelong Li,et al. Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks , 2017, IEEE Transactions on Vehicular Technology.
[32] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[33] Yuefeng Ji,et al. Baseband unit cloud interconnection enabled by flexible grid optical networks with software defined elasticity , 2015, IEEE Communications Magazine.
[34] Shiuh-Pyng Shieh,et al. A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks , 2012, IEEE Transactions on Vehicular Technology.
[35] Emad Alsusa,et al. Physical Layer Secret Key Exchange Using Phase Randomization in MIMO-OFDM , 2014, GLOBECOM 2014.
[36] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[37] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[38] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.
[39] Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
[40] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[41] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[42] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[43] Prabhu Babu,et al. A Minorization–Maximization Algorithm for Maximizing the Secrecy Rate of the MIMOME Wiretap Channel , 2017, IEEE Communications Letters.
[44] Antonio Lioy,et al. On the establishment of trust in the cloud-based ETSI NFV framework , 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).
[45] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[46] Ehab Al-Shaer,et al. FlowChecker: configuration analysis and verification of federated openflow infrastructures , 2010, SafeConfig '10.
[47] Andreas Kunz,et al. Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[48] Sakir Sezer,et al. Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).
[49] Huiming Wang,et al. Physical Layer Security in Millimeter Wave Cellular Networks , 2016, IEEE Transactions on Wireless Communications.
[50] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.
[51] Ya-Feng Liu,et al. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.
[52] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[53] Ghada Arfaoui,et al. Security and Resilience in 5G: Current Challenges and Future Directions , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[54] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[55] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[56] Xiaodong Lin,et al. Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.
[57] Mi Wen,et al. Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks , 2016, IEEE Internet of Things Journal.
[58] Munnujahan Ara,et al. Secure communications with D2D cooperation , 2015, 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA'15).
[59] Antonio Lioy,et al. NFV-based network protection: The SHIELD approach , 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).
[60] Can Emre Koksal,et al. Secret Key Generation Via Localization and Mobility , 2015, IEEE Transactions on Vehicular Technology.
[61] Nick Feamster,et al. Procera: a language for high-level reactive network control , 2012, HotSDN '12.
[62] Jianhua Lu,et al. Improving Wireless Security for Bidirectional Communication Scenarios , 2012, IEEE Transactions on Vehicular Technology.
[63] Andrei V. Gurtov,et al. Security in Software Defined Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[64] Kaizhi Huang,et al. Security-oriented distributed access selection for D2D underlaying cellular networks , 2017 .
[65] David Walker,et al. Frenetic: a network programming language , 2011, ICFP.
[66] Michael B. Jones,et al. JSON Web Token (JWT) , 2015, RFC.
[67] C. Rama Krishna,et al. An Efficient Distributed Group Key Management Using Hierarchical Approach with Elliptic Curve Cryptography , 2015, 2015 IEEE International Conference on Computational Intelligence & Communication Technology.
[68] Yves Deswarte,et al. Survey of Security Problems in Cloud Computing Virtual Machines , 2012 .
[69] K. J. Ray Liu,et al. Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems , 2011, IEEE Transactions on Wireless Communications.
[70] AKHIL GUPTA,et al. A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.
[71] Tarik Taleb,et al. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.
[72] Tanesh Kumar,et al. Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.
[73] A. Lee Swindlehurst,et al. A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[74] David Llewellyn-Jones,et al. A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[75] Edward W. Knightly,et al. Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[76] Donghoon Lee,et al. Performance and security enhanced authentication and key agreement protocol for SAE/LTE network , 2016, Comput. Networks.
[77] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[78] Levente Buttyán,et al. A survey of security issues in hardware virtualization , 2013, CSUR.
[79] Min Chen,et al. Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.
[80] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.
[81] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[82] Ayman Taha,et al. Virtualization security: A survey , 2016, 2016 11th International Conference on Computer Engineering & Systems (ICCES).
[83] Bernd Jaeger. Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture , 2015, TrustCom 2015.
[84] Ming Li,et al. MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks , 2015, IEEE Internet of Things Journal.
[85] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[86] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[87] Georges Kaddoum,et al. Secrecy capacity analysis in D2D underlay cellular networks: Colluding eavesdroppers , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[88] Danda B. Rawat,et al. Software Defined Networking Architecture, Security and Energy Efficiency: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[89] Jie Xu,et al. Exploiting Interference for Secrecy Wireless Information and Power Transfer , 2017, IEEE Wireless Communications.
[90] Xiaojiang Du,et al. Secure Machine-Type Communications toward LTE Heterogeneous Networks , 2017, IEEE Wireless Communications.
[91] Zhu Han,et al. Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.
[92] Garima Chopra,et al. A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions , 2017, J. Netw. Comput. Appl..
[93] Yan Dong,et al. PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[94] Zhi Chen,et al. A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..
[95] Syed Faraz Hasan,et al. Device-to-Device Communications: A Contemporary Survey , 2017, Wireless Personal Communications.
[96] Nicola Laurenti,et al. Energy-based anchor node selection for IoT physical layer authentication , 2016, 2016 IEEE International Conference on Communications (ICC).
[97] Shahid Mumtaz,et al. Millimeter-Wave Massive MIMO Communication for Future Wireless Systems: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[98] Roger Piqueras Jover,et al. LTE/LTE-A jamming, spoofing, and sniffing: threat assessment and mitigation , 2016, IEEE Communications Magazine.
[99] Antonio F. Gómez-Skarmeta,et al. Towards a Lightweight Authentication and Authorization Framework for Smart Objects , 2014 .
[100] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[101] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[102] Qinye Yin,et al. Secure Transmissions in Millimeter Wave Systems , 2017, IEEE Transactions on Communications.
[103] Sakir Sezer,et al. A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.
[104] Dick Hardt,et al. The OAuth 2.0 Authorization Framework , 2012, RFC.
[105] Kim-Kwang Raymond Choo,et al. Security, Privacy, and Anonymity in Computation, Communication, and Storage , 2017, Lecture Notes in Computer Science.
[106] Zheng Yan,et al. A Survey on Security in D2D Communications , 2017, Mob. Networks Appl..
[107] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[108] Victor C. M. Leung,et al. Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.
[109] Dirk Kutscher. It's the network: Towards better security and transport performance in 5G , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[110] Mabry Tyson,et al. FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.
[111] Shunliang Zhang,et al. An Overview of Network Slicing for 5G , 2019, IEEE Wireless Communications.
[112] Zhen Yang,et al. Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.
[113] K. Cumanan,et al. Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints , 2017, IEEE Transactions on Vehicular Technology.
[114] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[115] Zhu Han,et al. Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.
[116] Tarik Taleb,et al. On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration , 2017, IEEE Communications Surveys & Tutorials.
[117] Rakesh Kumar Jha,et al. A survey on green communication and security challenges in 5G wireless communication networks , 2017, J. Netw. Comput. Appl..
[118] Nicolai Kuntze,et al. Hypervisor-Based Attestation of Virtual Environments , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[119] Andrei V. Gurtov,et al. NFV security considerations for cloud-based mobile virtual network operators , 2016, 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM).
[120] Xuemin Shen,et al. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions , 2015, IEEE Communications Magazine.
[121] Robert W. Heath,et al. Secure communication in cellular networks: The benefits of millimeter wave mobile broadband , 2014, 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[122] Sreeram Munisankaraiah,et al. Physical layer security in 5G wireless networks for data protection , 2016, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT).
[123] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.
[124] S. Z. Iliya,et al. A Comprehensive Survey of Pilot Contamination in Massive MIMO—5G System , 2016, IEEE Communications Surveys & Tutorials.
[125] Lene Tolstrup Sørensen,et al. 5G Visions of User Privacy , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[126] Wenjuan Li,et al. A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures , 2016, J. Netw. Comput. Appl..
[127] Dimitrios Kritharidis,et al. Policy based virtualised security architecture for SDN/NFV enabled 5G access networks , 2016, 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).
[128] Jinho Choi,et al. Secret Key Agreement for Massive MIMO Systems with Two-Way Training under Pilot Contamination Attack , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[129] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[130] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[131] Tarik Taleb,et al. NFV: Security Threats and Best Practices , 2017, IEEE Communications Magazine.
[132] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[133] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[134] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[135] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[136] Shaojie Tang,et al. KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).
[137] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[138] Ahmed Meddahi,et al. NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures , 2018, IEEE Communications Surveys & Tutorials.
[139] Yanxin Zhang,et al. A decentralized solution for IoT data trusted exchange based-on blockchain , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).
[140] Valtteri Niemi,et al. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.
[141] Tarunpreet Bhatia,et al. Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues , 2017, The Journal of Supercomputing.
[142] Yu Cheng,et al. Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.
[143] Chia-Peng Lee,et al. Group Mobility Management for Large-Scale Machine-to-Machine Mobile Networking , 2014, IEEE Transactions on Vehicular Technology.
[144] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[145] Theodore S. Rappaport,et al. Millimeter Wave Mobile Communications for 5G Cellular: It Will Work! , 2013, IEEE Access.
[146] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[147] Daniele Miorandi,et al. Internet of Things: Security in the Keys , 2016, Q2SWinet@MSWiM.
[148] Seungjoon Lee,et al. Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.
[149] Georges Kaddoum,et al. A Survey on Cooperative Jamming Applied to Physical Layer Security , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[150] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[151] Mohsen Guizani,et al. 5G D2D Networks: Techniques, Challenges, and Future Prospects , 2018, IEEE Systems Journal.
[152] Zhijie Jerry Shi,et al. RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements , 2016, IEEE Communications Magazine.
[153] Ahmed Meddahi,et al. SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[154] Vinod Yegneswaran,et al. Securing the Software Defined Network Control Layer , 2015, NDSS.
[155] Daniele Miorandi,et al. Security policy enforcement for networked smart objects , 2016, Comput. Networks.
[156] Talal Alharbi,et al. Virtualized Network Functions security attacks and vulnerabilities , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[157] Tarik Taleb,et al. Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[158] Hirosuke Yamamoto,et al. A coding theorem for secret sharing communication systems with two Gaussian wiretap channels , 1991, IEEE Trans. Inf. Theory.
[159] Xirong Que,et al. Reliability-aware controller placement for Software-Defined Networks , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).
[160] Yonggang Wen,et al. “ A Survey of Software Defined Networking , 2020 .
[161] Yi Wang,et al. Towards a secure controller platform for openflow applications , 2013, HotSDN '13.
[162] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[163] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[164] Florian Schaub,et al. Privacy and Trust in Ambient Intelligent Environments , 2016 .
[165] Jiri Hosek,et al. On perspective of security and privacy-preserving solutions in the internet of things , 2016, Comput. Networks.
[166] Xia Qi,et al. A Signcryption Scheme from Certificateless to Identity-based Environment for WSNs into IoT , 2015 .
[167] Vijay Varadharajan,et al. Security as a Service Model for Cloud Environment , 2014, IEEE Transactions on Network and Service Management.
[168] Jing Wang,et al. Cooperative Jamming and Power Allocation in Two-Way Relaying System with Eavesdropper , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).
[169] Lajos Hanzo,et al. Millimeter-Wave Communications: Physical Channel Models, Design Considerations, Antenna Constructions, and Link-Budget , 2018, IEEE Communications Surveys & Tutorials.
[170] Lei Xu,et al. Enhancing Network Security through Software Defined Networking (SDN) , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[171] Bo Hu,et al. Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends , 2015, 2015 IEEE 8th International Conference on Cloud Computing.