Towards secure 5G networks: A Survey

Abstract To support various new use cases from vertical industries besides enhanced mobile broadband communication services, the 5G system aims to provide higher speed, lower latency, and massive connectivity to various devices by leveraging the evolution of 4G with the addition of new radio technology, service-based architecture, and cloud infrastructure. The introduction of new technologies, new use cases and people’s growing concerns regarding privacy issues brings new challenges to providing security and privacy protection for 5G. This paper makes an extensive review of the state of the art towards ensuring 5G security and privacy. By analyzing the lessons from the 4G security system, the requirements from new scenarios and models, the challenges resulting from new technology and paradigm, we identify typical security and privacy issues to be solved in 5G. Then, we discuss potential solutions from academia and industry to secure 5G networks from several perspectives, including the overall 5G security framework, core network, radio access network, cloud infrastructure, and the Internet of things. Finally, several key open issues and potential research directions are identified and discussed.

[1]  Quanyan Zhu,et al.  PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[2]  Abdallah Shami,et al.  NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC) , 2014, IEEE Network.

[3]  Wei Yang,et al.  A survey on security in network functions virtualization , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).

[4]  Gerhard Wunder,et al.  A Novel Key Generating Architecture for Wireless Low-Resource Devices , 2014, 2014 International Workshop on Secure Internet of Things.

[5]  Deepak H. Sharma,et al.  Homomorphic Encryption for Security of Cloud Data , 2016 .

[6]  Mathieu Bouet,et al.  DISCO: Distributed multi-domain SDN controllers , 2013, 2014 IEEE Network Operations and Management Symposium (NOMS).

[7]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[8]  Mabry Tyson,et al.  A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.

[9]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[10]  Zonghua Zhang,et al.  Controller DAC: Securing SDN controller with dynamic access control , 2017, 2017 IEEE International Conference on Communications (ICC).

[11]  Yu-Lun Huang,et al.  Security Impacts of Virtualization on a Network Testbed , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.

[12]  Wang Chen An IBE-based security scheme on Internet of Things , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[13]  Paulo S. L. M. Barreto,et al.  Impact of Operating Systems on Wireless Sensor Networks (Security) Applications and Testbeds , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[14]  Vladimir A. Oleshchuk,et al.  An improvement of the batch-authentication and key agreement framework for P2P-based online social networks , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[15]  Olivier Festor,et al.  Anomaly traceback using software defined networking , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[16]  Fei Peng,et al.  Interference Coordination with Vertical Beamforming in 3D MIMO-OFDMA Networks , 2014, IEEE Communications Letters.

[17]  Weixin Xie,et al.  An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Aiqing Zhang,et al.  Security-Aware and Privacy-Preserving D2D Communications in 5G , 2017, IEEE Network.

[19]  Taskin Koçak,et al.  A Survey on Smart Grid Potential Applications and Communication Requirements , 2013, IEEE Transactions on Industrial Informatics.

[20]  Donald F. Towsley,et al.  Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[21]  Yacine Challal,et al.  Security in device-to-device communications: a survey , 2018, IET Networks.

[22]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[23]  Sanjeev Jain,et al.  A survey on device-to-device (D2D) communication: Architecture and security issues , 2017, J. Netw. Comput. Appl..

[24]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[25]  Peter Schneider,et al.  Towards 5G Security , 2015, TrustCom 2015.

[26]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[27]  Tarik Taleb,et al.  Virtual security as a service for 5G verticals , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[28]  Axel Küpper,et al.  Applying Attribute-Based Encryption on Publish Subscribe Messaging Patterns for the Internet of Things , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.

[29]  Amr M. Youssef,et al.  Ultra-Dense Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[30]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[31]  Xuelong Li,et al.  Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks , 2017, IEEE Transactions on Vehicular Technology.

[32]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[33]  Yuefeng Ji,et al.  Baseband unit cloud interconnection enabled by flexible grid optical networks with software defined elasticity , 2015, IEEE Communications Magazine.

[34]  Shiuh-Pyng Shieh,et al.  A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks , 2012, IEEE Transactions on Vehicular Technology.

[35]  Emad Alsusa,et al.  Physical Layer Secret Key Exchange Using Phase Randomization in MIMO-OFDM , 2014, GLOBECOM 2014.

[36]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[37]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[38]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[39]  Brighten Godfrey,et al.  VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.

[40]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[41]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[42]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[43]  Prabhu Babu,et al.  A Minorization–Maximization Algorithm for Maximizing the Secrecy Rate of the MIMOME Wiretap Channel , 2017, IEEE Communications Letters.

[44]  Antonio Lioy,et al.  On the establishment of trust in the cloud-based ETSI NFV framework , 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).

[45]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[46]  Ehab Al-Shaer,et al.  FlowChecker: configuration analysis and verification of federated openflow infrastructures , 2010, SafeConfig '10.

[47]  Andreas Kunz,et al.  Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[48]  Sakir Sezer,et al.  Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).

[49]  Huiming Wang,et al.  Physical Layer Security in Millimeter Wave Cellular Networks , 2016, IEEE Transactions on Wireless Communications.

[50]  Bing Chen,et al.  Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.

[51]  Ya-Feng Liu,et al.  Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.

[52]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[53]  Ghada Arfaoui,et al.  Security and Resilience in 5G: Current Challenges and Future Directions , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[54]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[55]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[56]  Xiaodong Lin,et al.  Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.

[57]  Mi Wen,et al.  Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks , 2016, IEEE Internet of Things Journal.

[58]  Munnujahan Ara,et al.  Secure communications with D2D cooperation , 2015, 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA'15).

[59]  Antonio Lioy,et al.  NFV-based network protection: The SHIELD approach , 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).

[60]  Can Emre Koksal,et al.  Secret Key Generation Via Localization and Mobility , 2015, IEEE Transactions on Vehicular Technology.

[61]  Nick Feamster,et al.  Procera: a language for high-level reactive network control , 2012, HotSDN '12.

[62]  Jianhua Lu,et al.  Improving Wireless Security for Bidirectional Communication Scenarios , 2012, IEEE Transactions on Vehicular Technology.

[63]  Andrei V. Gurtov,et al.  Security in Software Defined Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[64]  Kaizhi Huang,et al.  Security-oriented distributed access selection for D2D underlaying cellular networks , 2017 .

[65]  David Walker,et al.  Frenetic: a network programming language , 2011, ICFP.

[66]  Michael B. Jones,et al.  JSON Web Token (JWT) , 2015, RFC.

[67]  C. Rama Krishna,et al.  An Efficient Distributed Group Key Management Using Hierarchical Approach with Elliptic Curve Cryptography , 2015, 2015 IEEE International Conference on Computational Intelligence & Communication Technology.

[68]  Yves Deswarte,et al.  Survey of Security Problems in Cloud Computing Virtual Machines , 2012 .

[69]  K. J. Ray Liu,et al.  Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems , 2011, IEEE Transactions on Wireless Communications.

[70]  AKHIL GUPTA,et al.  A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.

[71]  Tarik Taleb,et al.  A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.

[72]  Tanesh Kumar,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[73]  A. Lee Swindlehurst,et al.  A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[74]  David Llewellyn-Jones,et al.  A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[75]  Edward W. Knightly,et al.  Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[76]  Donghoon Lee,et al.  Performance and security enhanced authentication and key agreement protocol for SAE/LTE network , 2016, Comput. Networks.

[77]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[78]  Levente Buttyán,et al.  A survey of security issues in hardware virtualization , 2013, CSUR.

[79]  Min Chen,et al.  Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.

[80]  Qiang Li,et al.  Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.

[81]  Tony Q. S. Quek,et al.  Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.

[82]  Ayman Taha,et al.  Virtualization security: A survey , 2016, 2016 11th International Conference on Computer Engineering & Systems (ICCES).

[83]  Bernd Jaeger Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture , 2015, TrustCom 2015.

[84]  Ming Li,et al.  MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks , 2015, IEEE Internet of Things Journal.

[85]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[86]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[87]  Georges Kaddoum,et al.  Secrecy capacity analysis in D2D underlay cellular networks: Colluding eavesdroppers , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[88]  Danda B. Rawat,et al.  Software Defined Networking Architecture, Security and Energy Efficiency: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[89]  Jie Xu,et al.  Exploiting Interference for Secrecy Wireless Information and Power Transfer , 2017, IEEE Wireless Communications.

[90]  Xiaojiang Du,et al.  Secure Machine-Type Communications toward LTE Heterogeneous Networks , 2017, IEEE Wireless Communications.

[91]  Zhu Han,et al.  Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.

[92]  Garima Chopra,et al.  A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions , 2017, J. Netw. Comput. Appl..

[93]  Yan Dong,et al.  PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[94]  Zhi Chen,et al.  A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..

[95]  Syed Faraz Hasan,et al.  Device-to-Device Communications: A Contemporary Survey , 2017, Wireless Personal Communications.

[96]  Nicola Laurenti,et al.  Energy-based anchor node selection for IoT physical layer authentication , 2016, 2016 IEEE International Conference on Communications (ICC).

[97]  Shahid Mumtaz,et al.  Millimeter-Wave Massive MIMO Communication for Future Wireless Systems: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[98]  Roger Piqueras Jover,et al.  LTE/LTE-A jamming, spoofing, and sniffing: threat assessment and mitigation , 2016, IEEE Communications Magazine.

[99]  Antonio F. Gómez-Skarmeta,et al.  Towards a Lightweight Authentication and Authorization Framework for Smart Objects , 2014 .

[100]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[101]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[102]  Qinye Yin,et al.  Secure Transmissions in Millimeter Wave Systems , 2017, IEEE Transactions on Communications.

[103]  Sakir Sezer,et al.  A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.

[104]  Dick Hardt,et al.  The OAuth 2.0 Authorization Framework , 2012, RFC.

[105]  Kim-Kwang Raymond Choo,et al.  Security, Privacy, and Anonymity in Computation, Communication, and Storage , 2017, Lecture Notes in Computer Science.

[106]  Zheng Yan,et al.  A Survey on Security in D2D Communications , 2017, Mob. Networks Appl..

[107]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[108]  Victor C. M. Leung,et al.  Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.

[109]  Dirk Kutscher It's the network: Towards better security and transport performance in 5G , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[110]  Mabry Tyson,et al.  FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.

[111]  Shunliang Zhang,et al.  An Overview of Network Slicing for 5G , 2019, IEEE Wireless Communications.

[112]  Zhen Yang,et al.  Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.

[113]  K. Cumanan,et al.  Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints , 2017, IEEE Transactions on Vehicular Technology.

[114]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[115]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[116]  Tarik Taleb,et al.  On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration , 2017, IEEE Communications Surveys & Tutorials.

[117]  Rakesh Kumar Jha,et al.  A survey on green communication and security challenges in 5G wireless communication networks , 2017, J. Netw. Comput. Appl..

[118]  Nicolai Kuntze,et al.  Hypervisor-Based Attestation of Virtual Environments , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[119]  Andrei V. Gurtov,et al.  NFV security considerations for cloud-based mobile virtual network operators , 2016, 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[120]  Xuemin Shen,et al.  Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions , 2015, IEEE Communications Magazine.

[121]  Robert W. Heath,et al.  Secure communication in cellular networks: The benefits of millimeter wave mobile broadband , 2014, 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[122]  Sreeram Munisankaraiah,et al.  Physical layer security in 5G wireless networks for data protection , 2016, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT).

[123]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[124]  S. Z. Iliya,et al.  A Comprehensive Survey of Pilot Contamination in Massive MIMO—5G System , 2016, IEEE Communications Surveys & Tutorials.

[125]  Lene Tolstrup Sørensen,et al.  5G Visions of User Privacy , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[126]  Wenjuan Li,et al.  A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures , 2016, J. Netw. Comput. Appl..

[127]  Dimitrios Kritharidis,et al.  Policy based virtualised security architecture for SDN/NFV enabled 5G access networks , 2016, 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).

[128]  Jinho Choi,et al.  Secret Key Agreement for Massive MIMO Systems with Two-Way Training under Pilot Contamination Attack , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[129]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[130]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[131]  Tarik Taleb,et al.  NFV: Security Threats and Best Practices , 2017, IEEE Communications Magazine.

[132]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[133]  Tal Garfinkel,et al.  A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.

[134]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[135]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[136]  Shaojie Tang,et al.  KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).

[137]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[138]  Ahmed Meddahi,et al.  NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures , 2018, IEEE Communications Surveys & Tutorials.

[139]  Yanxin Zhang,et al.  A decentralized solution for IoT data trusted exchange based-on blockchain , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[140]  Valtteri Niemi,et al.  Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.

[141]  Tarunpreet Bhatia,et al.  Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues , 2017, The Journal of Supercomputing.

[142]  Yu Cheng,et al.  Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.

[143]  Chia-Peng Lee,et al.  Group Mobility Management for Large-Scale Machine-to-Machine Mobile Networking , 2014, IEEE Transactions on Vehicular Technology.

[144]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[145]  Theodore S. Rappaport,et al.  Millimeter Wave Mobile Communications for 5G Cellular: It Will Work! , 2013, IEEE Access.

[146]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[147]  Daniele Miorandi,et al.  Internet of Things: Security in the Keys , 2016, Q2SWinet@MSWiM.

[148]  Seungjoon Lee,et al.  Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.

[149]  Georges Kaddoum,et al.  A Survey on Cooperative Jamming Applied to Physical Layer Security , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[150]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[151]  Mohsen Guizani,et al.  5G D2D Networks: Techniques, Challenges, and Future Prospects , 2018, IEEE Systems Journal.

[152]  Zhijie Jerry Shi,et al.  RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements , 2016, IEEE Communications Magazine.

[153]  Ahmed Meddahi,et al.  SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[154]  Vinod Yegneswaran,et al.  Securing the Software Defined Network Control Layer , 2015, NDSS.

[155]  Daniele Miorandi,et al.  Security policy enforcement for networked smart objects , 2016, Comput. Networks.

[156]  Talal Alharbi,et al.  Virtualized Network Functions security attacks and vulnerabilities , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[157]  Tarik Taleb,et al.  Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[158]  Hirosuke Yamamoto,et al.  A coding theorem for secret sharing communication systems with two Gaussian wiretap channels , 1991, IEEE Trans. Inf. Theory.

[159]  Xirong Que,et al.  Reliability-aware controller placement for Software-Defined Networks , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).

[160]  Yonggang Wen,et al.  “ A Survey of Software Defined Networking , 2020 .

[161]  Yi Wang,et al.  Towards a secure controller platform for openflow applications , 2013, HotSDN '13.

[162]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[163]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[164]  Florian Schaub,et al.  Privacy and Trust in Ambient Intelligent Environments , 2016 .

[165]  Jiri Hosek,et al.  On perspective of security and privacy-preserving solutions in the internet of things , 2016, Comput. Networks.

[166]  Xia Qi,et al.  A Signcryption Scheme from Certificateless to Identity-based Environment for WSNs into IoT , 2015 .

[167]  Vijay Varadharajan,et al.  Security as a Service Model for Cloud Environment , 2014, IEEE Transactions on Network and Service Management.

[168]  Jing Wang,et al.  Cooperative Jamming and Power Allocation in Two-Way Relaying System with Eavesdropper , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).

[169]  Lajos Hanzo,et al.  Millimeter-Wave Communications: Physical Channel Models, Design Considerations, Antenna Constructions, and Link-Budget , 2018, IEEE Communications Surveys & Tutorials.

[170]  Lei Xu,et al.  Enhancing Network Security through Software Defined Networking (SDN) , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[171]  Bo Hu,et al.  Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends , 2015, 2015 IEEE 8th International Conference on Cloud Computing.