Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorZhang, Jialeien_US
dc.contributor.authorYan, Zhengen_US
dc.contributor.authorFei, Shufanen_US
dc.contributor.authorWang, Mingjunen_US
dc.contributor.authorLi, Tieyanen_US
dc.contributor.authorWang, Haiguangen_US
dc.contributor.departmentDepartment of Communications and Networkingen
dc.contributor.groupauthorNetwork Security and Trusten
dc.contributor.organizationHuawei Technologiesen_US
dc.contributor.organizationXidian Universityen_US
dc.date.accessioned2022-01-10T08:15:17Z
dc.date.available2022-01-10T08:15:17Z
dc.date.issued2022en_US
dc.descriptionPublisher Copyright: IEEE
dc.description.abstractMobile and wireless communication continues its rapid development. Beyond 5G, heterogeneous networks (HetNets) will be merged with the integration of various networking technologies. Unique characteristics of such an integrated converged network cause new security challenges, such as difficulty of key agreement and theft of communication content, especially when crossing network domains happens. In order to ensure secure and reliable communications, end-to-end (E2E) communication security is highly expected, especially for cross-trust-domain communications in HetNets. Unfortunately, little existing research touches this issue and the literature lacks a deep-insight review on the current state-of-the-art. In this article, we summarize current E2E secure communication scenarios and basic techniques. We propose a number of requirements based on security threat analysis and employ them as a measure to evaluate existing works. Through review and analysis, we finally determine open issues to highlight future research directions.en
dc.description.versionPeer revieweden
dc.format.extent8
dc.format.extent1-8
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationZhang, J, Yan, Z, Fei, S, Wang, M, Li, T & Wang, H 2022, ' Is Today's End-to-End Communication Security Enough for 5G and Its Beyond? ', IEEE Network, vol. 36, no. 1, pp. 105-112 . https://doi.org/10.1109/MNET.101.2100189en
dc.identifier.doi10.1109/MNET.101.2100189en_US
dc.identifier.issn0890-8044
dc.identifier.issn1558-8044
dc.identifier.otherPURE UUID: 0b25f0b8-96d7-43e9-a159-1c3f0aa01cb5en_US
dc.identifier.otherPURE ITEMURL: https://research.aalto.fi/en/publications/0b25f0b8-96d7-43e9-a159-1c3f0aa01cb5en_US
dc.identifier.otherPURE LINK: http://www.scopus.com/inward/record.url?scp=85118261031&partnerID=8YFLogxKen_US
dc.identifier.otherPURE FILEURL: https://research.aalto.fi/files/77667679/ELEC_Zhang_etal_Is_Todays_End_to_End_Communication_Security_Enough_for_5G_IEEE_Network_2021.pdfen_US
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/112140
dc.identifier.urnURN:NBN:fi:aalto-202201101052
dc.language.isoenen
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
dc.relation.ispartofseriesIEEE NETWORKen
dc.rightsopenAccessen
dc.subject.keyword5G mobile communicationen_US
dc.subject.keywordAuthenticationen_US
dc.subject.keywordCryptographyen_US
dc.subject.keywordDevice-to-device communicationen_US
dc.subject.keywordPassworden_US
dc.subject.keywordReceiversen_US
dc.subject.keywordSecurityen_US
dc.titleIs Today's End-to-End Communication Security Enough for 5G and Its Beyond?en
dc.typeA1 Alkuperäisartikkeli tieteellisessä aikakauslehdessäfi
dc.type.versionacceptedVersion

Files