Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.author | Zhang, Jialei | en_US |
dc.contributor.author | Yan, Zheng | en_US |
dc.contributor.author | Fei, Shufan | en_US |
dc.contributor.author | Wang, Mingjun | en_US |
dc.contributor.author | Li, Tieyan | en_US |
dc.contributor.author | Wang, Haiguang | en_US |
dc.contributor.department | Department of Communications and Networking | en |
dc.contributor.groupauthor | Network Security and Trust | en |
dc.contributor.organization | Huawei Technologies | en_US |
dc.contributor.organization | Xidian University | en_US |
dc.date.accessioned | 2022-01-10T08:15:17Z | |
dc.date.available | 2022-01-10T08:15:17Z | |
dc.date.issued | 2022 | en_US |
dc.description | Publisher Copyright: IEEE | |
dc.description.abstract | Mobile and wireless communication continues its rapid development. Beyond 5G, heterogeneous networks (HetNets) will be merged with the integration of various networking technologies. Unique characteristics of such an integrated converged network cause new security challenges, such as difficulty of key agreement and theft of communication content, especially when crossing network domains happens. In order to ensure secure and reliable communications, end-to-end (E2E) communication security is highly expected, especially for cross-trust-domain communications in HetNets. Unfortunately, little existing research touches this issue and the literature lacks a deep-insight review on the current state-of-the-art. In this article, we summarize current E2E secure communication scenarios and basic techniques. We propose a number of requirements based on security threat analysis and employ them as a measure to evaluate existing works. Through review and analysis, we finally determine open issues to highlight future research directions. | en |
dc.description.version | Peer reviewed | en |
dc.format.extent | 8 | |
dc.format.extent | 1-8 | |
dc.format.mimetype | application/pdf | en_US |
dc.identifier.citation | Zhang, J, Yan, Z, Fei, S, Wang, M, Li, T & Wang, H 2022, ' Is Today's End-to-End Communication Security Enough for 5G and Its Beyond? ', IEEE Network, vol. 36, no. 1, pp. 105-112 . https://doi.org/10.1109/MNET.101.2100189 | en |
dc.identifier.doi | 10.1109/MNET.101.2100189 | en_US |
dc.identifier.issn | 0890-8044 | |
dc.identifier.issn | 1558-8044 | |
dc.identifier.other | PURE UUID: 0b25f0b8-96d7-43e9-a159-1c3f0aa01cb5 | en_US |
dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/0b25f0b8-96d7-43e9-a159-1c3f0aa01cb5 | en_US |
dc.identifier.other | PURE LINK: http://www.scopus.com/inward/record.url?scp=85118261031&partnerID=8YFLogxK | en_US |
dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/77667679/ELEC_Zhang_etal_Is_Todays_End_to_End_Communication_Security_Enough_for_5G_IEEE_Network_2021.pdf | en_US |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/112140 | |
dc.identifier.urn | URN:NBN:fi:aalto-202201101052 | |
dc.language.iso | en | en |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | |
dc.relation.ispartofseries | IEEE NETWORK | en |
dc.rights | openAccess | en |
dc.subject.keyword | 5G mobile communication | en_US |
dc.subject.keyword | Authentication | en_US |
dc.subject.keyword | Cryptography | en_US |
dc.subject.keyword | Device-to-device communication | en_US |
dc.subject.keyword | Password | en_US |
dc.subject.keyword | Receivers | en_US |
dc.subject.keyword | Security | en_US |
dc.title | Is Today's End-to-End Communication Security Enough for 5G and Its Beyond? | en |
dc.type | A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä | fi |
dc.type.version | acceptedVersion |