A Survey on C-RAN Security
Loading...
Access rights
openAccess
© 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission.
publishedVersion
URL
Journal Title
Journal ISSN
Volume Title
A2 Katsausartikkeli tieteellisessä aikakauslehdessä
This publication is imported from Aalto University research portal.
View publication in the Research portal (opens in new window)
View/Open full text file from the Research portal (opens in new window)
View publication in the Research portal (opens in new window)
View/Open full text file from the Research portal (opens in new window)
Authors
Date
Major/Subject
Mcode
Degree programme
Language
en
Pages
15
Series
IEEE Access, Volume 5, pp. 13372-13386
Abstract
While 4G is speeding up its steps towards global markets, 5G has initiated its full development to satisfy an increasing demand on mobile data traffic and big data bandwidth. Centralized data processing, collaborative radio, real-time cloud infrastructure and Cloud Radio Access Network (C-RAN), along with their excellent advantages are being sought by more and more operators to meet end-user requirements. As a promising mobile wireless network architecture, compared with traditional RAN, C-RAN has incomparable advantages in terms of low power consumption, reduced Base Station (BS) numbers, and economic capital and operating expenditure. It can also improve network capacity and BS utilization rate. Recently, C-RAN security has aroused special attention and concern. However, the literature still lacks an overall review on it in order to guide current and future research. In this paper, we first overview the architecture, deployment scenarios and special characteristics of C-RAN. We then provide a thorough review on the existing security studies in the field of C-RAN based on its three logic layers and corresponding security threats and attacks. Particularly, we discuss whether the current literature can satisfy the expected security requirements in C-RAN. Based on this, we indicate open research issues and propose future research trends.Description
Other note
Citation
Tian, F Y, Zhang, P & Yan, Z 2017, 'A Survey on C-RAN Security', IEEE Access, vol. 5, pp. 13372-13386. https://doi.org/10.1109/ACCESS.2017.2717852