Security Challenges for Cloud Radio Access Networks

作者: Victor Sucasas , Georgios Mantas , Jonathan Rodriguez

DOI: 10.1002/9781119170402.CH9

关键词:

摘要: Cloud radio access networks (C‐RAN) are a promising technology that will allow the new generation of 5G mobile communication systems to address industry's capacity growth needs and demands for higher mobility. At same time, energy‐efficient operation be delivered together with operating capital cost savings. However, despite significant benefits C‐RAN in systems, it has face multiple inherent security challenges associated virtual cloud computing technology, which may hinder its successful establishment market. Thus, is critical these enable reach full potential foster deployment future systems. Therefore, this chapter presents representative examples possible threats attacks against main components architecture order shed light on provide roadmap ensure emerging technology.

参考文章(32)
Evariste Logota, Georgios Mantas, Jonathan Rodriguez, Hugo Marques, Analysis of the Impact of Denial of Service Attacks on Centralized Control in Smart Cities international wireless internet conference. pp. 91- 96 ,(2014) , 10.1007/978-3-319-18802-7_13
Georgios Mantas, Nikos Komninos, Jonathan Rodriguez, Evariste Logota, Hugo Marques, Security for 5G Communications John Wiley & Sons, Ltd.. pp. 207- 220 ,(2015) , 10.1002/9781118867464.CH9
N. M. Mosharaf Kabir Chowdhury, Fida-E. Zaheer, Raouf Boutaba, iMark: An identity management framework for network virtualization environment integrated network management. pp. 335- 342 ,(2009) , 10.1109/INM.2009.5188833
Jun Wu, Zhifeng Zhang, Yu Hong, Yonggang Wen, Cloud radio access network (C-RAN): a primer IEEE Network. ,vol. 29, pp. 35- 41 ,(2015) , 10.1109/MNET.2015.7018201
Serdar Cabuk, Chris I. Dalton, HariGovind Ramasamy, Matthias Schunter, Towards automated provisioning of secure virtualized networks computer and communications security. pp. 235- 245 ,(2007) , 10.1145/1315245.1315275
Christian Limpach, Eric Jul, Andrew Warfield, Steven Hand, Ian Pratt, Christopher Clark, Jacob Gorm Hansen, Keir Fraser, Live migration of virtual machines networked systems design and implementation. pp. 273- 286 ,(2005) , 10.5555/1251203.1251223
A. Whitaker, R.S. Cox, M. Shaw, S.D. Gribble, Rethinking the design of virtual machine monitors IEEE Computer. ,vol. 38, pp. 57- 62 ,(2005) , 10.1109/MC.2005.169
Feng Li, Wei Peng, Chin-Tser Huang, Xukai Zou, Smartphone strategic sampling in defending enterprise network security 2013 IEEE International Conference on Communications (ICC). pp. 2155- 2159 ,(2013) , 10.1109/ICC.2013.6654846
Johannes Holvitie, Ville Leppanen, Sami Hyrynsalmi, Technical Debt and the Effect of Agile Software Development Practices on It - An Industry Practitioner Survey 2014 Sixth International Workshop on Managing Technical Debt. pp. 35- 42 ,(2014) , 10.1109/MTD.2014.8
Steve McGregory, Preparing for the next DDoS attack Network Security. ,vol. 2013, pp. 5- 6 ,(2013) , 10.1016/S1353-4858(13)70058-8