5G-V2X: standardization, architecture, use cases, network-slicing, and edge-computing

2020 ◽  
Vol 26 (8) ◽  
pp. 6015-6041
Author(s):  
Shimaa A. Abdel Hakeem ◽  
Anar A. Hady ◽  
HyungWon Kim
Author(s):  
Luis M. Contreras ◽  
Samier Barguil ◽  
Ricard Vilalta ◽  
Victor López

AbstractNetwork slicing will permit offering to vertical customers tailored end-to-end logical networks in an on-demand fashion, on top of a common telecom infrastructure, achieving a Slices-as-a-Service (SlaaS) business model. This is possible due to the progressive introduction of network softwarization techniques, such as programmability and virtualization, into existing operational networks, enabling dynamic and flexible provision of slices. Those vertical customers could require the control not only of the network functions composing the end-to-end service, but also of the connectivity among them, e.g., for influencing the paths for steering traffic among function instances. However, this can be problematic since decisions from one vertical customer can collide with decisions from others. One aspect not yet sufficiently investigated is how to permit vertical customers to jointly control the service functions and the underlay connectivity, in such a way that could operate the allocated slice as if it was actually a dedicated network entirely for them. This paper explores some architectural proposition in this respect illustrated with some potential use cases and it provides an example of the provision of SlaaS for a vertical customer.


2022 ◽  
Vol 54 (9) ◽  
pp. 1-37
Author(s):  
Pasika Ranaweera ◽  
Anca Jurcut ◽  
Madhusanka Liyanage

The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.


Author(s):  
Asma Islam Swapna ◽  
Raphael Vicente Rosa ◽  
Christian Esteve Rothenberg ◽  
Ilias Sakellariou ◽  
Lefteris Mamatas ◽  
...  

2019 ◽  
Vol 65 (2) ◽  
pp. 444-453 ◽  
Author(s):  
Qi Wang ◽  
Jose Alcaraz-Calero ◽  
Ruben Ricart-Sanchez ◽  
Maria Barros Weiss ◽  
Anastasius Gavras ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document