Edge-Intelligence-Empowered, Unified Authentication and Trust Evaluation for Heterogeneous Beyond 5G Systems

2021 ◽  
Vol 28 (2) ◽  
pp. 78-85
Author(s):  
Qimei Cui ◽  
Zengbao Zhu ◽  
Wei Ni ◽  
Xiaofeng Tao ◽  
Ping Zhang
2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


2009 ◽  
Vol 29 (6) ◽  
pp. 1636-1639
Author(s):  
Bo LANG ◽  
Kai LEI ◽  
Chuan JIANG ◽  
Jing-hui ZHANG

Author(s):  
Shihab Jimaa ◽  
Jawahir Al-Ali

Background: The 5G will lead to a great transformation in the mobile telecommunications sector. Objective: The huge challenges being faced by wireless communications such as the increased number of users have given a chance for 5G systems to be developed and considered as an alternative solution. The 5G technology will provide a higher data rate, reduced latency, more efficient power than the previous generations, higher system capacity, and more connected devices. Method: It will offer new different technologies and enhanced versions of the existing ones, as well as new features. 5G systems are going to use massive MIMO (mMIMO), which is a promising technology in the development of these systems. Furthermore, mMIMO will increase the wireless spectrum efficiency and improve the network coverage. Result: In this paper we present a brief survey on 5G and its technologies, discuss the mMIMO technology with its features and advantages, review the mMIMO capacity and energy efficiency and also presents the recent beamforming techniques. Conclusion: Finally, simulation of adopting different mMIMO detection algorithms are presented, which shows the alternating direction method of multipliers (ADMM)-based infinity-norm (ADMIN) detector has the best performance.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


2021 ◽  
Vol 70 ◽  
pp. 100-114
Author(s):  
Gao Liu ◽  
Zheng Yan ◽  
Wei Feng ◽  
Xuyang Jing ◽  
Yaxing Chen ◽  
...  

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 117772-117783
Author(s):  
Rasha Jamal Atwa ◽  
Paola Flocchini ◽  
Amiya Nayak

Author(s):  
Taner Metin ◽  
Marc Emmelmann ◽  
Marius Corici ◽  
Volker Jungnickel ◽  
Christoph Kottke ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document