{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T14:45:14Z","timestamp":1760453114280,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.23919\/wac50355.2021.9559450","type":"proceedings-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:32:30Z","timestamp":1633908750000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["5G and beyond telco cloud: architecture and cybersecurity challenges"],"prefix":"10.23919","author":[{"given":"Yonas Engida","family":"Gebremariam","sequence":"first","affiliation":[]},{"given":"Daniel Gerbi","family":"Duguma","sequence":"additional","affiliation":[]},{"given":"Hoon Yong","family":"Park","sequence":"additional","affiliation":[]},{"given":"Ye Neung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Bonam","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491212"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2018.1700063"},{"key":"ref33","first-page":"1","author":"hubbard","year":"2010","journal-title":"Top Threats to Cloud Computing V1 0"},{"key":"ref32","first-page":"67","article-title":"Policy Review in Attribute Based Access Control A Policy Machine Case Study","volume":"10","author":"lawa","year":"2020","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"journal-title":"5G Edge Security Technologies","year":"2020","author":"park","key":"ref31"},{"key":"ref30","first-page":"3","article-title":"Why would we get attacked? An analysis of attacker&#x2019;s aims behind DDoS attacks","volume":"11","author":"abhishta","year":"2020","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6212011"},{"journal-title":"Software Driven Networks Problem Statement Internet Eng Task Force","year":"2011","author":"nadeau","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref28","article-title":"sHype: Secure hypervisor approach to trusted virtualized systems","volume":"5","author":"sailer","year":"2005","journal-title":"Rep RC23511"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1341312.1341321"},{"key":"ref29","first-page":"905","article-title":"Security Threats in 5G Edge Computing Environments","author":"kim","year":"0","journal-title":"2020 International Conference on Information and Communication Technology Convergence (ICTC)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2971781"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2984318"},{"journal-title":"VMware","year":"0","key":"ref20"},{"year":"0","key":"ref22"},{"key":"ref21","article-title":"Technical Report","volume":"2","year":"2020","journal-title":"Cloud Native 5G Core Samsung 5G Core"},{"journal-title":"White Paper-Huawei Observation to NFV","year":"2014","key":"ref24"},{"journal-title":"Telco cloud transport network","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916180"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.5040\/9781350366862","article-title":"Cloud ran & the next-generation mobile network architecture","author":"brown","year":"2017","journal-title":"White Paper"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2017.8088621"},{"key":"ref56","first-page":"529","article-title":"On certain integrals of Lipschitz-Hankel type involving products of Bessel functions","volume":"a247","author":"isaksson","year":"2020","journal-title":"Secure federated learning in 5G mobile networks"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876023"},{"key":"ref54","first-page":"2160","article-title":"Explainable artificial intelligence (XAI) for 6G: Improving trust between human and machine","volume":"11","author":"guo","year":"2019","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3031966"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106871"},{"year":"0","key":"ref10"},{"key":"ref11","article-title":"Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSEC","volume":"11","author":"nowaczewski","year":"2020","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"ref12","first-page":"1","article-title":"5G core network security issues and attack classification from network protocol perspective","volume":"10","author":"kim","year":"2020","journal-title":"J Internet Services Inf Secur"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34957-8_7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.11591\/ijict.v9i2.pp117-139"},{"year":"0","key":"ref15"},{"key":"ref16","first-page":"127","article-title":"Telecommunications Role in the Economic Development and Sector Encouraging Policy Options","author":"markova","year":"2009","journal-title":"Liberalization and Regulation of the Telecommunications Sector in Transition Countries The Case of Russia"},{"key":"ref17","first-page":"88","article-title":"ETSI NFV management and orchestration-An overview","author":"ersue","year":"0","journal-title":"Presentation at IETF"},{"key":"ref18","article-title":"SDN in NFV architectural framework","author":"odini","year":"2016","journal-title":"IEEE Software Defined Networks Newsletter"},{"key":"ref19","first-page":"1","article-title":"Cloud RAN and MEC: A perfect pairing","author":"reznik","year":"2018","journal-title":"ETSI White Paper"},{"journal-title":"Tthe all-ip secure distributed telco cloud","year":"0","key":"ref4"},{"journal-title":"The telco cloud and sdn comparing nuage networks sdn to openstack neutron","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045397"},{"journal-title":"The four pillars of service edge transformation","year":"0","key":"ref5"},{"article-title":"Security for 4g and 5g cellular networks: A survey of existing authentication and privacy-preserving schemes","year":"2017","author":"ferrag","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7579021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1866898.1866905"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2017.8088621"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043575"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116152"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1243"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0115"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.276"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660353"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.17"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0115"}],"event":{"name":"2021 World Automation Congress (WAC)","start":{"date-parts":[[2021,8,1]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2021,8,5]]}},"container-title":["2021 World Automation Congress (WAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9559429\/9559420\/09559450.pdf?arnumber=9559450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:53:25Z","timestamp":1725904405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9559450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":56,"URL":"https:\/\/doi.org\/10.23919\/wac50355.2021.9559450","relation":{},"subject":[],"published":{"date-parts":[[2021,8,1]]}}}