└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # 5G Reading List 2 | 3 | ## General 4 | 5 | - 2020, SIGCOMM, [Beyond 5G: Reliable Extreme Mobility Management](https://dl.acm.org/doi/pdf/10.1145/3387514.3405873) 6 | - 2020, SIGCOMM, [Understanding Operational 5G: A First Measurement Study on Its Coverage, Performance and Energy Consumption](https://dl.acm.org/doi/pdf/10.1145/3387514.3405882) 7 | - 2020, DARPA, [Open Programmable Secure 5G (OPS-5G) (DARPA Grant)](https://beta.sam.gov/api/prod/opps/v3/opportunities/resources/files/9e80fb2d56584044b5cc3cfd6e36644d/download?api_key=null&status=archived&token=) 8 | - 2018, ARES, [Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service](https://dl.acm.org/doi/pdf/10.1145/3230833.3233251) 9 | - 2017, IEEE Access, [A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges](https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8141874) 10 | - 2015, IEEE Access, [A Survey of 5G Network: Architecture and Emerging Technologies](https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7169508) 11 | 12 | 13 | ## Security 14 | 15 | ### General 16 | 17 | - 2018, Cisco, [5G Security Innovation with Cisco](https://www.cisco.com/c/dam/en/us/solutions/collateral/service-provider/service-provider-security-solutions/5g-security-innovation-with-cisco-wp.pdf) 18 | - 2017, CSCN, [5G security: Analysis of threats and solutions](https://ieeexplore.ieee.org/document/8088621) 19 | 20 | ### BYOD 21 | 22 | - 2020, USENIX Security [Programmable In-Network Security for Context-aware BYOD Policies](https://arxiv.org/pdf/1908.01405.pdf) 23 | 24 | ### Pysical 25 | 26 | - 2015, IEEE Communications, [Safeguarding 5G wireless communication networks using physical layer security](https://ieeexplore.ieee.org/abstract/document/7081071) 27 | 28 | 29 | ### Slicing 30 | 31 | - 2020, ATC, [Fine-Grained Isolation for Scalable, Dynamic, Multi-tenant Edge Clouds](https://grace-liu.github.io/static/papers/20-ATC-edgeos.pdf) 32 | - 2020, IEEE Access, [Network Slicing: Recent Advances, Taxonomy, Requirements, and Open Research Challenges](https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9003208) 33 | - 2020, ONDM, [Network Slicing Automation: Challenges and Benefits](https://research.chalmers.se/publication/516409/file/516409_Fulltext.pdf) 34 | - 2020, IFIPAICT, [Dynamic Network Slicing: Challenges and Opportunities](https://link.springer.com/content/pdf/10.1007%2F978-3-030-49190-1_5.pdf) 35 | - 2020, IEEE Access, [5G Network Slicing: A Security Overview](https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9099823) 36 | - 2020, Computer Networks, [5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges](https://www.sciencedirect.com/science/article/pii/S1389128619304773) 37 | - 2019, 5GTango, [5G Network Slicing in 5GTANGO](https://www.5gtango.eu/blog/36-5g-network-slicing-in-5gtango.html) 38 | - 2019, Ericsson, [Serving up secure IoT with network slicing security](https://www.ericsson.com/en/blog/2019/9/future-network-slicing-security-iot) 39 | - 2019, ITL, [Network slicing security: Challenges and directions](https://onlinelibrary.wiley.com/doi/pdf/10.1002/itl2.125) 40 | - 2019, IEEE Networking Letters, [Optimal Slice Allocation in 5G Core Networks](https://arxiv.org/pdf/1802.04655.pdf) 41 | - 2019, ICTC, [Multi-access Edge Computing in 5G Network Slicing: Opportunities and Challenges](https://koreauniv.pure.elsevier.com/en/publications/multi-access-edge-computing-in-5g-network-slicing-opportunities-a) 42 | - 2017, IEEE Communications, [Network slicing for 5G with SDN/NFV: Concepts, architectures, and challenges](https://ieeexplore.ieee.org/document/7926921) 43 | - 2016, EuCNC, [Towards Micro-Segmentation in 5G Network Security](https://www.researchgate.net/profile/Olli_Maemmelae/publication/310447736_Towards_Micro-Segmentation_in_5G_Network_Security/links/582d678b08aef19cb811738b/Towards-Micro-Segmentation-in-5G-Network-Security.pdf) 44 | - 2016, TWC, [Economics of 5G Network Slicing: Optimal and Revenue-based allocation of radio and core resources in 5G](https://nms.kcl.ac.uk/toktam.mahmoodi/files/TWC-16.pdf) 45 | - 2016, ICC, [Network slicing in 5G: an Auction-Based Model](https://nms.kcl.ac.uk/toktam.mahmoodi/files/ICC17-slicing.pdf) 46 | - 2015, Workshop on Mobility in the Evolving Internet Architecture, [Network Store: Exploring Slicing in Future 5G Networks](http://www.eurecom.fr/en/publication/4641/download/cm-publi-4641.pdf) 47 | 48 | 49 | ### Zero Trust 50 | 51 | - 2020, NIST, [Zero Trust Architecture](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207-draft2.pdf) 52 | - 2020, CS, [Who Needs Trust for 5G?](https://arxiv.org/pdf/2005.00862.pdf) 53 | - 2019, USDSB, [Defense Science Board Task Force: Defense Applications of 5G Network Technology](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C41&as_ylo=2019&q=5g+network+zero+trust&btnG=) 54 | - 2018, IEEE JSAC, [Efficient and Secure Service-oriented Authentication Supporting Network Slicing for 5G-enabled IoT](https://pdfs.semanticscholar.org/11ab/80bff7cb93ed171fd5f47924bc874fd225e2.pdf) 55 | 56 | 57 | ### SDN & NFV 58 | 59 | - 2020, NDSS, [SVLAN: Secure & Scalable Network Virtualization](https://www.ndss-symposium.org/wp-content/uploads/2020/02/24162-paper.pdf) 60 | - 2020, arXiv preprint, [Fault Tolerance for Service Function Chains](https://arxiv.org/pdf/2001.03321.pdf) 61 | - 2019, IEEE Communications, [MANOaaS: A Multi-Tenant NFV MANO for 5G Network Slices](https://e-archivo.uc3m.es/bitstream/handle/10016/28823/MANOaaS_IEEECM_2019_ps.pdf?sequence=1) 62 | - 2017, IEEE Communication, [The unavoidable convergence of NFV, 5G, and fog: a model-driven approach to bridge cloud and edge](https://ieeexplore.ieee.org/document/8004150) 63 | - 2017, IEEE JSAC, [NFV and SDN—Key technology enablers for 5G networks](https://ieeexplore.ieee.org/document/8060513) 64 | - 2017, ICIN, [SDN & NFV in 5G: Advancements and challenges](https://ieeexplore.ieee.org/document/7899398) 65 | - 2017, ICIN, [NFV enabling network slicing for 5G](https://ieeexplore.ieee.org/document/7899415) 66 | - 2017, IEEE Transactions, [Statelet-Based Efficient and Seamless NFV State Transfer](https://ieeexplore.ieee.org/abstract/document/8058500) 67 | - 2016, NFV-SDN, [Policy based virtualised security architecture for SDN/NFV enabled 5G access networks](https://ieeexplore.ieee.org/document/7919474) 68 | - 2016, ICNP, [Transparent flow migration for NFV](https://ieeexplore.ieee.org/abstract/document/7784446) 69 | - 2016, SIGOPS, [U-HAUL: Efficient State Migration in NFV](https://dl.acm.org/doi/abs/10.1145/2967360.2967363) 70 | 71 | ### IoT 72 | 73 | - 2020, Applied Energy, [5G network-based Internet of Things for demand response in smart grid: A survey on application potential](https://huihongxun.github.io/files/Applied_Energy_Review_Paper_5G_and_DR.pdf) 74 | - 2018, IEEE Communications, [Efficient and Secure Service-oriented Authentication Supporting Network Slicing for 5G-enabled IoT](https://ece.uwaterloo.ca/~j25ni/Papers/JSAC18.pdf) 75 | 76 | ## Testing 77 | 78 | ### Testbed Ideas 79 | 80 | - [5G Pagoda](https://5g-pagoda.aalto.fi/) 81 | - [Open Baton](https://openbaton.github.io/) 82 | - [5G Playground](https://www.fokus.fraunhofer.de/go/en/fokus_testbeds/5g_playground) 83 | - [Open 5G Core](https://www.open5gcore.org/) 84 | - [Fabric Testbed](https://fabric-testbed.net/) 85 | 86 | 87 | 88 | 89 | 90 | Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. 91 | Protecting the 4G and 5G cellular paging protocols against security and privacy attacks 92 | http://homepage.divms.uiowa.edu/~comarhaider/ 93 | --------------------------------------------------------------------------------