Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
Jialei ZhangZheng YanShufan FeiMingjun WangTieyan LiHaiguang WangPublished in: IEEE Netw. (2022)
Keyphrases
- end to end
- high bandwidth
- physical layer
- ad hoc networks
- access control
- admission control
- wireless ad hoc networks
- multipath
- application layer
- key management
- content delivery
- intrusion detection
- network security
- communication systems
- network management
- multi hop
- congestion control
- transport layer
- information security
- rate allocation
- service delivery
- resource constrained
- security policies
- resource utilization
- motion estimation