TY - JOUR AU - Jaber, M. AU - Imran, M. A. AU - Tafazolli, R. AU - Tukmanov, A. PY - 2016 DA - 2016// TI - 5g backhaul challenges and emerging research directions: A survey JO - IEEE Access VL - 4 UR - https://doi.org/10.1109/ACCESS.2016.2556011 DO - 10.1109/ACCESS.2016.2556011 ID - Jaber2016 ER - TY - CHAP AU - Mesogiti, I. AU - Theodoropoulou, E. AU - Filis, K. AU - Lyberopoulos, G. AU - Ropodi, A. AU - Tsagkaris, K. AU - Demestichas, P. AU - Pleros, N. AU - Kalfas, G. AU - Vagionas, C. PY - 2018 DA - 2018// TI - Fiber-wireless fronthaul/backhaul network architectures for 5g BT - Paper presented at the 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) PB - IEEE CY - Barcelona ID - Mesogiti2018 ER - TY - STD TI - P. Amini, J. A. A. Emmanuel, U.S. Patent 10278179B2, Dedicated backhaul link for a robust wireless mesh network. Google Patents (2019). Patent App. 10/278, US, 179. ID - ref3 ER - TY - JOUR AU - Ge, X. i. a. o. h. u. AU - Tu, S. o. n. g. AU - Mao, G. u. o. q. i. a. n. g. AU - Lau, V. i. n. c. e. n. t. K. N. AU - Pan, L. i. n. g. h. u. i. PY - 2019 DA - 2019// TI - Cost Efficiency Optimization of 5G Wireless Backhaul Networks JO - IEEE Transactions on Mobile Computing VL - 18 UR - https://doi.org/10.1109/TMC.2018.2886897 DO - 10.1109/TMC.2018.2886897 ID - Ge2019 ER - TY - JOUR AU - Alzenad, M. AU - Shakir, M. Z. AU - Yanikomeroglu, H. AU - Alouini, M. -. S. PY - 2018 DA - 2018// TI - Fso-based vertical backhaul/fronthaul framework for 5g+ wireless networks JO - IEEE Commun. Mag. VL - 56 UR - https://doi.org/10.1109/MCOM.2017.1600735 DO - 10.1109/MCOM.2017.1600735 ID - Alzenad2018 ER - TY - JOUR AU - Siddique, U. AU - Tabassum, H. AU - Hossain, E. AU - Kim, D. I. PY - 2015 DA - 2015// TI - Wireless backhauling of 5g small cells: challenges and solution approaches JO - IEEE Wirel. Commun. VL - 22 UR - https://doi.org/10.1109/MWC.2015.7306534 DO - 10.1109/MWC.2015.7306534 ID - Siddique2015 ER - TY - STD TI - E. Lagunas, L. Lei, S. Chatzinotas, B. Ottersten, in IEEE Wireless Communications and Networking Conference, Marrakech, Morocco, April 2019. Power and flow assignment for 5g integrated terrestrial-satellite backhaul networks (IEEE, 2019), pp. 1–6. https://doi.org/10.1109/wcnc.2019.8885662. ID - ref7 ER - TY - JOUR AU - Choudhary, G. AU - Kim, J. AU - Sharma, V. PY - 2018 DA - 2018// TI - Security of 5g-mobile backhaul networks: A survey JO - J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) VL - 9 ID - Choudhary2018 ER - TY - CHAP AU - Nguyen, H. u. y. T. AU - Nguyen, N. a. m. -. P. h. o. n. g. AU - Duong, T. r. u. n. g. Q. AU - Hwang, W. o. n. -. J. o. o. PY - 2019 DA - 2019// TI - Physical Layer Security for Ultra-dense Networks under Unreliable Backhaul Connection BT - Ultra-dense Networks for 5G and Beyond PB - Sons, Ltd CY - Chichester, UK UR - https://doi.org/10.1002/9781119473756.ch10 DO - 10.1002/9781119473756.ch10 ID - Nguyen2019 ER - TY - JOUR AU - Kotenko, I. V. AU - Kolomeets, M. AU - Chechulin, A. AU - Chevalier, Y. PY - 2018 DA - 2018// TI - A visual analytics approach for the cyber forensics based on different views of the network traffic JO - JoWUA VL - 9 ID - Kotenko2018 ER - TY - JOUR AU - Gupta, T. AU - Choudhary, G. AU - Sharma, V. PY - 2018 DA - 2018// TI - A survey on the security of pervasive online social networks (posns) JO - J. Internet Serv. Inf. Secur. (JISIS) VL - 8 ID - Gupta2018 ER - TY - JOUR AU - Kao, Y. -. C. AU - Liu, J. -. C. AU - Wang, Y. -. H. AU - Chu, Y. -. H. AU - Tsai, S. -. C. AU - Lin, Y. -. B. PY - 2019 DA - 2019// TI - Automatic blocking mechanism for information security with sdn JO - J. Internet Serv. Inf. Secur. (JISIS) VL - 9 ID - Kao2019 ER - TY - JOUR AU - Renugadevi, N. AU - Mala, C. PY - 2015 DA - 2015// TI - Improved group key agreement for emergency cognitive radio mobile ad hoc networks JO - JoWUA VL - 6 ID - Renugadevi2015 ER - TY - JOUR AU - Campioni, F. AU - Choudhury, S. AU - Al-Turjman, F. PY - 2019 DA - 2019// TI - Scheduling rfid networks in the iot and smart health era JO - J. Ambient Intell. Human Comput. VL - 10 ID - Campioni2019 ER - TY - JOUR AU - Liyanage, M. AU - Ylianttila, M. AU - Gurtov, A. PY - 2014 DA - 2014// TI - A case study on security issues in lte backhaul and core networks JO - Case Studies in Secure Computing: Achievements and Trends VL - 1 UR - https://doi.org/10.1201/b17352-10 DO - 10.1201/b17352-10 ID - Liyanage2014 ER - TY - STD TI - P. Nikander, J. Melen, A Bound End-to-End Tunnel (BEET) mode for ESP: draft-nikander-esp-beet-mode-09. Work in Progress (2007). ID - ref16 ER - TY - STD TI - C. Kaufman, P. Hoffman, Y. Nir, P. Eronen, Internet key exchange protocol version 2 (ikev2) (RFC Editor, 2010). http://www.rfc-editor.org/rfc/rfc7296. Accessed 15 Sept 2019. UR - http://www.rfc-editor.org/rfc/rfc7296 ID - ref17 ER - TY - STD TI - P. Eronen, Ikev2mobility andmultihoming protocol (mobike) (RFC Editor, 2006). http://www.rfc-editor.org/rfc/rfc4555. Accessed 15 Sept 2019. UR - http://www.rfc-editor.org/rfc/rfc4555 ID - ref18 ER - TY - STD TI - R. Moskowitz, P. Nikander, P. Jokela, T. Henderson, Host identity protocol (RFC Editor, 2008). http://www.rfc-editor.org/rfc/rfc7401. Accessed 15 Sept 2019. UR - http://www.rfc-editor.org/rfc/rfc7401 ID - ref19 ER - TY - JOUR AU - Al-Turjman, F. AU - Zahmatkesh, H. AU - Mostarda, L. PY - 2019 DA - 2019// TI - Quantifying uncertainty in internet of medical things and big-data services using intelligence and deep learning JO - IEEE Access VL - 7 UR - https://doi.org/10.1109/ACCESS.2019.2931637 DO - 10.1109/ACCESS.2019.2931637 ID - Al-Turjman2019 ER - TY - JOUR AU - Sharma, V. AU - You, I. AU - Leu, F. -. Y. AU - Atiquzzaman, M. PY - 2018 DA - 2018// TI - Secure and efficient protocol for fast handover in 5g mobile xhaul networks JO - J. Netw. Comput. Appl. VL - 102 UR - https://doi.org/10.1016/j.jnca.2017.11.004 DO - 10.1016/j.jnca.2017.11.004 ID - Sharma2018 ER - TY - STD TI - V. Sharma, Y. Ko, J. Kim, I. You, Security management for backhaul-aware 5g-v2x. arXiv preprint arXiv:1811.08273 (2018). ID - ref22 ER - TY - STD TI - J. Arkko, H. Haverinen, Extensible authentication protocolmethod for 3rd generation authentication and key agreement (eap-aka) (RFC Editor, 2006). http://www.rfc-editor.org/rfc/rfc4187. Accessed 15 Sept 2019. UR - http://www.rfc-editor.org/rfc/rfc4187 ID - ref23 ER - TY - CHAP AU - Namal, S. AU - Gurtov, A. AU - Bennis, M. PY - 2011 DA - 2011// TI - Securing the backhaul for mobile and multi-homed femtocells BT - Paper presented at the 2011 Future Network & Mobile Summit PB - IEEE CY - Warsaw ID - Namal2011 ER - TY - STD TI - M. Liyanage, A. Gurtov, in 2012 IEEE Vehicular Technology Conference (VTC Fall), Quebec City, QC, Canada. Secured vpn models for lte backhaul networks (IEEE, 2012), pp. 1–5. https://doi.org/10.1109/vtcfall.2012.6399037. ID - ref25 ER - TY - JOUR AU - Liyanage, M. AU - Kumar, P. AU - Ylianttila, M. AU - Gurtov, A. PY - 2016 DA - 2016// TI - Novel secure vpn architectures for lte backhaul networks JO - Secur. Commun. Netw. VL - 9 UR - https://doi.org/10.1002/sec.1411 DO - 10.1002/sec.1411 ID - Liyanage2016 ER - TY - JOUR AU - Gritti, C. AU - Önen, M. AU - Molva, R. AU - Susilo, W. AU - Plantard, T. PY - 2018 DA - 2018// TI - Device identification and personal data attestation in networks JO - J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) VL - 9 ID - Gritti2018 ER - TY - CHAP AU - Choudhary, G. a. u. r. a. v. AU - Sharma, V. i. s. h. a. l. PY - 2019 DA - 2019// TI - A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks BT - 5G Enabled Secure Wireless Networks PB - Springer International Publishing CY - Cham UR - https://doi.org/10.1007/978-3-030-03508-2_3 DO - 10.1007/978-3-030-03508-2_3 ID - Choudhary2019 ER - TY - JOUR AU - Danny, D. AU - Yao, A. C. PY - 1983 DA - 1983// TI - On the security of public key protocols JO - IEEE Trans. Inf. Theory VL - 29 UR - https://doi.org/10.1109/TIT.1983.1056650 DO - 10.1109/TIT.1983.1056650 ID - Danny1983 ER - TY - JOUR AU - Burrows, M. AU - Abadi, M. AU - Needham, R. M. PY - 1989 DA - 1989// TI - A logic of authentication JO - Proc. R. Soc. Lond. A Math. Phys. Sci. VL - 426 UR - https://doi.org/10.1098/rspa.1989.0125 DO - 10.1098/rspa.1989.0125 ID - Burrows1989 ER - TY - STD TI - P. Syverson, I. Cervesato, in Foundations of Security Analysis and Design, Lecture Notes in Computer Science, 2171. The Logic of Authentication Protocols (SpringerBerlin, FOSAD 2000), pp. 63–137. ID - ref31 ER - TY - STD TI - C. J. Cremers, in Computer Aided Verification. CAV 2008. Lecture Notes in Computer Science, 5123. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (SpringerBerlin, 2008), pp. 414–418. https://doi.org/10.1007/978-3-540-70545-1_38. ID - ref32 ER - TY - JOUR AU - You, I. AU - Hori, Y. AU - Sakurai, K. PY - 2011 DA - 2011// TI - Enhancing svo logic for mobile ipv6 security protocols JO - JoWUA VL - 2 ID - You2011 ER - TY - JOUR AU - You, I. AU - Lee, J. -. H. PY - 2017 DA - 2017// TI - Spfp: Ticket-based secure handover for fast proxy mobile ipv6 in 5g networks JO - Comput. Netw. VL - 129 UR - https://doi.org/10.1016/j.comnet.2017.05.009 DO - 10.1016/j.comnet.2017.05.009 ID - You2017 ER - TY - JOUR AU - Shin, D. AU - Sharma, V. AU - Kim, J. AU - Kwon, S. AU - You, I. PY - 2017 DA - 2017// TI - Secure and efficient protocol for route optimization in pmipv6-based smart home iot networks JO - IEEE Access VL - 5 UR - https://doi.org/10.1109/ACCESS.2017.2710379 DO - 10.1109/ACCESS.2017.2710379 ID - Shin2017 ER - TY - CHAP AU - Meadows, C. A. PY - 1994 DA - 1994// TI - Formal verification of cryptographic protocols: A survey BT - Advances in Cryptology - ASIACRYPT’94. ASIACRYPT, Lecture Notes in Computer Science PB - Springer CY - Berlin ID - Meadows1994 ER - TY - CHAP AU - Boyd, C. AU - Mao, W. PY - 1993 DA - 1993// TI - On a Limitation of BAN Logic BT - Advances in Cryptology - EUROCRYPT Š93. EUROCRYPT, Lecture Notes in Computer Science PB - Springer CY - Berlin ID - Boyd1993 ER - TY - CHAP AU - Cremers, C. AU - Mauw, S. PY - 2012 DA - 2012// TI - Chapter 4: Security Properties BT - Operational Semantics and Verification of Security Protocols, Information Security and Cryptography PB - Springer-Verlag CY - Berlin UR - https://doi.org/10.1007/978-3-540-78636-8_4 DO - 10.1007/978-3-540-78636-8_4 ID - Cremers2012 ER - TY - STD TI - D. Simon, B. Aboba, R. Hurst, The eap-tls authentication protocol (RFC Editor, 2008). http://www.rfc-editor.org/rfc/rfc5216.txt. Accessed 15 Sept 2019. UR - http://www.rfc-editor.org/rfc/rfc5216.txt ID - ref39 ER - TY - STD TI - H. Tschofenig, D. Kroeselberg, A. Pashalidis, Y. Ohba, F. Bersani, The extensible authentication protocol-internet key exchange protocol version 2 (eap-ikev2) method (RFC Editor, 2008). http://www.rfc-editor.org/rfc/rfc5106.txt. Accessed 15 Sept 2019. UR - http://www.rfc-editor.org/rfc/rfc5106.txt ID - ref40 ER - TY - JOUR AU - Nikander, P. AU - Gurtov, A. AU - Henderson, T. R. PY - 2010 DA - 2010// TI - Host identity protocol (hip): connectivity, mobility, multi-homing, security, and privacy over ipv4 and ipv6 networks JO - IEEE Commun. Surv. Tutorials VL - 12 UR - https://doi.org/10.1109/SURV.2010.021110.00070 DO - 10.1109/SURV.2010.021110.00070 ID - Nikander2010 ER -