{"id":"https://openalex.org/W2902097660","doi":"https://doi.org/10.1109/bds/hpsc/ids18.2018.00038","title":"An Approach for End-to-End (E2E) Security of 5G Applications","display_name":"An Approach for End-to-End (E2E) Security of 5G Applications","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2902097660","doi":"https://doi.org/10.1109/bds/hpsc/ids18.2018.00038","mag":"2902097660"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/bds/hpsc/ids18.2018.00038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010941240","display_name":"K. Anitha Kumari","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"K. Anitha Kumari","raw_affiliation_strings":["Dept. of Inf. Technol., PSG College of Technology, Coimbatore, Tamil Nadu, IN"],"affiliations":[{"raw_affiliation_string":"Dept. of Inf. Technol., PSG College of Technology, Coimbatore, Tamil Nadu, IN","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016317053","display_name":"G. Sudha Sadasivam","orcid":"https://orcid.org/0000-0001-6845-1869"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Sudha Sadasivam","raw_affiliation_strings":["Dept. of Comput. Sci. Eng., PSG College of Technology, Coimbatore, Tamil Nadu, IN"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci. Eng., PSG College of Technology, Coimbatore, Tamil Nadu, IN","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108670049","display_name":"S. Gowri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Shymala Gowri","raw_affiliation_strings":["Dept. of Inf. Technol., PSG College of Technology, Coimbatore, Tamil Nadu, IN"],"affiliations":[{"raw_affiliation_string":"Dept. of Inf. Technol., PSG College of Technology, Coimbatore, Tamil Nadu, IN","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055309951","display_name":"S. Akash","orcid":null},"institutions":[],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sebastin Arockia Akash","raw_affiliation_strings":["Myntra Designs, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Myntra Designs, Bangalore, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084786059","display_name":"E.G. Radhika","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"E.G. Radhika","raw_affiliation_strings":["Dept. of Inf. Technol., PSG College of Technology, Coimbatore, Tamil Nadu, IN"],"affiliations":[{"raw_affiliation_string":"Dept. of Inf. Technol., PSG College of Technology, Coimbatore, Tamil Nadu, IN","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.556,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.680245,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"133","last_page":"138"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9871,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9834,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.57237804},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.50567293}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75565004},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.60520357},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.57237804},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.50567293},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.49724248},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.46222982},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.442529},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.44042554},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4161628},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.39265725},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3782525},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.32616434},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.31153917},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.080589354},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/bds/hpsc/ids18.2018.00038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.46,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W1985997828","https://openalex.org/W2343648195","https://openalex.org/W2401188266","https://openalex.org/W2523523249","https://openalex.org/W2560683465","https://openalex.org/W2587310998","https://openalex.org/W2758695534","https://openalex.org/W2962819974"],"related_works":["https://openalex.org/W3112437670","https://openalex.org/W2476589454","https://openalex.org/W2355750742","https://openalex.org/W2289549784","https://openalex.org/W2273419341","https://openalex.org/W2185894447","https://openalex.org/W2165319213","https://openalex.org/W2081422519","https://openalex.org/W1978543086","https://openalex.org/W109663246"],"abstract_inverted_index":{"As":[0],"5G":[1,28,80,85,104],"transitions":[2],"from":[3],"an":[4],"industrial":[5],"vision":[6],"to":[7,30,96],"a":[8,38,79,88,98],"tangible,":[9],"next-generation":[10],"mobile":[11],"technology,":[12],"security":[13,32,42,53,60,66,118,124,143],"remains":[14],"key":[15,71],"business":[16],"driver.":[17],"Heterogeneous":[18],"environment,":[19],"new":[20,31,103],"networking":[21],"paradigms":[22],"and":[23,40,57,73,119,142,153,158,165,172],"novel":[24],"use":[25],"cases":[26],"makes":[27],"vulnerable":[29],"threats.":[33],"This":[34,106],"in":[35],"turn":[36],"necessitates":[37],"flexible":[39],"dependable":[41],"mechanism.":[43],"End-to-End":[44],"(E2E)":[45],"data":[46],"protection":[47],"provides":[48,58],"better":[49],"security,":[50],"avoids":[51],"repeated":[52],"operations":[54],"like":[55],"encryption/decryption":[56],"differentiated":[59],"based":[61,133],"on":[62,134],"the":[63,113],"services.":[64,127],"E2E":[65,123],"deals":[67],"with":[68,116],"authentication,":[69],"integrity,":[70],"management":[72],"confidentiality.":[74],"The":[75,128,146],"attack":[76,93,139],"surface":[77],"of":[78,168],"system":[81],"is":[82,131,148],"larger":[83],"as":[84],"aims":[86],"for":[87,111,125,151],"heterogeneous":[89],"networked":[90],"society.":[91],"Hence":[92],"resistance":[94,140,154],"needs":[95],"be":[97],"design":[99],"consideration":[100],"when":[101],"defining":[102],"protocols.":[105],"framework":[107,130],"has":[108],"been":[109],"designed":[110],"accessing":[112],"manifold":[114],"applications":[115],"high":[117],"trust":[120],"by":[121],"offering":[122],"various":[126],"proposed":[129],"evaluated":[132,150],"computation":[135],"complexity,":[136,138],"communication":[137],"rate":[141],"defensive":[144],"rate.":[145],"protocol":[147],"also":[149],"correctness,":[152],"against":[155],"passive,":[156],"active":[157],"dictionary":[159],"attacks":[160],"using":[161],"random":[162],"oracle":[163],"model":[164],"Automated":[166],"Validation":[167],"Internet":[169],"Security":[170],"Protocols":[171],"Applications":[173],"(AVISPA)":[174],"tool.":[175]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2902097660","counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2024-12-24T08:31:35.617353","created_date":"2018-12-11"}