Page 291 - Kaleidoscope Academic Conference Proceedings 2024
P. 291
Innovation and Digital Transformation for a Sustainable World
Networks[J].IEEE Communications Magazine,
REFERENCES 2019, 57(10):63-69.
[1] ETSI GS NFV 001:2013, Network Functions [15]Abdelwahab S , Hamdaoui B , Guizani M ,et
Virtualisation (NFV); Use Cases [S], ETSI. al.Network function virtualization in 5G[J].IEEE
Communications Magazine, 2016, 54(4):84-91.
[2] ETSI GS NFV 002:2014, Network Functions
Virtualisation (NFV); Architectural Framework
[S], ETSI.
[3] ETSI GS NFVSOL 013:2017, Network Functions
Virtualisation (NFV) Release 3; Security; Security
Management and Monitoring specification [S],
ETSI.
[4] ETSI GR NFVSEC 018:2019, Network Functions
Virtualisation (NFV); Security; Report on NFV
Remote Attestation Architecture [S], ETSI.
[5] ETSI GS NFVSEC 022:2019, Network Functions
Virtualisation (NFV) Release 2; Security; Access
Token Specification for API Access [S], ETSI.
[6] [ITU-T Y.3300], Recommendation ITU-T
Y.3300:2014, Framework of softwaredefined
networking.
[7] Yang W , Fung C .A survey on security in network
functions virtualization[C]//Netsoft Conference &
Workshops.IEEE, 2016:15-19.
[8] Yu R , Xue G , Kilari V T ,et al.Network function
virtualization in the multi-tenant cloud[J].Network
IEEE, 2015, 29(3):42-47.
[9] Zheng J , Tian C , Dai H ,et al.Optimizing NFV
Chain Deployment in Software-Defined Cellular
Core[J].IEEE Journal on Selected Areas in
Communications, 2020, 38(2):248-262.
[10]Han B , Gopalakrishnan V , Ji L ,et al.Network
function virtualization: Challenges and
opportunities for innovations[J].IEEE
Communications Magazine, 2015, 53(2):90-97.
[11]Lal S , Taleb T , Dutta A .NFV: Security Threats
and Best Practices[J].IEEE Communications
Magazine, 2017, PP(8):2-8.
[12]Aljuhani A , Alharbi T .Virtualized Network
Functions security attacks and
vulnerabilities[J].IEEE, 2017:1-4.
[13]Liyanage M , Ahmed I , Okwuibe J ,et
al.Enhancing Security of Software Defined Mobile
Networks[J].IEEE Access, 2017, 5(99):9422-9438.
[14]Yigit B , Gur G , Tellenbach B ,et al.Secured
Communication Channels in Software-Defined
– 247 –