5G-ENSURE (2017). Deliverable D3.6 - 5G PPP Security
Enablers Open Specifications (v2.0). Technical report.
5G PPP Architecture WG (2017). View on 5G Architecture
(Version 2.0). Technical report.
5G PPP Security WG (2017). 5G PPP Phase 1 Security
Landscape. Technical report.
Agiwal, M., Roy, A., and Saxena, N. (2016). Next
generation 5g wireless networks: A comprehensive
survey. IEEE Communications Surveys Tutorials,
18(3):1617–1655.
Baltatu, M., Costa, L., and Lombardo, D. (2017). Privacy
Enhanced Identity Protection Enabler. 5G-ENSURE.
Deliverable D3.6 - 5G PPP Security Enablers Open
Specifications (v2.0). Technical report.
Docker Inc. (2017a). Docker compose - web documenta-
tion. https://docs.docker.com/compose/.
Docker Inc. (2017b). Web site. https://www.docker.com/.
Ericsson (2014). Network functions virtualization and soft-
ware management. Technical report.
Ericsson (2015a). 5G Security - Scenarios and Solutions.
Technical report.
Ericsson (2015b). 5G systems – Enabling Industry and So-
ciety Transformation. Technical report.
Freeman, J. (2015). Introducing streaming k-means
in Apache Spark 1.2 - The Databricks Blog.
https://databricks.com/blog/2015/01/28/introducing-
streaming-k-means-in-spark-1-2.html.
FreeRADIUS (2017). Web site. https://freeradius.org/.
Fulton III, S. M. (2015). Microsegmentation: How VMware
Addresses the Container Security Issue. The New
Stack. http://thenewstack.io/microsegmentation-how-
vmware-addresses-the-container-security-issue/.
Granjal, J., Monteiro, E., and Silva, J. S. (2015). Security
for the internet of things: A survey of existing proto-
cols and open research issues. IEEE Communications
Surveys Tutorials, 17(3):1294–1312.
Herzberg, A., Krawczyk, H., and Tsudik, G. (1994). On
travelling incognito. In Mobile Computing Systems
and Applications, 1994. WMCSA 1994. First Work-
shop on, pages 205–211. IEEE.
Huang, G. (2015). Three Requirements For True
Micro-Segmentation. Network Computing.
http://www.networkcomputing.com/networking/three-
requirements-true-micro-segmentation/1151379004.
Jover, R. P. (2013). Security attacks against the availability
of lte mobility networks: Overview and research di-
rections. In Wireless Personal Multimedia Communi-
cations (WPMC), 2013 16th International Symposium
on, pages 1–9. IEEE.
Kafka Project (2017). Web site. https://kafka.apache.org/.
Khan, A., Zugenmaier, A., Jurca, D., and Kellerer, W.
(2012). Network virtualization: a hypervisor for
the internet? IEEE Communications Magazine,
50(1):136–143.
Klaedtke, F. and Sforzin, A. (2017). Component-interaction
audits enabler. 5G-ENSURE. Deliverable D3.6 - 5G
PPP Security Enablers Open Specifications (v2.0).
Technical report.
Liang, C. and Yu, F. R. (2015). Wireless network virtualiza-
tion: A survey, some research issues and challenges.
IEEE Communications Surveys Tutorials, 17(1):358–
380.
Malinen, J. (2013a). hostapd: IEEE 802.11 AP,
IEEE 802.1X/WPA/WPA2/EAP/RADIUS authentica-
tor. Web site. https://w1.fi/hostapd/.
Malinen, J. (2013b). Linux WPA/WPA2/IEEE 802.1X Sup-
plicant. Web site. https://w1.fi/wpa supplicant/.
M
¨
ammel
¨
a, O., Hiltunen, J., Suomalainen, J., Ahola, K.,
Mannersalo, P., and Vehkaper
¨
a, J. (2016). Towards
Micro-Segmentation in 5G Network Security. In Eu-
ropean Conference on Networks and Communications
(EuCNC 2016). Workshop on Network Management,
Quality of Service and Security for 5G Networks.
Miller, L. and Soto, J. (2015). Micro-segmentation for
Dummies. Technical report, VMware.
Mininet Team (2017). Web site. http://mininet.org/.
Moby project (2017). Web site. https://mobyproject.org/.
NGMN Alliance (2016). Description of Network Slicing
Concept. Technical report.
Open vSwitch (2017). Web site. http://openvswitch.org/.
OpenEPC Project (2017). Web site.
http://www.openepc.com/.
OpenVirteX Project (2017). Web site. http://ovx.onlab.us/.
Ryu SDN Framework Community (2017). Web site.
https://osrg.github.io/ryu/.
Spark Project (2017a). Streaming K-Means Clustering -
Spark Documentation. https://spark.apache.org/docs/
latest/mllib-clustering.html#streaming-k-means.
Spark Project (2017b). Web site. https://spark.apache.org/.
Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., Mc-
Daniel, P., and La Porta, T. (2009). On cellular bot-
nets: measuring the impact of malicious devices on
a cellular network core. In Proceedings of the 16th
ACM conference on Computer and communications
security, pages 223–234. ACM.
VMware (2014). Data Center Micro-Segmentation: A
Software Defined Data Center Approach for a “Zero
Trust” Security Strategy. Technical report.
VMware (2017). NSX Network Virtualization and Security
Platform - web site. https://www.vmware.com/ prod-
ucts/nsx.
Wang, A., Iyer, M., Dutta, R., Rouskas, G. N., and Baldine,
I. (2013). Network virtualization: Technologies, per-
spectives, and frontiers. Journal of Lightwave Tech-
nology, 31(4):523–537.
IoTBDS 2018 - 3rd International Conference on Internet of Things, Big Data and Security
28