Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

Open, programmable, and virtualized 5G networks: State-of-the-art and the road ahead

L Bonati, M Polese, S D'Oro, S Basagni, T Melodia - Computer Networks, 2020 - Elsevier
Fifth generation (5G) cellular networks will serve a wide variety of heterogeneous use cases,
including mobile broadband users, ultra-low latency services and massively dense …

Evolving container to unikernel for edge computing and applications in process industry

S Chen, M Zhou - Processes, 2021 - mdpi.com
Industry 4.0 promotes manufacturing and process industry towards digitalization and
intellectualization. Edge computing can provide delay-sensitive services in industrial …

A comparative evaluation of edge cloud virtualization technologies

P Valsamas, L Mamatas… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Edge cloud computing is a crucial enabler for applications or network services with stringent
communication requirements in the 5G networks and beyond era. Although edge compute …

A hybrid SDN solution for mobile networks

R Silva, D Santos, F Meneses, D Corujo, RL Aguiar - Computer Networks, 2021 - Elsevier
Abstract The adoption of Software Defined Networking (SDN) has encountered resistance
mainly due to its disruptive nature for current deployed networks. In order to allow a …

Validation and Benchmarking of CNFs in OSM for pure Cloud Native applications in 5G and beyond

A Pino, P Khodashenas, X Hesselbach… - 2021 International …, 2021 - ieeexplore.ieee.org
Cloud Native (CN) in 5G systems has been identified as a pivotal candidate for operational
and capital expenditure savings as well as for improvements in system agility and services …

Performance evaluation of a firewall service based on virtualized IncludeOS unikernels

T Kurek, M Niemiec, A Lason - Scientific Reports, 2024 - nature.com
Network function virtualization technology has long moved beyond the experimental phase
to become a standard in the implementation of modern telecommunications networks. It is …

Energy-efficient virtual security function placement in NFV-enabled networks

S Demirci, S Sagiroglu, M Demirci - Sustainable Computing: Informatics …, 2021 - Elsevier
In network functions virtualization (NFV) environments, network security is provided with the
deployment of virtual security functions (VSF) on general-purpose servers to filter and …

On optimal placement of hybrid service function chains (SFCs) of virtual machines and containers in a generic edge-cloud continuum

F Carpio, W Bziuk, A Jukan - arXiv preprint arXiv:2007.04151, 2020 - arxiv.org
Traditionally, Network Function Virtualization (NFV) has been implemented to run on Virtual
Machines (VMs) in form of Virtual Network Functions (VNFs). More recently, the so-called …

Testing virtual network functions auto-scaling using open-source management and orchestration

AU Rehman, RL Aguiar… - 2021 Telecoms …, 2021 - ieeexplore.ieee.org
Recently, the open-source management and orchestration (OSM) platform has attracted
significant interest from academia and industry, potentially providing network function …