|
Title:
|
BEYOND OPTIMIZATION: RETHINKING SECURE RESOURCE ALLOCATION IN B5G NETWORKS UNDER ADVERSARIAL CONDITIONS |
|
Author(s):
|
Sameer Ali and Helena Rifà-Pous |
|
ISBN:
|
978-989-8704-71-9 |
|
Editors:
|
Paula Miranda and Pedro Isaías |
|
Year:
|
2025 |
|
Edition:
|
Single |
|
Keywords:
|
B5G Networks, Resource Allocation, Slice Spoofing, Zero-Knowledge Proofs, ILP Optimization, Network Security |
|
Type:
|
Reflection Paper |
|
First Page:
|
294 |
|
Last Page:
|
297 |
|
Language:
|
English |
|
Cover:
|
|
|
Full Contents:
|
if you are a member please login
|
|
Paper Abstract:
|
The future mobile networks are transforming into multidimensional, adaptive networks, aka beyond 5G (B5G), where the digital services are delivered over network slices whose network definition is virtual. It is also important that such slices are available to users with a wide variety of needs on a safe and efficient basis. The current solutions are mainly aimed at ensuring that things are faster and reliable; however, in the majority of situations, they fail to give much consideration to the security threat from malicious users. This reflection paper examines the limitations of existing approaches and argues for embedding security mechanisms directly within resource allocation frameworks. It explores the integration of zero-knowledge proofs (ZKPs) for user verification and integer linear programming (ILP) for secure allocation, forming a unified adversary-aware model. This perspective encourages a shift from purely performance-driven strategies toward security-by-design methods capable of addressing dynamic threats in real time. |
|
|
|
|
|
|