Digital Library

cab1

 
Title:      BEYOND OPTIMIZATION: RETHINKING SECURE RESOURCE ALLOCATION IN B5G NETWORKS UNDER ADVERSARIAL CONDITIONS
Author(s):      Sameer Ali and Helena Rifà-Pous
ISBN:      978-989-8704-71-9
Editors:      Paula Miranda and Pedro Isaías
Year:      2025
Edition:      Single
Keywords:      B5G Networks, Resource Allocation, Slice Spoofing, Zero-Knowledge Proofs, ILP Optimization, Network Security
Type:      Reflection Paper
First Page:      294
Last Page:      297
Language:      English
Cover:      cover          
Full Contents:      if you are a member please login Download
Paper Abstract:      The future mobile networks are transforming into multidimensional, adaptive networks, aka beyond 5G (B5G), where the digital services are delivered over network slices whose network definition is virtual. It is also important that such slices are available to users with a wide variety of needs on a safe and efficient basis. The current solutions are mainly aimed at ensuring that things are faster and reliable; however, in the majority of situations, they fail to give much consideration to the security threat from malicious users. This reflection paper examines the limitations of existing approaches and argues for embedding security mechanisms directly within resource allocation frameworks. It explores the integration of zero-knowledge proofs (ZKPs) for user verification and integer linear programming (ILP) for secure allocation, forming a unified adversary-aware model. This perspective encourages a shift from purely performance-driven strategies toward security-by-design methods capable of addressing dynamic threats in real time.
   

Social Media Links

Search

Login