Virtualized authentication, authorization and accounting (V-AAA) in 5G networks

Research output: Chapter in Book/Report/Conference proceedingOther chapter contributionpeer-review

15 Citations (Scopus)

Abstract

Virtualization, containerization and softwarization technologies enable telecommunication systems to realize multitenancy, multi-network slicing and multi-level services. However, the use of these technologies to such ends requires a redesign of the telecommunications network architecture that goes beyond the current long term evolution-Advanced (LTE-A). This paper proposes a novel hierarchical and distributed Virtualized Authentication, Authorization and Accounting (V-AAA) architecture for fifth-generation (5G) telecommunications systems, conceived to handle multi-Tenancy, multi-network slicing and multi-level services. It also contemplates a new hierarchical and distributed database architecture to inter-work with our 5G V-AAA, able to cope with the network flexibility, elasticity and traffic fluctuation implied in 5G. The sum achievement is the design of a new approach that can provide fast billing and multiple network services for authentication and authorization at the edge cloud.

Original languageEnglish
Title of host publication2017 IEEE Conference on Standards for Communications and Networking, CSCN 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages175-180
Number of pages6
ISBN (Electronic)9781538630709
DOIs
Publication statusPublished - 27 Oct 2017
Event2017 IEEE Conference on Standards for Communications and Networking, CSCN 2017 - Helsinki, Finland
Duration: 18 Sept 201720 Sept 2017

Conference

Conference2017 IEEE Conference on Standards for Communications and Networking, CSCN 2017
Country/TerritoryFinland
CityHelsinki
Period18/09/201720/09/2017

Keywords

  • 5G
  • AAA
  • access network
  • core network
  • virtualization

Fingerprint

Dive into the research topics of 'Virtualized authentication, authorization and accounting (V-AAA) in 5G networks'. Together they form a unique fingerprint.

Cite this