F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, Five disruptive technology directions for 5G, IEEE Communications Magazine, vol.52, issue.2, pp.74-80, 2014.
DOI : 10.1109/MCOM.2014.6736746

S. Andreev, Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap, IEEE Communications Magazine, vol.53, issue.9, pp.32-40, 2015.
DOI : 10.1109/MCOM.2015.7263370

URL : http://arxiv.org/abs/1509.09299

J. S. Vardakas, N. Zorba, C. Skianis, and C. V. Verikoukis, Performance Analysis of M2M Communication Networks for QoS-Differentiated Smart Grid Applications, 2015 IEEE Globecom Workshops (GC Wkshps), pp.1-6, 2015.
DOI : 10.1109/GLOCOMW.2015.7414116

S. Patel, C. Malhar, and K. Kapadiya, 5G: Future Mobile Technology-Vision 2020, International Journal of Computer Applications, vol.54, issue.17, pp.6-10, 2012.
DOI : 10.5120/8656-2264

J. G. Andrews, Seven ways that HetNets are a cellular paradigm shift, IEEE Communications Magazine, vol.51, issue.3, pp.136-144, 2013.
DOI : 10.1109/MCOM.2013.6476878

URL : http://www.ece.utexas.edu/%7Ejandrews/pubs/And_HetNet_CommMag2012_v3.pdf

A. Osseiran, Scenarios for 5G mobile and wireless communications: the vision of the METIS project, IEEE Communications Magazine, vol.52, issue.5, pp.26-35, 2014.
DOI : 10.1109/MCOM.2014.6815890

P. Trakas, F. Adelantado, and C. Verikoukis, A novel learning mechanism for traffic offloading with small cell as a service, 2015 IEEE International Conference on Communications (ICC), 2015.
DOI : 10.1109/ICC.2015.7249424

I. Giannoulakis, System architecture and aspects of SESAME: Small cEllS coordinAtion for Multi-tenancy and Edge services, 2nd IEEE Conference on Network Softwarization (NetSoft), Workshop on Software Defined 5G Networks (Soft5G), 2016.

D. Soldani and A. Manzalini, A 5G infrastructure for anything-as-a-service, J. of Telecommun. Syst. & Manag, vol.3, issue.2, pp.1-10, 2014.

L. M. Vaquero and L. Rodero-merino, Finding your Way in the Fog, ACM SIGCOMM Computer Communication Review, vol.44, issue.5, pp.27-32, 2014.
DOI : 10.1145/2677046.2677052

R. Roman, J. Lopez, and M. Mambo, Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. arXiv preprint arXiv:1602, p.484, 2016.

B. Han, V. Gopalakrishnan, L. Ji, and S. Lee, Network function virtualization: Challenges and opportunities for innovations, IEEE Communications Magazine, vol.53, issue.2, pp.90-97, 2015.
DOI : 10.1109/MCOM.2015.7045396

R. Yu, G. Xue, V. Kilari, and X. Zhang, Network function virtualization in the multi-tenant cloud, IEEE Netw, vol.29, issue.3, pp.42-47, 2015.

P. Ameigeiras, Link-level access cloud architecture design based on SDN for 5G networks, IEEE Network, vol.29, issue.2, pp.24-31, 2015.
DOI : 10.1109/MNET.2015.7064899

S. Sun, M. Kadoch, L. Gong, and B. Rong, Integrating network function virtualization with SDR and SDN for 4G/5G networks, IEEE Network, vol.29, issue.3, pp.54-59, 2015.
DOI : 10.1109/MNET.2015.7113226

G. Mantas, Security for 5G Communications. Fundamentals of 5G Mobile Netw, 2015.
DOI : 10.1002/9781118867464.ch9

Q. Fang, Z. Weijie, W. Guojun, and F. Hui, Unified Security Architecture Research for 5G Wireless System, 2014 11th Web Information System and Application Conference, 2014.
DOI : 10.1109/WISA.2014.25

N. Yang, Safeguarding 5G wireless communication networks using physical layer security, IEEE Communications Magazine, vol.53, issue.4, pp.20-27, 2015.
DOI : 10.1109/MCOM.2015.7081071

URL : https://hal.archives-ouvertes.fr/hal-01270541

X. Duan and X. Wang, Authentication handover and privacy protection in 5G hetnets using software-defined networking, IEEE Communications Magazine, vol.53, issue.4, pp.28-35, 2015.
DOI : 10.1109/MCOM.2015.7081072

V. G. Vassilakis, I. D. Moscholios, B. A. Alzahrani, and M. D. Logothetis, A softwaredefined architecture for next-generation cellular networks, IEEE Int. Conf. on Commun. (ICC), 2016.
DOI : 10.1109/icc.2016.7511018

K. Pentikousis, Y. Wang, and W. Hu, Mobileflow: Toward software-defined mobile networks, IEEE Communications Magazine, vol.51, issue.7, pp.44-53, 2013.
DOI : 10.1109/MCOM.2013.6553677

J. O. Fajardo, Introducing Mobile Edge Computing Capabilities through Distributed 5G Cloud Enabled Small Cells, Mobile Networks and Applications, pp.1-11, 2016.
DOI : 10.1109/MNET.2015.7340423

S. Skorobogatov, Physical attacks and tamper resistance. Introduction to Hardware Security and Trust, pp.143-173, 2012.
DOI : 10.1007/978-1-4419-8080-9_7

. Cloud-security-alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2, 2009.

S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol.34, issue.1, pp.1-11, 2011.
DOI : 10.1016/j.jnca.2010.07.006

M. D. Ryan, Cloud computing security: The scientific challenge, and a survey of solutions, Journal of Systems and Software, vol.86, issue.9, pp.2263-2268, 2013.
DOI : 10.1016/j.jss.2012.12.025

D. Zissis and D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, vol.28, issue.3, pp.583-592, 2012.
DOI : 10.1016/j.future.2010.12.006

H. Mouratidis, S. Islam, C. Kalloniatis, and S. Gritzalis, A framework to support selection of cloud providers based on security and privacy requirements, Journal of Systems and Software, vol.86, issue.9, pp.2276-2293, 2013.
DOI : 10.1016/j.jss.2013.03.011

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

D. Papp, Z. Ma, and L. Buttyan, Embedded systems security: Threats, vulnerabilities, and attack taxonomy, 2015 13th Annual Conference on Privacy, Security and Trust (PST), 2015.
DOI : 10.1109/PST.2015.7232966

M. J. Mihaljevic, S. Gangopadhyay, G. Paul, and H. Imai, Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128, Periodica Mathematica Hungarica, vol.34, issue.12, pp.205-227, 2012.
DOI : 10.1109/TC.1985.1676518

N. Gobbo, A. Merlo, and M. Migliardi, A Denial of Service Attack to GSM Networks via Attach Procedure, International Conference on Availability, Reliability, and Security, pp.361-376, 2013.
DOI : 10.1007/978-3-642-40588-4_25

URL : https://hal.archives-ouvertes.fr/hal-01506555

A. Merlo, M. Migliardi, N. Gobbo, F. Palmieri, and A. Castiglione, A denial of service attack to UMTS networks using SIM-less devices, IEEE Transactions on Dependable and Secure Computing, vol.11, issue.3, pp.280-291, 2014.

A. Fragkiadakis, I. Askoxylakis, and P. Chatziadam, Denial-of-Service Attacks in Wireless Networks Using Off-the-Shelf Hardware, Distributed, Ambient, and Pervasive Interactions, pp.427-438, 2014.
DOI : 10.1007/978-3-319-07788-8_40

A. Armando, G. Costa, and A. Merlo, Bring your own device, securely, Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, 2013.
DOI : 10.1145/2480362.2480707

. L. Davi, MoCFI: A framework to mitigate control-flow attacks on smartphones, Annu. Netw. & Distr. Syst. Secur. Symp, 2012.

L. B. Wang, G. H. Wei, and Z. Li, Research of defense scheme against buffer overflow attack in embedded system, Journal of Computer Applications, vol.32, issue.12, 2012.
DOI : 10.3724/SP.J.1087.2012.03449

H. Wang, S. Chen, H. Xu, M. Ai, and Y. Shi, SoftNet: A software defined decentralized mobile network architecture toward 5G, IEEE Network, vol.29, issue.2, pp.16-22, 2015.
DOI : 10.1109/MNET.2015.7064898

V. G. Vassilakis, I. D. Moscholios, B. A. Alzahrani, and M. D. Logothetis, On the security of software-defined next-generation cellular networks, In: IEICE Inf. and Commun. Tech. Forum (ICTF), 2016.

E. Kotsovinos, Virtualization, Communications of the ACM, vol.54, issue.1, pp.61-65, 2011.
DOI : 10.1145/1866739.1866754

G. Barthe, G. Betarte, J. D. Campo, and C. Luna, Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.17

K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P. Strub, Implementing TLS with Verified Cryptographic Security, 2013 IEEE Symposium on Security and Privacy, 2013.
DOI : 10.1109/SP.2013.37

URL : https://hal.archives-ouvertes.fr/hal-00863373

M. Rostami, F. Koushanfar, J. Rajendran, and R. Karri, Hardware security: Threat models and metrics, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2013.
DOI : 10.1109/ICCAD.2013.6691207

R. D. Findling and R. Mayrhofer, Towards device-to-user authentication, Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, MUM '15, pp.131-135, 2015.
DOI : 10.1109/ICMU.2015.7061059

D. Perez-botero, J. Szefer, and R. B. Lee, Characterizing hypervisor vulnerabilities in cloud computing servers, Proceedings of the 2013 international workshop on Security in cloud computing, Cloud Computing '13, pp.3-10, 2013.
DOI : 10.1145/2484402.2484406

K. Suzaki, K. Iijima, T. Yagi, and C. Artho, Memory deduplication as a threat to the guest OS, Proceedings of the Fourth European Workshop on System Security, EUROSEC '11, 2011.
DOI : 10.1145/1972551.1972552

M. T. Hoesing, Virtualization Security Assessment, Information Security Journal: A Global Perspective, vol.18, issue.3, pp.124-130, 2009.
DOI : 10.1080/19393550902791440

F. Giust, L. Cominardi, and C. Bernardos, Distributed mobility management for future 5G networks: overview and analysis of existing approaches, IEEE Communications Magazine, vol.53, issue.1, pp.142-149, 2015.
DOI : 10.1109/MCOM.2015.7010527

P. Y. Chen, S. M. Cheng, P. S. Ting, C. W. Lien, and F. J. Chu, When crowdsourcing meets mobile sensing: a social network perspective, IEEE Communications Magazine, vol.53, issue.10, pp.157-163, 2015.
DOI : 10.1109/MCOM.2015.7295478

URL : http://arxiv.org/abs/1508.00299

Q. Han, S. Liang, and H. Zhang, Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world, IEEE Network, vol.29, issue.2, pp.40-45, 2015.
DOI : 10.1109/MNET.2015.7064901

E. Goktas, E. Athanasopoulos, H. Bos, and G. Portokalidis, Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.43

N. Nikaein, Network Store, Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, MobiArch '15, 2015.
DOI : 10.1145/2789168.2789178

URL : https://hal.archives-ouvertes.fr/hal-01296747

W. H. Chin, Z. Fan, and R. Haines, Emerging technologies and research challenges for 5G wireless networks, IEEE Wireless Communications, vol.21, issue.2, pp.106-112, 2014.
DOI : 10.1109/MWC.2014.6812298

URL : http://arxiv.org/pdf/1402.6474

S. Luo, Z. Lin, X. Chen, Z. Yang, and J. Chen, Virtualization security for cloud computing service, 2011 International Conference on Cloud and Service Computing, pp.174-179, 2011.
DOI : 10.1109/CSC.2011.6138516

Y. Oyama, T. T. Giang, Y. Chubachi, T. Shinagawa, and K. Kato, Detecting malware signatures in a thin hypervisor, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, p.27, 2012.
DOI : 10.1145/2245276.2232070

C. Hu, Z. Li, J. Ma, T. Guo, and Z. Shi, File Parsing Vulnerability Detection with Symbolic Execution, 2012 Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012.
DOI : 10.1109/TASE.2012.13

M. Chen, Y. Qian, S. Mao, W. Tang, and X. Yang, Software-Defined Mobile Networks Security, Mobile Networks and Applications, vol.53, issue.4, pp.1-15, 2015.
DOI : 10.1145/2684793.2684797

S. Roy and B. S. Manoj, IoT Enablers and Their Security and Privacy Issues, Internet of Things (IoT) in 5G Mobile Technologies, pp.449-482, 2016.
DOI : 10.1007/978-3-319-30913-2_19