2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) 2020
DOI: 10.1109/iccmc48092.2020.iccmc-00014
|View full text |Cite
|
Sign up to set email alerts
|

Network Slicing in 5G and the Security Concerns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 5 publications
0
20
0
Order By: Relevance
“…Network slicing allows rapid deployment of dedicated network slices with relatively effortless configurations over the public network. IoT botnets Remotely take control over the devices and perform some malfunctions Create a quarantine slice and move victimized devices into that slice and take necessary actions [53], [54] Zero-day attacks Exploits a serious software security weakness that the vendor or developer unaware of Identifying the vulnerable devices and move them to a quarantine slice until do necessary updates [53], [54] Man-in-The-Middle (MiTM) attacks…”
Section: B Improving Dynamicitymentioning
confidence: 99%
“…Network slicing allows rapid deployment of dedicated network slices with relatively effortless configurations over the public network. IoT botnets Remotely take control over the devices and perform some malfunctions Create a quarantine slice and move victimized devices into that slice and take necessary actions [53], [54] Zero-day attacks Exploits a serious software security weakness that the vendor or developer unaware of Identifying the vulnerable devices and move them to a quarantine slice until do necessary updates [53], [54] Man-in-The-Middle (MiTM) attacks…”
Section: B Improving Dynamicitymentioning
confidence: 99%
“…This section covers surveys that elaborate on different security issues and how they have been managed. Mathew [89] illustrated the concept of network slicing and how it has gained traction in 5G. The author discussed the significant challenges in slicing, such as the security and implementation of RAN.…”
Section: Emerging Threats and Security Concerns In ML Based 5g Networ...mentioning
confidence: 99%
“…Interestingly, strict security and privacy requirements for sensitive IoT applications, such as I-health, can be maintained by exploiting the concept of slice isolation [126]- [128]. For instance, fog computing and network slicing have been used in [126] to develop a secure service-oriented authentication scheme for IoT systems over 5G network.…”
Section: Network Slicingmentioning
confidence: 99%