2022
DOI: 10.3390/electronics11020222
|View full text |Cite
|
Sign up to set email alerts
|

Network Slicing Security Controls and Assurance for Verticals

Abstract: This paper focuses on the security challenges of network slice implementation in 5G networks. We propose that network slice controllers support security by enabling security controls at different network layers. The slice controller orchestrates multilevel domains with resources at a very high level but needs to understand how to define the resources at lower levels. In this context, the main outstanding security challenge is the compromise of several resources in the presence of an attack due to weak resource… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…The full potential of 5G End-to-End slicing will only be realized when used with other complementary technologies such as edge computing, which can provide lowlatency access to data and applications closer to users [20]. While 5G End-to-End slicing presents many potential benefits, some challenges need to be addressed, such as the need for new standards and protocols, ensuring interoperability between different network elements, and ensuring the security and privacy of user data [21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The full potential of 5G End-to-End slicing will only be realized when used with other complementary technologies such as edge computing, which can provide lowlatency access to data and applications closer to users [20]. While 5G End-to-End slicing presents many potential benefits, some challenges need to be addressed, such as the need for new standards and protocols, ensuring interoperability between different network elements, and ensuring the security and privacy of user data [21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The results linked to the Network Slicing case should be interpreted based on the business relations described above. The main security vulnerabilities of network slicing relate to resource isolation [34]. For example, an attacker could penetrate the interslice separation between Users 1 and 2, whose slices share the same physical infrastructure provided by an MNO, thus causing a violation of data belonging to the users.…”
Section: Impact Assessmentmentioning
confidence: 99%
“…More specifically, (6) implies that the constrains of isolation level and the upper bound of MNO control level. As a result, the more isolated, the more layers in the protocol stack can be securely controlled by the MNO.…”
Section: Model Of Network Slice Isolationmentioning
confidence: 99%
“…Therefore, it calls for an effective isolation mechanism and policy approaches that can protect the network from attacks and infections over these new wide surfaces. For example, Tomasz Wichary et al [6] discussed to security control and policies to protect those network perimeters and Chun-I Fan et al [7] developed a scheme for cross-network slice authentication which against the attackers who aim to impersonate users, network operators or network slices by providing a secure session key exchange.…”
Section: Introductionmentioning
confidence: 99%