2018 IEEE Wireless Communications and Networking Conference (WCNC) 2018
DOI: 10.1109/wcnc.2018.8377166
|View full text |Cite
|
Sign up to set email alerts
|

Providing strong 5G mobile network slice isolation for highly sensitive third-party services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 32 publications
(25 citation statements)
references
References 1 publication
0
25
0
Order By: Relevance
“…Complexity in the case of multi-domain infrastructure is a risk for security and raises challenges [21]. In a scenario where the network slices may be created by an organization like a MNO and rented out to 3rd-party organizations like enterprises, network slices relying solely on common infrastructure cannot meet the highest isolation requirements [45]. Isolation within these scenarios is still a hot research topic.…”
Section: B Isolationmentioning
confidence: 99%
“…Complexity in the case of multi-domain infrastructure is a risk for security and raises challenges [21]. In a scenario where the network slices may be created by an organization like a MNO and rented out to 3rd-party organizations like enterprises, network slices relying solely on common infrastructure cannot meet the highest isolation requirements [45]. Isolation within these scenarios is still a hot research topic.…”
Section: B Isolationmentioning
confidence: 99%
“…The authors in [13] outlined the recent trends and proposed a set of challenges to realize end-to-end user's security based on slices isolation. For the combination of private and public network infrastructure, several deployment models were introduced in [14] to provide strong network slice isolation for the third parties. However, they just showed the qualitative analysis of different deployment approaches.…”
Section: A Network Slice Isolationmentioning
confidence: 99%
“…There are various critical gaps in the literature and architectural deployments related to management and orchestration, accountability, compliance, and liability, as well as performance and resilience. For example, there is no established security architecture for network slice deployment models which include 3rd-party-owned network infrastructure to implement highly secure mobile communication services across public and private infrastructure domains [26].…”
Section: (#8) Lack Of a Refined 5g Security Architecture Designmentioning
confidence: 99%
“…(#9) Lack of a Self-Adaptive and Slice-Aware Model for Security. E2E network slicing demands a revaluation and research on various aspects of traditional security (e.g., privacy, integrity, zoning, monitoring, and risk mitigation) [26].…”
Section: (#8) Lack Of a Refined 5g Security Architecture Designmentioning
confidence: 99%