2019 IEEE Conference on Standards for Communications and Networking (CSCN) 2019
DOI: 10.1109/cscn.2019.8931330
|View full text |Cite
|
Sign up to set email alerts
|

Secure Keying Scheme for Network Slicing in 5G Architecture

Abstract: Network slicing is one of the key enabling technologies of evolving fifth generation (5G) mobile communication that fulfills multitudes of service demands of 5G networks. Although the concept of network slicing, its deployment scenarios and some security aspects like slice isolation are discussed in detail, key management for network slicing based applications is still not a well-investigated research area. In this paper, we propose a secure keying scheme that is suitable for network slicing architecture when … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 12 publications
(12 reference statements)
0
17
0
Order By: Relevance
“…Stealing legitimate user identities and credentials. Dictionary attacks and brute force attacks belongs to this category Using different authentication methods for different slices with proper slice isolation [35] Message replay attacks Spoofs transmitted frames and re-transmits them to act as a legitimate user Enabling slicing at the device and adding fields like timestamp to data, and provide strong isolation with enhanced authentication mechanisms [35], [52], [55] Message modification Alters the legitimate message by deleting, adding, changing or reordering it Enabling slicing at the device and hashing data with slice specific keys [55], [56] Masquerading Impersonate an legitimate user and trying to gain unauthorized privileges Slice isolation in order to minimize unauthorized privileges and using powerful key management and authentication mechanisms [35], [51], [52], [56] Thus, the slicing based approach is cost-effective and faster than deploying whole new networks for each IoT application. In this way, network slicing provides the required dynamicity for IoT applications.…”
Section: B Improving Dynamicitymentioning
confidence: 99%
See 1 more Smart Citation
“…Stealing legitimate user identities and credentials. Dictionary attacks and brute force attacks belongs to this category Using different authentication methods for different slices with proper slice isolation [35] Message replay attacks Spoofs transmitted frames and re-transmits them to act as a legitimate user Enabling slicing at the device and adding fields like timestamp to data, and provide strong isolation with enhanced authentication mechanisms [35], [52], [55] Message modification Alters the legitimate message by deleting, adding, changing or reordering it Enabling slicing at the device and hashing data with slice specific keys [55], [56] Masquerading Impersonate an legitimate user and trying to gain unauthorized privileges Slice isolation in order to minimize unauthorized privileges and using powerful key management and authentication mechanisms [35], [51], [52], [56] Thus, the slicing based approach is cost-effective and faster than deploying whole new networks for each IoT application. In this way, network slicing provides the required dynamicity for IoT applications.…”
Section: B Improving Dynamicitymentioning
confidence: 99%
“…In [50] and [64], they have proposed methods to mitigate IoT based DDoS attacks through slice isolation and edge computing respectively. While secure keying scheme for network slicing was presented in [56], service-oriented authentication framework was presented in [35]. However, new scientific investigations have to be conducted in mitigating other types of security attacks by using network slicing.…”
Section: Improving Securitymentioning
confidence: 99%
“…The VIKOR multicriteria decision-making (MCDM) approach was proposed in a previous study [25] for network slicing in a 5G environment. This approach finds node significance (resource and topology attributes) and ranks the nodes accordingly.…”
Section: A Secure Network Slicingmentioning
confidence: 99%
“…If the keys from the primary authentication are used within the slices, new and independent keys must be generated for each slice by using a key derivation function [9]. Some solutions for secure keying have been proposed [42], but key management in network slicing must be further investigated. Examples of inter-slice isolation enabling technologies include tag-(using e.g., MPLS), VPN-(using e.g., SSL/TLS), or VLAN-based isolation [29].…”
Section: ) 5g Customer Devicesmentioning
confidence: 99%