Security in 5G Network Slices: Concerns and Opportunities

被引:2
|
作者
Singh, Virendra Pratap [1 ]
Singh, Mahendra Pratap [1 ]
Hegde, Saumya [1 ]
Gupta, Maanak [2 ]
机构
[1] Natl Inst Technol Karnataka, Dept Comp Sci & Engn, Mangaluru 575025, India
[2] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
基金
美国国家科学基金会;
关键词
Security; 5G mobile communication; Network slicing; 3GPP; Surveys; Artificial intelligence; Terminology; Network function virtualization; Software defined networking; 5G network; security; network function virtualization; software defined networking; NFV;
D O I
10.1109/ACCESS.2024.3386632
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network slicing has emerged as a cornerstone technology within the 5G ecosystem, enabling efficient resource allocation, service customization, and support for various applications. Its ability to deliver Network-as-a-Service (NaaS) brings a new paradigm of adaptable and efficient network provisioning. However, with the diversification of services and the increasing complexity of network infrastructures, a simultaneous rise in security vulnerabilities becomes evident. These flaws go beyond the limitations of conventional network security and affect various aspects of network slice (NS) implementation and management. The limitations of traditional security, such as static policies, single point of failure, and challenges in effectively securing network slicing deployments, underscore the need to explore security measures tailored to the dynamic nature of 5G networks. To ensure the robust security of 5G networks, it is essential to consider various security concerns such as isolation, authentication, and authorization. Furthermore, dynamic orchestration and inter-slice communication security challenges must be proactively tackled. The security concerns related to 5G networks must be addressed comprehensively to ensure the safe and secure operation of the network. Our survey paper goes into these complex security issues, providing an in-depth and systematic review of the various contexts in which they emerge. We have identified the five most vulnerable areas in Network Slicing: Slice-Lifecycle, Communication type slice uses, Technologies used to provide service, Management threats, and End Devices utilized in service. Apart from threats in these vulnerable areas, we also discussed a few generous attacks that can be launched to disrupt network-slicing services. Furthermore, this study is a valuable resource for evaluating the current state of research efforts in this domain, contributing to the ongoing enhancement of security measures and the overall robustness of network-slicing technology. In doing so, we aim to ensure the secure and sustainable evolution of 5G networks as they become increasingly integral to our digital infrastructure.
引用
收藏
页码:52727 / 52743
页数:17
相关论文
共 50 条
  • [1] On Reconfiguring 5G Network Slices
    Pozza, Matteo
    Nicholson, Patrick K.
    Lugones, Diego F.
    Rao, Ashwin
    Flinck, Hannu
    Tarkoma, Sasu
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (07) : 1542 - 1554
  • [2] 5G Network and Security
    Jinsong, Ma
    Yamin, Mohammad
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 249 - 254
  • [3] Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers
    Odarchenko, Roman
    Iavich, Maksim
    Iashvili, Giorgi
    Fedushko, Solomiia
    Syerov, Yuriy
    [J]. BIG DATA AND COGNITIVE COMPUTING, 2023, 7 (04)
  • [4] Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
    Kholidy, Hisham A.
    Karam, Andrew
    Sidoran, James
    Rahman, Mohammad A.
    Mahmoud, Mohammed
    Badr, Mahmoud
    Mahmud, Maqsood
    Sayed, Ahmed F.
    [J]. 2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [5] Security Analysis of 5G Network
    Khan, John A.
    Chowdhury, Minhaz
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2021, : 1 - 6
  • [6] Orchestrating Isolated Network Slices in 5G Networks
    Esmaeily, Ali
    Kralevska, Katina
    [J]. ELECTRONICS, 2024, 13 (08)
  • [7] Closed loop optimization of 5G network slices
    Govindarajan, Kavya
    Goel, Seep
    Jayachandran, Praveen
    Glover, Steve
    Villaverde, J. M. Pulido
    Cresp, Jacques
    Viale, Joel
    Martin, Sophie
    Livigni, Fabrice
    [J]. 2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [8] Resource Allocation Scheme in 5G Network Slices
    Dighriri, Mohammed
    Alfoudi, Ali Saeed Dayem
    Lee, Gyu Myoung
    Baker, Thar
    Pereira, Rubem
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 275 - 280
  • [9] 5G Security Challenges and Opportunities: A System Approach
    Dutta, Ashutosh
    Hammad, Eman
    [J]. 2020 IEEE 3RD 5G WORLD FORUM (5GWF), 2020, : 109 - 114
  • [10] Closed loop optimization of 5G network slices
    Govindarajan, Kavya
    Goel, Seep
    Jayachandran, Praveen
    Glover, Steve
    Pulido Villaverde, J. M.
    Cresp, Jacques
    Viale, Joel
    Martin, Sophie
    Livigni, Fabrice
    [J]. PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2023, 2023, : 290 - 291