Security in 5G Network Slices: Concerns and Opportunities

dc.contributor.authorSingh, V.P.
dc.contributor.authorSingh, M.P.
dc.contributor.authorHegde, S.
dc.contributor.authorGupta, M.
dc.date.accessioned2026-02-04T12:25:30Z
dc.date.issued2024
dc.description.abstractNetwork slicing has emerged as a cornerstone technology within the 5G ecosystem, enabling efficient resource allocation, service customization, and support for various applications. Its ability to deliver Network-as-a-Service (NaaS) brings a new paradigm of adaptable and efficient network provisioning. However, with the diversification of services and the increasing complexity of network infrastructures, a simultaneous rise in security vulnerabilities becomes evident. These flaws go beyond the limitations of conventional network security and affect various aspects of network slice (NS) implementation and management. The limitations of traditional security, such as static policies, single point of failure, and challenges in effectively securing network slicing deployments, underscore the need to explore security measures tailored to the dynamic nature of 5G networks. To ensure the robust security of 5G networks, it is essential to consider various security concerns such as isolation, authentication, and authorization. Furthermore, dynamic orchestration and inter-slice communication security challenges must be proactively tackled. The security concerns related to 5G networks must be addressed comprehensively to ensure the safe and secure operation of the network. Our survey paper goes into these complex security issues, providing an in-depth and systematic review of the various contexts in which they emerge. We have identified the five most vulnerable areas in Network Slicing: Slice-Lifecycle, Communication type slice uses, Technologies used to provide service, Management threats, and End Devices utilized in service. Apart from threats in these vulnerable areas, we also discussed a few generous attacks that can be launched to disrupt network-slicing services. Furthermore, this study is a valuable resource for evaluating the current state of research efforts in this domain, contributing to the ongoing enhancement of security measures and the overall robustness of network-slicing technology. In doing so, we aim to ensure the secure and sustainable evolution of 5G networks as they become increasingly integral to our digital infrastructure. © 2013 IEEE.
dc.identifier.citationIEEE Access, 2024, 12, , pp. 52727-52743
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2024.3386632
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/21428
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subject5G mobile communication systems
dc.subjectApplication programs
dc.subjectAuthentication
dc.subjectComplex networks
dc.subjectNetwork security
dc.subjectQueueing networks
dc.subjectSoftware defined networking
dc.subjectTransfer functions
dc.subject3GPP
dc.subject5g mobile communication
dc.subjectMobile communications
dc.subjectNetwork slicing
dc.subjectSecurity
dc.subjectSecurity measure
dc.subjectSoftware-defined networkings
dc.subjectVulnerable area
dc.subjectNetwork function virtualization
dc.titleSecurity in 5G Network Slices: Concerns and Opportunities

Files

Collections