2020
DOI: 10.1109/access.2020.2997702
|View full text |Cite
|
Sign up to set email alerts
|

5G Network Slicing: A Security Overview

Abstract: The fifth-generation (5G) of cellular networks is currently under deployment by network operators, and new 5G end-user devices are about to be commercialized by many manufacturers. This is just a first step in the 5G's development, and the true potential of 5G is still far from being reached. Currently, one of the main 5G technologies under the interest of the research community is the network slicing. Network slicing will allow exploiting the 5G infrastructure to flexibly and efficiently provide heterogeneous… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 100 publications
(60 citation statements)
references
References 23 publications
0
48
0
Order By: Relevance
“…The proliferation of IoT and network slicing exploitation of different IoT applications, intensify the effect of these vulnerabilities. Such issues can be categorized in to three different areas [179].…”
Section: Adaptive Service Function Chainingmentioning
confidence: 99%
“…The proliferation of IoT and network slicing exploitation of different IoT applications, intensify the effect of these vulnerabilities. Such issues can be categorized in to three different areas [179].…”
Section: Adaptive Service Function Chainingmentioning
confidence: 99%
“…Apart from the IoT related security challenges, a series of new security threats can be identified due to the network slicing exploitation. These network slicing related security issues can be divided into main three areas [53]. i.e life-cycle security for security vulnerabilities in the different phases of the network slice life cycle, inter-slice security for security breaches in between different slices, and intra-slice security for security threats in a slice itself.…”
Section: New Security Threatsmentioning
confidence: 99%
“…Moreover, the sharing of NFs and physical resources between slices can also endanger the confidentiality of the data. Finally, exposing slice related information and configurations via APIs grants intruders to impersonate as valid entities to purloin information [53].…”
Section: E New Privacy Concernsmentioning
confidence: 99%
“…• Security considerations while connecting to the core of the MNO [24]. • Feasibility of network in remote rural areas [3].…”
Section: Strength Weaknessmentioning
confidence: 99%