2022 8th International Engineering Conference on Sustainable Technology and Development (IEC) 2022
DOI: 10.1109/iec54822.2022.9807564
|View full text |Cite
|
Sign up to set email alerts
|

A Survey and Analysis of Architecture and Models of Network Slicing in 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Usually, the network function sharing is enabled between slices shared by 'trusted' vertical partners. Detecting these attacks is more challenging when they originate from the 'trusted' vertical The current 3GPP standard proposed to use authentication and communication security using TLS (Transport Layer Security) [59], [60]. However, TLS is insufficient to secure the slices against these attacks [61], [62].…”
Section: B Potential For Fraud or Data Leakagementioning
confidence: 99%
See 1 more Smart Citation
“…Usually, the network function sharing is enabled between slices shared by 'trusted' vertical partners. Detecting these attacks is more challenging when they originate from the 'trusted' vertical The current 3GPP standard proposed to use authentication and communication security using TLS (Transport Layer Security) [59], [60]. However, TLS is insufficient to secure the slices against these attacks [61], [62].…”
Section: B Potential For Fraud or Data Leakagementioning
confidence: 99%
“…This attack can be performed by exploiting shared NFs [32]. Furthermore, existing solutions for securing NS against such attacks, including TLS [59], [60], are not sufficient to secure NS. This requires future research work to explore advanced trusting mechanisms, such as trust and reputation models [63], computational trust [64], blockchain [65] or zero-trust security [66] towards mitigating fraud or data leakage attacks against NS.…”
Section: B Potential For Fraud or Data Leakagementioning
confidence: 99%
“…Hence, network slicing requires from all nodes in the network to be able to separate individual data streams and provide differentiated QoS. The end-to-end network infrastructure for network slicing is issued in [175], [176], [177], [178]. The network slicing control framework layer is comprised of radio slice controllers, transport slice controllers and core slice controllers, controlling the RAN, crosshaul and core domains respectively [176].…”
Section: Multi Tenant Networkmentioning
confidence: 99%