2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM) 2021
DOI: 10.1109/etcm53643.2021.9590742
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Study in 5G Network Slicing Technology: A Systematic Mapping Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 44 publications
0
7
0
Order By: Relevance
“…These kinds of attacks may result in the attacker getting hold of secrets/cryptographic keys of slice Y as depicted in Fig. 13 [86]. One possible solution to prevent the side channel attacks in network slices is about the strong isolation of slices, i.e., even if an attacker can influence/observe how a code runs in one slice, he should not be able to extract the information on how the other slices run the code in the same hardware.…”
Section: K Denial Of Service To Other Slicesmentioning
confidence: 99%
See 2 more Smart Citations
“…These kinds of attacks may result in the attacker getting hold of secrets/cryptographic keys of slice Y as depicted in Fig. 13 [86]. One possible solution to prevent the side channel attacks in network slices is about the strong isolation of slices, i.e., even if an attacker can influence/observe how a code runs in one slice, he should not be able to extract the information on how the other slices run the code in the same hardware.…”
Section: K Denial Of Service To Other Slicesmentioning
confidence: 99%
“…Summary: Side channel attacks attempt to extract information by analyzing physical parameters. This has the capability to break cryptographic operations by extracting secret keys [85], [86]. Possible solutions are strong slice isolation and avoiding the hosting of applications on slices with similar hardware.…”
Section: Side Channel Attacks Across Slicesmentioning
confidence: 99%
See 1 more Smart Citation
“…Adversaries can also take advantage of the flexibility of orchestration, internal agents, authentication failure, physical downlink control channel, confidentiality failures in the communication channel, sensor networks vulnerabilities, cloud radio access networks vulnerabilities [Jeyakumar and Rajabhushanam, 2019], C-RAN vulnerabilities [Tian et al, 2017], EAP-TLS vulnerabilities [Zhang et al, 2020b], Subscriber Identity Module (SIM) vulnerabilities [Zhao et al, 2021d], machine learning models vulnerabilities [Suomalainen et al, 2020], software-defined mobile networks vulnerabilities, named data networks vulnerabilities [Bertino and Nabeel, 2018], MEC vulnerabilities, UE vulnerabilities [Amgoune and Mazri, 2018;Mahmoud et al, 2021], D2D communication vulnerabilities [Abd-Elrahman et al, 2015a,b], System Information Block (SIB) and RRC message parameters in 5G NR, edge security flaw, key sent over an insecure channel, security flaw in NS [Martini et al, 2020;Kotulski et al, 2017;Sattar et al, 2021;Cáceres-Hidalgo and Avila-Pesantez, 2021;Olimid and Nencioni, 2020], credential theft, devices without robust security mechanisms, 5G-AKA vulnerabilities [Basin et al, 2018;Pari et al, 2019], and security flaws in NFV and SDN [Ahmad et al, 2021[Ahmad et al, , 2019[Ahmad et al, , 2018Taheribakhsh et al, 2020]. Operating Systems (OS) using insecure protocols provide excessive privileges, IoT devices may have different protocols, lack processing robustness, and fail to control sensitive data privacy.…”
Section: Item Description Item Descriptionmentioning
confidence: 99%
“…In other words, devices equipped with artificial intelligence have electronic brains that can analyze data and execute the required operations. The term "cybersecurity" has recently emerged due to the frequent use of Internet networks and their ease of access, especially with the emergence of 5G technology [11]. Data, information, and applications on computers or other electronic devices are exposed to theft and access by unauthorized persons to commit a range of electronic crimes.…”
Section: Introductionmentioning
confidence: 99%