2020
DOI: 10.1109/access.2019.2962179
|View full text |Cite
|
Sign up to set email alerts
|

Side Channel Attack-Aware Resource Allocation for URLLC and eMBB Slices in 5G RAN

Abstract: Network slicing is a key enabling technology to realize the provisioning of customized services in 5G paradigm. Due to logical isolation instead of physical isolation, network slicing is facing a series of security issues. Side Channel Attack (SCA) is a typical attack for slices that share resources in the same hardware. Considering the risk of SCA among slices, this paper investigates how to effectively allocate heterogeneous resources for the slices under their different security requirements. Then, a SCA-aw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…Sharing of the physical resources and logical instead of physical isolation of network resources, however, continues to represent a key security concern for PPDR and slice security is a major research challenge. Distributed Denial of Service attacks (DDoS), side channel attacks across slices, and exhaustion of security resources are the most prevalent threats and a number of approaches and techniques are proposed to mitigate them and ensure end-to-end slice security [123]- [125]. Numerous different approaches exist that in general rely on intra-slice and inter-slice isolation, which constitutes a number of further aspects, including reservation of host and network resources for a particular slice, smart resource allocation techniques and end-to-end quality of service (QoS) guarantees [126].…”
Section: F Network Slicingmentioning
confidence: 99%
“…Sharing of the physical resources and logical instead of physical isolation of network resources, however, continues to represent a key security concern for PPDR and slice security is a major research challenge. Distributed Denial of Service attacks (DDoS), side channel attacks across slices, and exhaustion of security resources are the most prevalent threats and a number of approaches and techniques are proposed to mitigate them and ensure end-to-end slice security [123]- [125]. Numerous different approaches exist that in general rely on intra-slice and inter-slice isolation, which constitutes a number of further aspects, including reservation of host and network resources for a particular slice, smart resource allocation techniques and end-to-end quality of service (QoS) guarantees [126].…”
Section: F Network Slicingmentioning
confidence: 99%
“…All this should increase the security during the transmission of the packets and facilitate the detection of the presence of the MITM attack. The paper [38] also mentioned that a MITM Attacks targeting OpenFlow channel security can be resolved by the Bloom filter model proposed by the researchers. This model is lightweight, stretch the OpenFlow protocol, and can detect hidden modifications to the data packets that the attacker might make.…”
Section: Mitm Attackmentioning
confidence: 99%
“…Table 4 summarizes the references and Security attack. [25] 2018 YES YES YES YES [32] 2019 YES [33] 2020 YES [34] 2018 YES [35] 2020 YES [36] 2019 YES YES [37] 2019 YES [38] 2017 YES [39] 2019 YES YES [40] 2020 YES…”
Section: Side Channel Attackmentioning
confidence: 99%
“…This finding increase network capacity, lower the cost of infrastructure per bit, and give network management more flexibility. Additionally, steady movement of pertinent network functions out to the edge [2][3]. This lowers latency by bringing processing nearer to the points of information generation and consumption.…”
Section: Introductionmentioning
confidence: 99%