5G Network Slice Isolation

03/03/2022
by   Stan Wong, et al.
0

This article reveals an adequate comprehension of basic defense, security challenges, 2 and attack vectors in deploying multi-network slicing. Network slicing is a revolutionary concept 3 of providing mobile network on-demand and expanding mobile networking business and services 4 to a new era. The new business paradigm and service opportunities are encouraging vertical 5 industries to join and develop their own mobile network capabilities for enhanced performances 6 that are coherent with their applications. However, a number of security concerns are also raised 7 in this new era. In this article, we focus on the deployment of multi-network slicing with multi8 tenancy. We identify the security concerns, and discuss about the defense approaches such as 9 network slice isolation and insulation in a multi-layer network slicing security model. Also, we 10 identify the importance to appropriately select the network slice isolation points, and propose 11 a generic framework to optimize the isolation policy regarding the implementation cost while 12 guaranteeing the security and performance requirements.

READ FULL TEXT

page 6

page 12

research
07/25/2022

Secure Service Implementation with Slice Isolation and WireGuard

Network slicing enables the provision of services for different vertical...
research
01/05/2019

Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices

In this paper, we propose a solution to proactively mitigate Distributed...
research
01/07/2020

Sharing gNB components in RAN slicing: A perspective from 3GPP/NFV standards

To implement the next Generation NodeBs (gNBs) that are present in every...
research
04/25/2018

The Creation Phase in Network Slicing: From a Service Order to an Operative Network Slice

Network slicing is considered a key mechanism to serve the multitude of ...
research
10/08/2020

5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept

The fifth-generation (5G) mobile networks aim to host different types of...
research
12/13/2021

Post-Quantum Era in V2X Security: Convergence of Orchestration and Parallel Computation

Along with the potential emergence of quantum computing, safety and secu...
research
12/11/2020

Towards Secure and Leak-Free Workflows Using Microservice Isolation

Data leaks and breaches are on the rise. They result in huge losses of m...

Please sign up or login with your details

Forgot password? Click here to reset