Security Threats, Requirements and Recommendations on Creating 5G Network Slicing System: A Survey

被引:9
作者
Gao, Shujuan [1 ]
Lin, Ruyan [1 ]
Fu, Yulong [1 ]
Li, Hui [1 ]
Cao, Jin [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
关键词
5G mobile internet; network security; network slicing; SDN/NFV security; network resource isolation; ARCHITECTURE; CHALLENGES; NFV;
D O I
10.3390/electronics13101860
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network slicing empowers 5G with enhanced network performance and efficiency, cost saving, and better QoS and customer satisfaction, and expands the commercial application scenarios of 5G networks. However, the introduction of new techniques usually raises new security threats. Most of the existing works on 5G security only focus on 5G itself and do not analyze 5G network slicing security in detail. We consider network slices as a virtual logical network that can unite the subnetwork parts of 5G. If a 5G network slice has security problems or has been attacked, the entire 5G network will have security risks. In this paper, after synthesizing the existing literature, we analyze the security threats step by step through the lifecycle of 5G network slices, analyzing and summarizing more than 70 security threats in three major categories. Based on the security issues investigated, from a viewpoint of building a secure 5G network slicing system, we compiled 24 security requirements and proposed the corresponding recommendations for different scenarios of 5G network slicing. Finally, we collated the future research trends of 5G network slicing security.
引用
收藏
页数:32
相关论文
共 59 条
[1]  
3GPP, 2017, Technical Specification (TS) 36.814, 3rd Generation Partnership Project (3GPP). Version 9.2.0
[2]  
3GPP, 2020, TECHNICAL SPECIFICAT
[3]  
3GPP, 2019, Technical Specification (TS) 22.261
[4]  
3rd Generation Partnership Project (3GPP), 2016, Technical Specification (TS) 32.425
[5]   Overview of 5G Security Challenges and Solutions [J].
Ahmad, Ijaz ;
Kumar, Tanesh ;
Liyanage, Madhusanka ;
Okwuibe, Jude ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE Communications Standards Magazine, 2018, 2 (01) :36-43
[6]  
Alliance N., 2016, 5G Security Recommendations Package
[7]  
Alliance N., 2018, Final Deliverable (Approved-P Public)
[8]  
An Q., 2016, Telecommun. Sci, V32, p119b126
[9]   On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond [J].
Bello, Yahuza ;
Hussein, Ahmed Refaey ;
Ulema, Mehmet ;
Koilpillai, Juanita .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02) :1876-1889
[10]  
Bin Z., 2020, Des. Tech. Posts Telecommun, V7, P1