DSM Attack Resistant Slice Selection in 5G

被引:5
作者
Sathi, Vipin N. [1 ]
Murthy, C. Siva Ram [1 ]
机构
[1] Indian Inst Technol Madras, Dept Comp Sci & Engn, Chennai 600036, Tamil Nadu, India
关键词
Protocols; 5G mobile communication; Privacy; Economics; Authentication; Resistance; Switches; 5G network; network slicing; DSM attack; anonymous slice selection; privacy preserving authentication; EFFICIENT;
D O I
10.1109/LWC.2021.3070322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a previous letter, we proposed the distributed slice mobility (DSM) attack. The DSM attack can cause severe performance and economic damage to 5G networks. Attackers can launch the DSM attack by exploiting a vulnerability in the existing slice selection protocol. In this letter, we propose a DSM attack resistant slice selection protocol for 5G networks. In the proposed protocol, the network selects the best slice for a session between a user and an external data network based on the type of services offered by the external data network and the user's subscription details. The proposed protocol implements neutral slice selection and mitigation of traffic analysis attacks by ensuring user anonymity. The proposed protocol is implemented, and its computation overhead is compared with that of the traditional protocol and a privacy preserving slice selection protocol.
引用
收藏
页码:1469 / 1473
页数:5
相关论文
共 9 条
[1]  
[Anonymous], 2020, SYSTEM ARCHITECTURE
[2]   The 5G-AKA Authentication Protocol Privacy [J].
Koutsos, Adrien .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, :464-479
[3]   Device Association for RAN Slicing Based on Hybrid Federated Deep Reinforcement Learning [J].
Liu, Yi-Jing ;
Feng, Gang ;
Sun, Yao ;
Qin, Shuang ;
Liang, Ying-Chang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15731-15745
[4]   Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT [J].
Ni, Jianbing ;
Lin, Xiaodong ;
Shen, Xuemin Sherman .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (03) :644-657
[5]  
Sathi Vipin N., 2021, IEEE Networking Letters, V3, P5, DOI 10.1109/LNET.2020.3044642
[6]   Novel Protocols to Mitigate Network Slice Topology Learning Attacks and Protect Privacy of Users' Service Access Behavior in Softwarized 5G Networks [J].
Sathi, Vipin N. ;
Srinivasan, Manikantan ;
Thiruvasagam, Prabhu K. ;
Murthy, C. Siva Ram .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) :2888-2906
[7]   Efficient Handover Mechanism for Radio Access Network Slicing by Exploiting Distributed Learning [J].
Sun, Yao ;
Jiang, Wei ;
Feng, Gang ;
Klaine, Paulo Valente ;
Zhang, Lei ;
Imran, Muhammad Ali ;
Liang, Ying-Chang .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (04) :2620-2633
[8]   Service Provisioning Framework for RAN Slicing: User Admissibility, Slice Association and Bandwidth Allocation [J].
Sun, Yao ;
Qin, Shuang ;
Feng, Gang ;
Zhang, Lei ;
Imran, Muhammad Ali .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (12) :3409-3422
[9]   AN OVERVIEW OF NETWORK SLICING FOR 5G [J].
Zhang, Shunliang .
IEEE WIRELESS COMMUNICATIONS, 2019, 26 (03) :111-117