Security Threats, Requirements and Recommendations on Creating 5G Network Slicing System: A Survey
Abstract
:1. Introduction
2. Related Work
- Analyzed and summarized more than 70 security threats from 5G network slicing lifecycle;
- Compiled 24 security requirements for building a secure 5G network slicing system and building a holistic security framework that contains security threats, security requirements and security recommendations;
- Suggested importance classification of security requirements for different scenarios of 5G network slicing.
3. Background of 5G Network Slicing
3.1. 5G Network Slicing Original Idea and Composition
3.2. 5G Network Slicing Lifecycle
- Preparation: The main work in this phase includes: slice template design and upload, network environment preparation, etc. A slice template, which can be also called a network service template, is essentially a text file describing the user’s service requirements. The content of the slice template includes information on the type, number and specification of network elements required for the service, resources and connections, etc. The main work of the slice preparation phase is to complete the invocation of network resources and ensure the allocation of slicing resources at a later stage.
- Instantiation, Configuration and Activation: The main work in this phase is to create slices according to the slicing template in the first phase, and complete the resource division, function configuration and service activation of the slices.
- Run-time: After the slices are created and put into operation, their operation status needs to be monitored in real time. The main task of the third phase is to monitor the operation status of the network slices and report on the operation data of the slices. In addition, it updates, adjusts and configures the current network slices in real time when the tenant’s business requirements change. At the same time, it also has a certain monitoring role for slice failure.
- Decommissioning: The slice needs to be logged out after completing its service mission, which is essentially releasing the slice resources and network functions, and the original slice no longer exists after logging out.
3.3. 5G Network Slicing Management and Orchestration
3.3.1. 5G Network Slicing Management Architecture
- BSS (Business Support System): This refers to a class of software programs that help telecommunication operators manage and streamline all customer-facing business activities, such as subscription services, billing issues and subscription upgrades. Because such systems are directly related to the customer business experience, the BSS is critical to the successful operation of modern telecommunications organizations.
- OSS (Operation Support System): This consists of the actual network infrastructure and software used to control the network, and is designed to help telecommunication operators monitor, analyze and manage wireless networks, and to support operators in remotely managing and monitoring daily operations throughout the network.
- CSMF (Communication Service Management Function): This manages communication services, each of which is completed by one or more network slices; CSMF interfaces with the BSS of the operator’s network and is responsible for slicing service operations; slicing users order slices from the operator through CSMF and submit relevant SLA requirements (e.g., number of online users, average user rate, latency requirements, etc.), and the CSMF converts the subscriber’s communication service requirements into network slice requirements for the NSMF and forwards them to the NSMF [19].
- NSMF (Network Slice Management Function): The purpose of the NSMF is managing network slices; each network slice can be composed of several network slice subnets. The NSMF receives network slice deployment requests from the CSMF, decomposes end-to-end SLA requirements of network slices into SLA requirements of network sub-slices and sends network sub-slice deployment requests to NSSMF.
- NSSMF (Network Slice Subnet Management Function): The purpose of the NSSMF is managing network slice subnets; each network slice subnet can be composed of one or more basic sub-slices, where each sub-slice can contain several network functions. The NSSMF is responsible for the orchestration, deployment and maintenance of sub-slices, and different areas of the NSSMF convert the SLA requirements received from the NSMF uniformly for the network slice subnetwork into network element service parameters and issues them to the network elements.
3.3.2. Network Slicing Management and Orchestration Architecture Based on SDN and NFV
- VNF: This is composed of a variety of applications deployed on virtual resources to implement traditional network functions. Different VNFs are usually developed by mutually independent software developers, but those diverse VNFs should adapt to a standardized and unified NFVI architecture.
- NFVI: This provides the hardware and software architecture of the required environment for the deployment, management and operation of NFV. The NFVI includes hardware resources, a virtualization layer and virtualization resources.
- –
- Hardware resources include computing resources, storage resources and network resources, which provide computational processing power, storage capacity and network connectivity to the VNFs through the virtualization layer (e.g., VMs, virtual machine managers, etc.).
- –
- The virtualization layer is responsible for abstracting hardware resources into virtual resources using virtualization methods (e.g., Docker, Hypervisor, etc.).
- –
- Virtualized resources include virtual computing resources, virtual storage resources and virtual network resources. These virtual resources maximize the use of limited hardware resources and are the basis for generating VNFs [20].
- MANO: This refers to a functional framework that manages the lifecycle of VNFs and orchestrates their deployment and operation. MANO is responsible for tasks such as VNF onboarding, configuration, scaling and healing. The MANO framework consists of the following three main components:
- –
- VIM (Virtualization Infrastructure Manager) is mainly responsible for the lifecycle management and allocation scheduling of hardware/virtual resources in the NFVI, such as the allocation of CPU resources and network link bandwidth.
- –
- VNFM (Virtualized Network Function Manager) is mainly responsible for VNF lifecycle management, i.e., VNF creation, update, extension and deactivation.
- –
- NFVO (NFV Orchestrator) is mainly responsible for coordinating the management of VNFM and VIM. It makes the creation of the VNF more reasonable and safe, and the operation more reliable and effective [20]. In addition, the NFVO connects to other data repositories, such as the network service catalog, VNF catalog, instance catalog and NFV infrastructure resource database, which contain relevant information about their respective entities. Finally, a series of standard interfaces are set up in MANO to enable communication between different components in MANO and coordination between MANO and traditional network management systems (e.g., OSS, BSS and EMS: Element Management System).
4. 5G Network Slicing Security Threats
4.1. Security Issues in Slice Deployment
4.1.1. Threats on NE Deployment of 5GC
- Security Threats in NE Registration3GPP briefly defined an NE registration progress in TS 23.502 (see Figure 8). When a new NE wants to join the networks, it needs to initiate the registration process with the Network Repository Function (NRF). NE needs to provide its service information to the NRF according to the specified network service profile, such as NE type, NE instance ID, IP address of NE and PLMN ID (used to be discovered by other PLMNs), etc. Among them, the network service profile can be regarded as the ”network element registration template”. In the SBA, the CN control plane NEs communicate with each other using the TCP/HTTP 2.0 based service-based interface (SBI). This also means that the NE registration information may be transmitted in plaintext, which will be exposed to the risk of data leakage [25].In case of data leakage, this NE may be maliciously attacked after successful registration. In addition an attacker can use the stolen NE key information to forge a malicious NE and initiate a registration operation to the NRF. Once the registration is successful it means that there is a malicious NE node in the 5G core network. All data passing through this node can be accessed and exploited by the attacker at will, which can cause more damage.
- Security Threats in NE Subscription and DiscoveryAfter registration, NE will inform other NRFs about its state. When a qualified NE initiates registration, the NRF notifies the subscribing NE and the subscribing NE determines whether it needs to communicate with the newly registered NE in the current period according to the actual service demand. The process of matching the newly registered NEs and updating the network element relationship is called “Discovery”. An attacker can use a man-in-the-middle attack or DoS attack to disrupt the communication between NEs and NRFs; 3GPP has discussed this problem in TS 33.501. Three of them are worth being maliciously exploited by attackers as follows:
- The attacker performs a replay attack on the NRF, repeatedly initiating NE discovery or subscription requests to occupy NRF computing resources.
- The attacker can hijack the TCP session between the NE and the NRF, initiating unnecessary NE service subscription requests to the NRF by tampering with the NE’s subscription request data, resulting in a waste of resources.
- The attacker can launch a DoS attack on the NRF to block the notification messages it sends to the subscribing NE. This causes the subscribing NE to remain in a state of expectation for one or more classes of network element services, which in turn may cause some service requirements of that subscribing NE to remain unavailable.
- Security Threats in NE LogoutCN-NE will initiate a request to the NRF to go offline after ending its own service tasks. The NRF will delete the configuration data related to the logout NE after receiving the request. The security problem in this phase is the data leakage caused by incomplete deletion of the data related to the logout NE [6].The residual NE configuration information may be mistaken as valid data by the NRF, which may affect NRF service operation. In addition, once the residual data is leaked, malicious attackers can utilize it to forge illegal NE registration requests, which can lead to DoS attacks.
4.1.2. Threats on NE Deployment of UPF Sinking
- Packet processing settings are tampered with. An attacker sends a session modification request containing the DROP flag in the “Apply Action” field of the forwarding action rule. If the modification is successful, the UPF will delete the rule containing the TEID and the IP address of the base station, resulting in the GTP tunnel for the user’s downlink data being cut off and the user will not be able to access the Internet.
- The attacker can use the session modification request to redirect user traffic from the UPF to a resource under the attacker’s control. To do this, the attacker needs to change the IP address in the outer header creation field and thus access the user’s downlink data without the user realizing that the traffic is being intercepted.
4.1.3. Threats on NE Deployment of CU/DU Separation
4.2. Security Issues in Slice Generation
4.2.1. Malicious Tampering with User Requirements
4.2.2. CSMF Permission Hijacking
- The attacker attacks to infiltrate the CSMF and seize control of the CSMF before the user’s slice request arrives. When the user request arrives at the CSMF, the attacker can steal the user’s private data and cause a data breach. Or the attacker can use the stolen information to impersonate a legitimate user to initiate a slicing request to the 5G network, resulting in illegal theft of slicing resources.
- The attacker can launch a DoS attack on the CSMF or NSMF, causing the entire slice management module to go down. Subscriber services will not be satisfied or will always be down, potentially causing the telecom operator to lose a large number of 5G subscribers.
- The attacker launches an attack during the CSMF’s analysis of subscriber requirements, misleading its CSMF to ignore or misunderstand the key information of subscribers, causing the subscriber requirements analysis to deviate and resulting in improperly designed slice templates. The service capability of all slices generated from that improper template is compromised.
4.2.3. Slice Template Information Leakage
4.2.4. API Hijacking/Replay Attacks
- Attacks on the public interface to gain access to the slice (or communication service) management module. During the slice generation phase, external operators can access the slicing management module through the northbound standardized API [43]. Operators can perform different operations in different scenarios, such as creating or deleting slices, configuration, activation and monitoring of different levels of slices, etc. An attacker can interfere with slice configuration and activation, and thus the creation, instantiation and decommissioning process of a slice (or communication service) [18], by attacking the API. Examples include modifying existing slice configurations or deleting activated slices to cause denial of service, modifying slice routing configurations to cause malicious route targeting and potentially denial of service (or malicious charging) of slices (or communication services).
- Replay legitimate messages on public interfaces. The slice (or communication service) management module receives replayed legitimate messages and then unconsciously performs repeated management operations, such as repeated slice creation, repeated billing resulting in false charging, etc.
- Destroying the message integrity and authenticity of packets before they reach the interface. By tampering with the request information of a slice (or communication service), the attacker may create network slices that require a large amount of network resources (or network sub-slices) to support in order to exhaust the network resources and cause the network to go down.
4.3. Security Issues in Slice Operation and Maintenance
4.3.1. Threats on Management Data Leakage
- Threats over network slice selection informationTo achieve error-free identification of end-to-end network slices, the current solution is to uniquely identify each network slice through Single Network Slice Selection Assistance Information (S-NSSAI). The presence of S-NSSAI simplifies the authentication process for user terminals to access each subnetwork slice of 5G and makes the matching of radio access network sub-slices with core network sub-slices more flexible. In addition, the ensemble consisting of one or more S-NSSAIs is called the Network Slice Selection Assistance Information (NSSAI). Among them, 3GPP specifies different types of NSSAIs for managing a subscriber’s slice signing information and slice request information. It follows that the NSSAI requires a higher level of data security protection when a slice with service capability is requested to be put into use by a user, i.e., when the slice is in the operational state.3GPP TR 33.811 [27] points out that, if the confidentiality of the NSSAI is not guaranteed, the network slicing service will be exposed to data leakage and man-in-the-middle attacks at the connection establishment stage may happen. Assuming that the NSSAI is transmitted without encryption, an attacker could attempt to steal users’ private data. Further more, attackers can use the user’s privacy data to perform a man-in-the-middle attack on critical services related to the NSSAI to make the slicing services inoperable. There is also a data tampering attack against the rejected NSSAI specified by 3GPP, when an attacker performs data tampering on the rejected NSSAI so that the slice that needs to be revoked to be denied remains in an inaccessible state even if the user has legitimate access to the slice [27].
- Threats over slice operation monitoring reportSMS uses the “slice operation monitoring report” to manage the operation status of the corresponding slice; the relevant configuration of the slice is modified according to the feedback of the monitoring report. The confidentiality of the slice operation monitoring report can, to a certain extent, guarantee the safe operation of the slice.Once the monitoring report is compromised, the slice operation information (e.g., topology information) within the valid time period of the report will be at risk of malicious exploitation [27]. Tampering with the slice operation data in the monitoring report misleads the slice management system to perform improper operations on the relevant slices, e.g., early retirement of slices, duplicate requests for slice sensitive resources, etc. The attacker can also collect a large number of slice operation monitoring reports to extract the operation characteristics of a class of slices and construct fake slices to achieve the purpose of disrupting the slice management system and obstructing the normal operation of legitimate slices.
- Threats over network slice decommissioning informationThe main work of the slice decommissioning phase is to release the slice resources and delete the slice-related information, which leads to the potential risk of leaking sensitive data exposed in the decommissioning process [14]. Moreover, since the slice decommissioning is essentially the process of resource release, when the resource release is not legitimate or the resource release is not complete, an attacker can launch a DDoS attack by consuming the current resources [18].
4.3.2. Threats on Opened Interfaces
- Threats in Opened Interfaces of NEFNEF opens the network capabilities of the 5G core network to third-party applications to achieve a friendly interface between network capabilities and service requirements. In turn, it improves the service experience and optimizes the network resource allocation [44,45,46]. The northbound NEF network elements are open API interfaces for interfacing with third-party applications and the rest are southbound interfaces for interfacing with the 5GC. This shows that the open network capability of the 5G core network to the outside world is based on the secure communication of the northbound API interfaces of NEF. It also determines that the interaction process will face security issues such as data leakage, illegal authorized access, packet hostage, denial of service and shared data tampering.
- Threats in Opened Interfaces of Cloud-native 5G ArchitectureIn a cloud-native 5G architecture, the network functions and services are designed and implemented as containerized micro-services, which can be dynamically orchestrated and managed in a cloud environment. When 5G core networks are deployed virtualized in the cloud, a number of security issues regarding remote management become particularly salient. Lingshu et al. [28] point out that cloud-based 5G core networks employ many open APIs, which makes it easier for attackers to exploit vulnerabilities and backdoors to illegally access unauthorized resources and consume more resources. In addition, attackers can launch various attacks to compromise the network slices by manipulating, managing and modifying the interfaces [29].It is important to note that the key security threats to cloud-deployed 5G core networks will not be limited to interface security. Misconfiguration Vulnerabilities, Vulnerability of Applications and Malware Injection Attacks, etc. have also been discussed [24].
4.3.3. Threats in “Multi-Slice/Multi-Tenant” Scenarios
- Threats in Terminal Access Slicing ScenarioIn reality, the security landing point of network slicing and mutual authentication of user terminals are not the same. First of all, the key to the authentication of users by network slicing lies in the legitimacy and authenticity of users. Avoiding attackers can try to access the slice by impersonating legitimate users, resulting in illegal use of the slice service. Second, the key to user authentication for the slice lies in the integrity and reliability of the slice. Suppose a user accesses an incomplete slice that suffers from corruption; the user’s demand will not be responded to and at the same time the user may unknowingly send sensitive data to this malicious slice, thus it may lead to user data leakage.Borgaonkar et al. [30] point out a logical vulnerability in the 5G Authentication and Key Agreement (5G-AKA) protocol specification, namely: the protection mechanism for sequence numbers (SQNs) is not secure under specific replay attacks due to its use of iso-or (XOR) and lack of randomness. Based on this vulnerability, Bello et al. [31] propose an attack against user location privacy.
- Threats in Multi-tenant One-Slice ScenarioWhen multiple users rent the same network slice, the leased shared slice can be seen as a security weakness in the slicing service. Tenants who have a lease management relationship with the slice may try to access the private data of other tenants through the shared slice, resulting in data leakage. In addition, illegal changes to the shared parameters in the shared slice can cause the shared slice to fail to serve properly, thus making the shared slice a malicious node.
- Threats in Multi-slice Scenarios With Single TenantThe multi-slice scenario with single tenant is recognized in that the slices involved in the collaboration are all legitimate operational slices for that user. Since 3GPP proposes that a single user can only access up to eight network slices at the same time [15], this also indicates that this scenario is a slice collaboration with extremely limited slice resources. Thus, we argue that the multi-slice collaboration with single tenant scenario is very sensitive to service requests and weakly fault-tolerant.Assuming that one of the user’s slices is attacked by a small amount of traffic, due to the limited service capacity of the slices, while prioritizing the normal operation of the slices themselves, the slices with which they have collaborative relationships may not be able to answer the requests. In addition, once one of the user’s slices is compromised, the collaborating slices will face the situation that no other slices are available for emergency response, which will lead to the paralysis of the collaborating slices’ services.
- Threats in Multi-slice Scenarios With Multiple TenantsA multi-slice scenario with multi-user participation is a situation where network sub-slices from different security domains (users or slices with different security levels) collaborate with each other. Olimid et al. [6] propose that, if a slice is defined as a “sub-slice chain” formed by multiple sub-slices, the interconnected nodes in the chain may become points of attack. The overall security level in a sub-slice chain depends on the least secure sub-slice in the chain. The attacker may try to attack the sub-slice with a low security level (especially the RAN sub-slice) to reach the sub-slice with a higher security level [14,32], which is located in the same sub-slice chain.In a connected vehicle scenario, since passengers or drivers may have different service requirements, vehicles can be connected to multiple slices simultaneously to satisfy various service requirements [33]. However, these services may have different security levels, which also leads to two types of security threats for such multi-slice communication, namely cross-slice data leakage and malicious exploitation of inter-slice communication. Assuming that a vehicle receives sensitive data from one slice and also uses data from another slice with a lower security level, such cross-security multi-slice data access can lead to data leakage. More seriously, such cross-slice security threats are made more severe due to the high mobility of vehicles [39].Some of the same security threats exist in both multi-slice scenarios. For example any DDoS attack against one slice may result in the compromise of other slices with which it shares physical resources. Similarly, if communication links are shared among multiple slices, then an attack on one slice may affect other slices [34]. An attacker may use inter-slice communication as a bridge to attack certain functions in a slice and disrupt related functions in other slices with which it has a communication relationship [33].In addition, there are several slice managers in 5G networks that are responsible for the creation, scheduling and instantiation of slices. Khan et al. [35] propose that. when multiple slice managers coexist, they must authenticate each other, otherwise there is no way to guarantee the security of users when they access multiple slices (belonging to different slice managers) and the reliability of inter-slice communication. When multiple slices allow inter-slice communication, possible security threats include unauthorized access, sensitive data leakage from inter-slice transfers and shared parameter leakage (if any) [36].
4.3.4. Threats in AMF Redirection
4.3.5. Threats from Terminal User
4.3.6. Threats on Physical Layer
5. Requirements and Recommendations for Creating 5G Network Slicing Systems
5.1. Data Security Requirements and Recommendations
- D-S-REQ-01: NE Registration Template shall have data confidentiality and integrity protection mechanisms;
- D-S-REQ-02: Slice templates shall be protected against detection and confidentiality mechanisms;
- D-S-REQ-03: Slice templates shall be checked for correctness and completeness prior to use;
- D-S-REQ-04: Slice templates should be dynamically adjusted and optimized;
- D-S-REQ-05: Temporary slice identification shall be updated periodically;
- D-S-REQ-06: Slice monitoring reports shall have a data confidentiality and integrity protection mechanism;
- D-S-REQ-07: Decommissioning slice data should be desensitized;
- D-S-REQ-08: Decommissioning slice resources should have a “cooling-off period”.
5.2. Interface Protection Requirements and Recommendations
- I-P-REQ-01: Reliable transmission between NE interfaces shall be established using TLS as the authentication mechanism and OAuth 2.0 as the authorization protocol;
- I-P-REQ-02: The 5G-CN external interface shall authenticate and authorize third-party applications;
- I-P-REQ-03: The 5G-CN external interface should have the capability of security auditing, monitoring, analysis and reporting [43].
5.3. AMF Redirection Protection Requirements and Recommendations
- A-P-REQ-01: The source AMF shall export a new key for the target AMF;
- A-P-REQ-02: The target AMF shall trigger a new authentication process with the user;
- A-P-REQ-03: The new authentication process shall refresh the entire key hierarchy.
5.4. Slice Authentication and Entity Management Requirements and Recommendations
- S-A-REQ-01: Network operators shall periodically perform a trusted assessment of the slice management module;
- S-A-REQ-02: The slice management module shall have two-way authentication with the slice user;
- S-A-REQ-03: The slice management module shall check the authenticity and completeness of the user’s slice request;
- S-A-REQ-04: Slice users should be primary authenticated;
- S-A-REQ-05: Third-party service providers shall have the right to require secondary authentication of slice users;
- S-A-REQ-06: Specific slices should require user authentication and authorization at the slice level.
5.5. Multi-Tenant Scenario Security Requirements and Recommendations
- Mt-S-REQ-01: Slice users should have privacy protection mechanisms [25];
- Mt-S-REQ-02: Multi-tenant slices should have performance monitoring and fault detection mechanisms.
5.6. Multi-Slice Scenario Security Requirements and Recommendations
- Ms-S-REQ-01: Access networks shall introduce conflict avoidance protocols to achieve sub-slice isolation;
- Ms-S-REQ-02: Transportation of traffic shall be secured by the bearer network using physical/logical segregation;
- Ms-S-REQ-03: Core network elements should be segregated by security level;
- Ms-S-REQ-04: Different security domain network elements should develop strict security access authentication mechanisms.
6. Future Trends in 5G Network Slicing Security
6.1. Artificial Intelligence
6.2. Zero Trust Model
6.3. 6G Network Slicing Security
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
3GPP | 3rd Generation Partnership Project |
5G | Fifth Generation Mobile Communications Technology |
5GC | 5G Core Network |
AAU | Active Antenna Unit |
AMF | Access and Mobility Management Function |
API | Application Programming Interface |
AUSF | Authentication Server Function |
BIOS | Basic Input/Output System |
BSS | Business Support Systems |
CN | Core Network |
CPU | Central Processing Unit |
CSC | Communication Service Customer |
CSMF | Communication Service Management Function |
CSP | Communication Service Provider |
CU | Centralized Unit |
DDoS | Distributed Denial of Service |
DROP | Data Retention Optimization Protocol |
DU | Distributed Unit |
DoS | Denial of Service |
ETSI | European Telecommunications Standards Institute |
GTP | GPRS Tunneling Protocol |
KPI | Key Performance Indicator |
MANO | Management And Network Orchestration |
MDPI | Multidisciplinary Digital Publishing Institute |
NE | Network Element |
NEF | Network Exposure Function |
NFV | Network Functions Virtualization |
NFVI | Network Functions Virtualization Infrastructure |
NFVO | Network Functions Virtualization Orchestrator |
NRF | Network Repository Function |
NSI | Network Slice Instance |
NSMF | Network Slice Management Function |
NSSAI | Network Slice Selection Assistance Information |
NSSF | Network Slice Selection Function |
NSSI | Network Slice Subnet Instance |
NSSMF | Network Slice Subnet Management Function |
NST | Network Slice Template |
OSS | Operational Support Systems |
PCF | Policy Control Function |
PFCP | Packet Forwarding Control Protocol |
PLMN | Public Land Mobile Network |
QoS | Quality of Service |
RAN | Radio Access Network |
RPA | Robotic Process Automation |
S-NSSAI | Single Network Slice Selection Assistance Information |
SBA | Service-Based Architecture |
SBI | Service-Based Interface |
SDN | Software Defined Networking |
SDNO | Software-Defined Networking Orchestrator |
SMS | Slicing Management System |
SQN | Sequence Number |
TCP | Transmission Control Protocol |
TEID | Tunnel Endpoint Identifier |
TN | Transport Network |
UDM | Unified Data Management |
UDR | Unified Data Repository |
UPF | User Plane Function |
VIM | Virtual Infrastructure Manager |
VNF | Virtual Network Function |
VNFM | Virtual Network Function Manager |
XOR | Exclusive OR |
eMBB | Enhanced Mobile Broadband |
uRLLC | Ultra-Reliable Low-Latency Communications |
References
- Subedi, P.; Alsadoon, A.; Prasad, P.; Rehman, S.; Giweli, N.; Imran, M.; Arif, S. Network slicing: A next generation 5G perspective. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 102. [Google Scholar] [CrossRef]
- Wong, S.; Han, B.; Schotten, H.D. 5G Network Slice Isolation. Network 2022, 2, 153–167. [Google Scholar] [CrossRef]
- Chen, Y.Z.; Chen, T.Y.H.; Su, P.J.; Liu, C.T. A Brief Survey of Open Radio Access Network (O-RAN) Security. arXiv 2023, arXiv:2311.02311. [Google Scholar]
- Khan, L.U.; Yaqoob, I.; Tran, N.H.; Han, Z.; Hong, C.S. Network slicing: Recent advances, taxonomy, requirements, and open research challenges. IEEE Access 2020, 8, 36009–36028. [Google Scholar] [CrossRef]
- Dangi, R.; Jadhav, A.; Choudhary, G.; Dragoni, N.; Mishra, M.K.; Lalwani, P. Ml-based 5g network slicing security: A comprehensive survey. Future Internet 2022, 14, 116. [Google Scholar] [CrossRef]
- Olimid, R.F.; Nencioni, G. 5G Network Slicing: A Security Overview. IEEE Access 2020, 8, 99999–100009. [Google Scholar] [CrossRef]
- Jhanjhi, N.; Verma, S.; Talib, M.; Kaur, G. A canvass of 5G network slicing: Architecture and security concern. IOP Conf. Ser. Mater. Sci. Eng. 2020, 993, 012060. [Google Scholar]
- Salahdine, F.; Liu, Q.; Han, T. Towards Secure and Intelligent Network Slicing for 5G Networks. IEEE Open J. Comput. Soc. 2022, 3, 23–38. [Google Scholar] [CrossRef]
- Dhanasekaran, R.M.; Ping, J.; Gomez, G.P. End-to-End Network Slicing Security Across Standards Organizations. IEEE Commun. Stand. Mag. 2023, 7, 40–47. [Google Scholar] [CrossRef]
- Singh, V.P.; Singh, M.P.; Hegde, S.; Gupta, M. Security in 5G Network Slices: Concerns and Opportunities. IEEE Access 2024, 12, 52727–52743. [Google Scholar] [CrossRef]
- Rost, P.; Mannweiler, C.; Michalopoulos, D.S.; Sartori, C.; Sciancalepore, V.; Sastry, N.; Holland, O.; Tayade, S.; Han, B.; Bega, D.; et al. Network slicing to enable scalability and flexibility in 5G mobile networks. IEEE Commun. Mag. 2017, 55, 72–79. [Google Scholar] [CrossRef]
- 3rd Generation Partnership Project (3GPP). Study on Management and Orchestration of Network Slicing for Next Generation Network. Technical Specification 3GPP TR 28.801 Version 15.1.0 Release 15. 2017. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3091 (accessed on 10 April 2024).
- Ordonez-Lucena, J.; Ameigeiras, P.; Lopez, D.; Ramos-Munoz, J.J.; Lorca, J.; Folgueira, J. Network slicing for 5G with SDN/NFV: Concepts, architectures, and challenges. IEEE Commun. Mag. 2017, 55, 80–87. [Google Scholar] [CrossRef]
- 3rd Generation Partnership Project (3GPP). Study on the Security Aspects of the Next Generation System. Technical Specification 3GPP TR 33.899 Version 14.1.0 Release 14. 2017. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3045 (accessed on 10 April 2024).
- 3rd Generation Partnership Project (3GPP). System Architecture for the 5G System and Stage 2. Technical Specification 3GPP TS 23.501 Version 16.6.0 Release 16. 2020. Available online: https://www.etsi.org/deliver/etsi_ts/123500_123599/123501/16.06.00_60/ts_123501v160600p.pdf (accessed on 10 April 2024).
- Groupe Speciale Mobile Association. An Introduction to Network Slicing. Technical Specification. 2017. Available online: https://www.etsi.org/deliver/etsi_ts/123500_123599/123501/16.06.00_60/ts_123501v160600p.pdf (accessed on 10 April 2024).
- 3rd Generation Partnership Project (3GPP). Study on Architecture for Next Generation System. Technical Specification 3GPP TR 23.799 Version 14.0.0 Release 14. 2016. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3008 (accessed on 10 April 2024).
- Hongyi, L.; Yirong, Z.; Jinyan, L.; Xuetian, Z. Research on 5G network slice management based on network exposure. Dianzi Jishu Yingyong 2020, 46, 1–5. [Google Scholar] [CrossRef]
- Le, H.; Lei, X.; Baojun, J. 5G Network Slice Management System and Practice of CSPs. Front. Data Comput. 2020, 2, 44–54. [Google Scholar]
- Jin-Wen, W.; Xiao-Li, Z.; Qi, L.; Jian-Ping, W.; Yong, J. Network Function Virtualization Technology: A Survey(Review). Chin. J. Comput. 2019, 42, 415–436. [Google Scholar] [CrossRef]
- Yousaf, F.Z.; Bredel, M.; Schaller, S.; Schneider, F. NFV and SDN—Key technology enablers for 5G networks. IEEE J. Sel. Areas Commun. 2017, 35, 2468–2478. [Google Scholar] [CrossRef]
- An, Q.; Liu, Y.; Sun, Q.; Tian, L. Network slicing architecture based on SDN and NFV. Telecommun. Sci. 2016, 32, 119b126. [Google Scholar]
- Singh, J.; Refaey, A.; Shami, A. Multilevel security framework for nfv based on software defined perimeter. IEEE Netw. 2020, 34, 114–119. [Google Scholar] [CrossRef]
- Jangjou, M.; Sohrabi, M.K. A comprehensive survey on security challenges in different network layers in cloud computing. Arch. Comput. Methods Eng. 2022, 29, 3587–3608. [Google Scholar] [CrossRef]
- Zhang, S.; Wang, Y.; Zhou, W. Towards secure 5G networks: A Survey. Comput. Netw. 2019, 162, 106871. [Google Scholar] [CrossRef]
- 3rd Generation Partnership Project (3GPP). 5G Security Architecture and Procedures for 5G System. Technical Specification 3GPP TS 33.501 Version 16.3.0 Release 16. 2020. Available online: https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/16.03.00_60/ts_133501v160300p.pdf (accessed on 10 April 2024).
- 3rd Generation Partnership Project (3GPP). Study on Security Aspects of 5G Network Slicing Management. Technical Specification 3GPP TR 33.811 Version 15.0.0 Release 15. 2019. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3358 (accessed on 10 April 2024).
- Lingshu, L.; Jiangxing, W.; Hongchao, H.; Wenyan, L.; Zehua, G. Secure cloud architecture for 5G core network. Chin. J. Electron. 2021, 30, 516–522. [Google Scholar] [CrossRef]
- Ahmad, I.; Kumar, T.; Liyanage, M.; Okwuibe, J.; Ylianttila, M.; Gurtov, A. Overview of 5G security challenges and solutions. IEEE Commun. Stand. Mag. 2018, 2, 36–43. [Google Scholar] [CrossRef]
- Borgaonkar, R.; Hirschi, L.; Park, S.; Shaik, A. New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proc. Priv. Enhancing Technol. 2019, 2019, 108–127. [Google Scholar] [CrossRef]
- Bello, Y.; Hussein, A.R.; Ulema, M.; Koilpillai, J. On sustained zero trust conceptualization security for mobile core networks in 5g and beyond. IEEE Trans. Netw. Serv. Manag. 2022, 19, 1876–1889. [Google Scholar] [CrossRef]
- Alliance, N. 5G Security Recommendations Package; White Paper; 2016; Available online: https://ngmn.org/wp-content/uploads/Publications/2016/160506_NGMN_5G_Security_Package_1_v1_0.pdf (accessed on 10 April 2024).
- Campolo, C.; Molinaro, A.; Iera, A.; Menichella, F. 5G network slicing for vehicle-to-everything services. IEEE Wirel. Commun. 2017, 24, 38–45. [Google Scholar] [CrossRef]
- Sattar, D.; Matrawy, A. Towards secure slicing: Using slice isolation to mitigate DDoS attacks on 5G core network slices. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; pp. 82–90. [Google Scholar]
- Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutor. 2019, 22, 196–248. [Google Scholar] [CrossRef]
- European Union Agency for Cybersecurity. Threat Landscape for 5G Networks: Updated Threat Assessment for the Fifth Generation of Mobile Telecommunications Networks (5G); White Paper; ENISA: Athens, Greece, 2020.
- 3rd Generation Partnership Project (3GPP). Study on Security Aspects of Network Slicing Enhancement. Technical Specification 3GPP TR 33.813 Version 16.0.0 Release 16. 2020. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3541 (accessed on 10 April 2024).
- Dhamija, R.; Tygar, J.D.; Hearst, M. Why Phishing Works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2006, pp. 581–590. Available online: https://escholarship.org/content/qt9dd9v9vd/qt9dd9v9vd.pdf (accessed on 10 April 2024).
- Wang, J.; Liu, J. Secure and Reliable Slicing in 5G and Beyond Vehicular Networks. IEEE Wirel. Commun. 2022, 29, 126–133. [Google Scholar] [CrossRef]
- Stewin, P.; Bystrov, I. Understanding DMA malware. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, 26–27 July 2012; pp. 21–41. [Google Scholar]
- Alliance, N. Service-based architecture in 5G. In Final Deliverable (Approved-P Public); 2018; Available online: https://www.ngmn.org/publications/service-based-architecture-in-5g.html (accessed on 10 April 2024).
- Tang, Q.; Ermis, O.; Nguyen, C.D.; De Oliveira, A.; Hirtzig, A. A systematic analysis of 5g networks with a focus on 5g core security. IEEE Access 2022, 10, 18298–18319. [Google Scholar] [CrossRef]
- 3rd Generation Partnership Project (3GPP). Study on Common API Framework for 3GPP North-Bound APIs. Technical Specification 3GPP TR 23.722 Version 15.1.0 Release 15. 2017. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3188 (accessed on 10 April 2024).
- Bin, Z.; Lin, L.; Yue, H.; Jiefu, G. Research On Industry Oriented 5G Network Capability Exposure Development Strategy. Des. Tech. Posts Telecommun. 2020, 7, 1–6. (In Chinese) [Google Scholar]
- Hongmei, Y.; Meiyu, L. Research on Open Technologies of 5G Network and Security Capability. Mob. Commun. 2020, 4, 65–68. (In Chinese) [Google Scholar]
- Jinyan, L.; Lei, Z.; Xinlan, X. Converged capability exposure architecture and deployment suggestions. Inf. Commun. Technol. Policy 2020, 46, 21. [Google Scholar]
- Verma, A.; Mittal, M.; Chhabra, B. The mutual authentication scheme to detect virtual side channel attack in cloud computing. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 2017, 15, 83–98. [Google Scholar]
- Cunha, V.A.; da Silva, E.; de Carvalho, M.B.; Corujo, D.; Barraca, J.P.; Gomes, D.; Granville, L.Z.; Aguiar, R.L. Network slicing security: Challenges and directions. Internet Technol. Lett. 2019, 2, e125. [Google Scholar] [CrossRef]
- Ericsson, A. 5G Security:Scenarios and Solutions. In White Paper; 2015; Available online: https://www.everythingrf.com/whitepapers/details/2892-5g-security-scenarios-and-solutions (accessed on 10 April 2024).
- 3rd Generation Partnership Project (3GPP). Study on Enhancement of Network Slicing; Phase 2. Technical Specification 3GPP TR 23.700-40 Version 17.0.3.0 Release 17. 2021. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3687 (accessed on 10 April 2024).
- Valero, J.M.J.; Sánchez, P.M.S.; Lekidis, A.; Hidalgo, J.F.; Pérez, M.G.; Siddiqui, M.S.; Celdrán, A.H.; Pérez, G.M. Design of a Security and Trust Framework for 5G Multi-domain Scenarios. J. Netw. Syst. Manag. 2022, 30, 7. [Google Scholar] [CrossRef]
- 3rd Generation Partnership Project (3GPP). Study on Tenancy Concept in 5G Networks and Network Slicing Management. Technical Specification 3GPP TR 28.804 Version 16.0.1 Release 16. 2019. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3549 (accessed on 10 April 2024).
- Odarchenko, R.; Iavich, M.; Iashvili, G.; Fedushko, S.; Syerov, Y. Assessment of security KPIs for 5G network slices for special groups of subscribers. Big Data Cogn. Comput. 2023, 7, 169. [Google Scholar] [CrossRef]
- Li, X.; Samaka, M.; Chan, H.A.; Bhamare, D.; Gupta, L.; Guo, C.; Jain, R. Network slicing for 5G: Challenges and opportunities. IEEE Internet Comput. 2017, 21, 20–27. [Google Scholar] [CrossRef]
- Suárez, L.; Espes, D.; Cuppens, F.; Phan, C.T.; Bertin, P.; Le Parc, P. Managing secure inter-slice communication in 5G network slice chains. In IFIP Annual Conference on Data and Applications Security and Privacy; Springer: Cham, Switzerland, 2020; pp. 24–41. [Google Scholar]
- Martins, J.S.; Carvalho, T.C.; Moreira, R.; Both, C.; Donatti, A.; Corrêa, J.H.; Suruagy, J.A.; Corrêa, S.L.; Abelem, A.J.; Ribeiro, M.R.; et al. Enhancing Network Slicing Architectures with Machine Learning, Security, Sustainability and Experimental Networks Integration. IEEE Access 2023, 11, 69144–69163. [Google Scholar] [CrossRef]
- Liu, C.C.; Chou, L.D. 5G/B5G Network Slice Management via Staged Reinforcement Learning. IEEE Access 2023, 11, 72272–72280. [Google Scholar] [CrossRef]
- Thantharate, A.; Paropkari, R.; Walunj, V.; Beard, C. DeepSlice: A deep learning approach towards an efficient and reliable network slicing in 5G networks. In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 10–12 October 2019; pp. 0762–0767. [Google Scholar]
- Sedjelmaci, H. Cooperative attacks detection based on artificial intelligence system for 5G networks. Comput. Electr. Eng. 2021, 91, 107045. [Google Scholar] [CrossRef]
- Thantharate, A.; Paropkari, R.; Walunj, V.; Beard, C.; Kankariya, P. Secure5G: A deep learning framework towards a secure network slicing in 5G and beyond. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; pp. 0852–0857. [Google Scholar]
- Shan, Y. Design of 5G Security Tile Architecture Based on Zero Trust. Commun. Manag. Technol. 2022, 1, 47–59. (In Chinese) [Google Scholar]
- Carrozzo, G.; Siddiqui, M.S.; Betzler, A.; Bonnet, J.; Perez, G.M.; Ramos, A.; Subramanya, T. AI-driven zero-touch operations, security and trust in multi-operator 5G networks: A conceptual architecture. In Proceedings of the 2020 European Conference on Networks and Communications (EuCNC), Dubrovnik, Croatia, 15–18 June 2020; pp. 254–258. [Google Scholar]
- Dzogovic, B.; Santos, B.; Hassan, I.; Feng, B.; Jacot, N.; Van Do, T. Zero-Trust Cybersecurity Approach for Dynamic 5G Network Slicing with Network Service Mesh and Segment-Routing over IPv6. In Proceedings of the 2022 International Conference on Development and Application Systems (DAS), Suceava, Romania, 26–28 May 2022; pp. 105–114. [Google Scholar]
- Gilman, E.; Barth, D. Zero Trust Networks; O’Reilly Media, Incorporated: Sebastopol, CA, USA, 2017. [Google Scholar]
- Ramezanpour, K.; Jagannath, J. Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN. Comput. Netw. 2022, 217, 109358. [Google Scholar] [CrossRef]
Papers | Year | Contribution in Security Aspects | Note |
---|---|---|---|
5G Network Slicing: A Security Overview [6] | 2020 | The paper highlights threats and recommendations from the aspects of lifecycle security, intra-slice security and inter-slice security. It also identifies and discusses open security issues related to network slicing. | Safety recommendations are not comprehensive enough. |
A canvass of 5G network slicing: Architecture and security concern [7] | 2020 | The authors examined slice lifecycle, inter-slice and intra-slice security threats. | Several threats and vulnerable areas exist that are not covered. |
ML-based 5G network slicing security: A comprehensive survey [5] | 2022 | The paper introduces ML-based network slicing, including threats and attacks during the slicing lifecycle. | Deeper exploration is needed in multiple vulnerable areas. |
Towards secure and intelligent network slicing for 5G networks [8] | 2022 | The paper classifies different attacks targeting network slicing into three main classes: inter-slice, intra-slice, and lifecycle attacks. The paper analyzes how these attacks can be mitigated and evaluated the performance of some of them using Open Air Interface. | Attacks and threats related to other vulnerable areas need to be discussed. |
End-to-End Network Slicing Security Across Standards Organizations [9] | 2023 | The paper analyzes the underlying security threats of network slicing, derives corresponding security requirements and studies specific network slicing protection mechanisms. | Several threats and vulnerable areas exist that are not covered. |
Security in 5G Network Slices: Concerns and Opportunities [10] | 2024 | The core objective of this work is to understand network slices and their potential vulnerabilities, examine the essential security prerequisites and suggest strategies. | Safety recommendations are not comprehensive enough. |
5G NS Lifecycle | Threat Scenarios/Attack Surfaces | Threats/Attacks/Vulnerabilities | Source |
---|---|---|---|
Deployment | NE registration | 1. NE registration template data leakage | [25] |
2. Malicious NE forgeries and registrations | \ | ||
NE subscription and discovery | 3. Replay attacks on the NRF | [26] | |
4. Hijacking attacks TCP session between NE and NRF | [26] | ||
5. DoS attacks on the NRF | [26] | ||
NE logout | 6. NE decommissioned data leakage | [6] | |
7. Illegal NE registration requests lead to DoS Attacks | \ | ||
UPF sinking deployment | 8. DoS Attacks on the UPF | \ | |
9. UPF configuration tampering | \ | ||
CU and DU deployment | 10. Data leakage and tampering | \ | |
11. Hijack CU | \ | ||
Generation | User request transmission | 12. Malicious tampering with user requirements | \ |
CSMF analyzes user requirements | 13. Hijack CSMF permission before user’s requirements arrive | \ | |
14. DoS attacks on CSMF | \ | ||
15. Interference as CSMF analyzes user requirements | \ | ||
Slice template management | 16. Slice template data leakage | [7] | |
17. Slice template data tampering | \ | ||
18. Malicious slice template replay attacks | \ | ||
Public interfaces (PIs) | 19. Attack PIs to gain slice management module permissions | \ | |
20. Attack PIs to gain ComServ Management Module permissions | \ | ||
21. Attack PIs to interfere with network slice lifecycle | [18] | ||
22. Attack PIs to interfere with communication services configuration | [18] | ||
23. Replay legitimate messages on public interfaces | \ | ||
24. Destroy the packet before it reaches PIs | \ | ||
Operation and Maintenance | Slice selection information | 25. Slice service data (related to NSSAI) leakage | [27] |
26. Man-in-the-middle attacks at the connection establishment stage | [27] | ||
27. Man-in-the-middle attacks on critical services related to NSSAI | \ | ||
28. Data tampering attack against the rejected NSSAI | [27] | ||
Slice operation monitoring report | 29. Tamper with slice report causes incorrect management operations | \ | |
30. Collect slice reports to fake malicious slices | \ | ||
Slice decommissioning information | 31. Slice decommissioning sensitive data leakage | [14] | |
32. Slice resources released illegally | [18] | ||
33. Slice resources released incompletely | [18] | ||
Opened interfaces of NEF | 34. Communication data leakage | \ | |
35. Unauthorized access | \ | ||
36. Packet hostage | \ | ||
37. DoS attacks | \ | ||
38. Shared data tampering | \ | ||
Opened interfaces of cloud-native 5G | 39. Exploiting vulnerabilities or backdoors to illegally access resources | [28] | |
40. Manipulating or modifying interfaces to disrupt network slices | [29] | ||
Cloud-native 5G architecture | 41. Misconfiguration vulnerabilities | [24] | |
42. Application vulnerabilities | [24] | ||
43. Malware injection attacks | [24] | ||
Terminal access slicing scenario | 44. Impersonate a legitimate user to access slices | \ | |
45. Data leakage due to access to malicious slices | \ | ||
46. Logical vulnerability in the 5G-AKA protocol specification | [30] | ||
47. Attack on user location privacy | [31] | ||
Multi-tenant one-slice scenario | 48. User privacy data leakage | \ | |
49. Maliciously tampering with shared slice parameters | \ | ||
Multi-slice scenarios with single tenant | 50. Low-flow attacks | \ | |
51. Attack delivery between slices | \ | ||
Multi-slice scenarios with multiple tenants | 52. Attack against weakly secured sub-slices | [6] | |
53. Attack delivery between sub-slices | [14,32] | ||
54. Leakage of sensitive data across slice security domains | [33] | ||
Multi-slice scenarios | 55. Attack on shared communication links between slices | [34] | |
56. Attack slice function by using inter-slice communication links | [33] | ||
57. Unauthorized access between multiple slice managers | [35] | ||
58. Data leakage in multi-slice communication | [36] | ||
AMF redirection | 59. Slice data obfuscation caused by AMF key non-separation | [37] | |
60. Slice data leakage caused by AMF key non-separation | [37] | ||
5G network terminal users | 61. Operators’ solutions cannot fulfill all hardware sec. requirements | \ | |
62. Improper slice operation by the user | [38] | ||
63. Insecure slice usage scenarios | \ | ||
64. Hijacking of terminal devices | [32] | ||
5G network physical layer | 65. Destruction of physical resources using malware implants | [39] | |
66. Destruction of physical resources using physical attacks | [39] | ||
67. Destruction of physical resources using resource consumption | [39] | ||
68. Exploit a vulnerability in hypervisor to gain root privileges | [28] | ||
69. Basic input/output system (BIOS) attack | [40] | ||
70. Side-channel attack (SCA) | [32,39] |
Security Requirements | Security Recommendations |
---|---|
D-S-REQ-01 | especially important |
D-S-REQ-02 | optional |
D-S-REQ-03 | optional |
D-S-REQ-04 | important |
D-S-REQ-05 | important |
D-S-REQ-06 | especially important |
D-S-REQ-07 | optional |
D-S-REQ-08 | important |
Protection Requirements | Protection Recommendations |
---|---|
I-P-REQ-01 | especially important |
I-P-REQ-02 | especially important |
I-P-REQ-03 | optional |
Protection Requirements | Protection Recommendations |
---|---|
A-P-REQ-01 | especially important |
A-P-REQ-02 | especially important |
A-P-REQ-03 | especially important |
Security Requirements | Security Recommendations |
---|---|
S-A-REQ-01 | optional |
S-A-REQ-02 | especially important |
S-A-REQ-03 | optional |
S-A-REQ-04 | especially important |
S-A-REQ-05 | optional |
S-A-REQ-06 | optional |
Security Requirements | Security Recommendations |
---|---|
Mt-S-REQ-01 | especially important |
Mt-S-REQ-02 | especially important |
Security Requirements | Security Recommendations |
---|---|
Ms-S-REQ-01 | optional |
Ms-S-REQ-02 | optional |
Ms-S-REQ-03 | optional |
Ms-S-REQ-04 | optional |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gao, S.; Lin, R.; Fu, Y.; Li, H.; Cao, J. Security Threats, Requirements and Recommendations on Creating 5G Network Slicing System: A Survey. Electronics 2024, 13, 1860. https://doi.org/10.3390/electronics13101860
Gao S, Lin R, Fu Y, Li H, Cao J. Security Threats, Requirements and Recommendations on Creating 5G Network Slicing System: A Survey. Electronics. 2024; 13(10):1860. https://doi.org/10.3390/electronics13101860
Chicago/Turabian StyleGao, Shujuan, Ruyan Lin, Yulong Fu, Hui Li, and Jin Cao. 2024. "Security Threats, Requirements and Recommendations on Creating 5G Network Slicing System: A Survey" Electronics 13, no. 10: 1860. https://doi.org/10.3390/electronics13101860
APA StyleGao, S., Lin, R., Fu, Y., Li, H., & Cao, J. (2024). Security Threats, Requirements and Recommendations on Creating 5G Network Slicing System: A Survey. Electronics, 13(10), 1860. https://doi.org/10.3390/electronics13101860