4.7 Review

5G networks: Types of isolation and their parameters in RAN and CN slices

Journal

COMPUTER NETWORKS
Volume 171, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.comnet.2020.107135

Keywords

5G security; Slices' isolation; Isolation properties; Isolation parameters; Isolation traits; Isolation level

Ask authors/readers for more resources

In this paper, we present a systematic overview of existing isolation techniques in nodes and networks, especially in the Radio Access Network and the Core Network (RAN and CN) to give a background to standardized methods of calculating an isolation level leading to secure End-to-End (E2E) slices' isolation. We present specific isolation technologies used in layers of 5G RAN and CN. For RAN and CN slices we propose several isolation properties and parameters to enable qualitative and quantitative characterization of the isolation. Finally, we present our approach that makes it possible to establish the common level of isolation for an E2E slice in the 5G network. To illustrate how such an isolation model works in practice, we give numerical examples of calculating an isolation level for simple network slices. (C) 2020 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Application-Aware Firewall Mechanism for Software Defined Networks

Fahad N. Nife, Zbigniew Kotulski

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2020)

Article Computer Science, Information Systems

A New Card-Linked Loyalty Program: Estimated and Anticipated Benefits for Payment Transaction Parties

Albert Sitek, Zbigniew Kotulski

ELECTRONICS (2020)

Article Computer Science, Information Systems

Token-Based Authentication Framework for 5G MEC Mobile Networks

Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski

Summary: MEC technology in 5G networks offers a distributed computing environment, allowing customers with different needs and competencies to access services from external suppliers. We propose an efficient and flexible service access control framework on 5G MEC networks, with the focus on the MEC Enabler handling AAA requests. Additionally, we utilize the JSON Web Token standard as a tool for managing access control credentials.

ELECTRONICS (2021)

Article Computer Science, Information Systems

Security Context Migration in MEC: Challenges and Use Cases

Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Rafal Artych, Krzysztof Bocianiak, Jean-Philippe Wary

Summary: This article presents the research status and new security challenges of the migration of the security context between service instances in Edge/MEC servers. It specifies the steps of the migration procedure and provides possible solutions. The authors also demonstrate how the proposed solution can be used to protect 5G vertical industry services based on mobile use cases.

ELECTRONICS (2022)

Article Computer Science, Hardware & Architecture

Security architecture for authorized anonymous communication in 5G MEC

Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski

Summary: This paper presents a new access control architecture for the 5G MEC network, which meets security requirements in a flexible and lightweight way. It introduces the MEC Enabler as the central element for managing access control security policies and generating access credentials. The paper also describes a method to secure data packets in communication process to prevent unauthorized interception of sessions.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Low-complexity access control scheme for MEC-based services

Mariusz Sepczuk, Zbigniew Kotulski, Wojciech Niewolski, Tomasz W. Nowak

Summary: This paper proposes a new access control and service authorization protocol using MEC edge servers for network services in 5G networks. The solution does not affect the performance of services and addresses some network security issues caused by virtualization techniques in contemporary mobile networks.

PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS) (2022)

Article Computer Science, Information Systems

Verticals in 5G MEC-Use Cases and Security Challenges

Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Wojciech Niewolski, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary

Summary: 5G is the fifth-generation cellular network that satisfies IMT-2020 requirements. The application of MEC technology has a significant impact on the functioning of 5G MEC-based services, highlighting the need to focus on protecting vertical industries from network attacks.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification

Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo

Summary: This study proposes a radio frequency fingerprint identification solution based on crystal oscillator temperature adjustment, which enhances the differences between Wi-Fi device fingerprints and mitigates collision. Experimental results demonstrate the effectiveness of the system in identifying smartphones under different scenarios.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

QoS-based resource allocation for uplink NOMA networks

Yutong Wu, Jianyue Zhu, Xiao Chen, Yu Zhang, Yao Shi, Yaqin Xie

Summary: This paper proposes a quality-of-service-based SIC order method and optimizes power allocation for maximizing the rate in the uplink NOMA system. The simulation results demonstrate the superiority of the proposed method compared to traditional orthogonal multiple access and exhaustive search.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

Mitigating the impact of controller failures on QoS robustness for software-defined wide area networks

Songshi Dou, Li Qi, Zehua Guo

Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

An efficient topology partitioning algorithm for system-level parallel simulation of mega satellite constellation communication networks

Ke Wang, Xiaojuan Ma, Heng Kang, Zheng Lyu, Baorui Feng, Wenliang Lin, Zhongliang Deng, Yun Zou

Summary: This paper proposes a method based on a parallel network simulation architecture to improve the simulation efficiency of satellite networks. By effectively partitioning the network topology and using algorithms such as resource assessment and load balancing, the simulation performance is enhanced. Experimental results demonstrate the effectiveness of this method.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

Reuse-based online joint routing and scheduling optimization mechanism in deterministic networks

Sijin Yang, Lei Zhuang, Julong Lan, Jianhui Zhang, Bingkui Li

Summary: This paper proposes a reuse-based online scheduling mechanism that achieves deterministic transmission of dynamic flows through dynamic path planning and coordinated scheduling of time slots. Experimental results show that the proposed mechanism improves the scheduling success rate by 37.3% and reduces time costs by up to 66.6% compared to existing online scheduling algorithms.

COMPUTER NETWORKS (2024)