4.6 Article

Network Slicing Security Controls and Assurance for Verticals

Journal

ELECTRONICS
Volume 11, Issue 2, Pages -

Publisher

MDPI
DOI: 10.3390/electronics11020222

Keywords

3GPP; 5G; security controls; management and orchestration; network resource model; network slicing; security attributes; slicing profile

Funding

  1. National Centre of Research and Development in Poland [CYBERSECIDENT/489818/IV/NCBR/2021]
  2. POB Research Centre Cybersecurity and Data Science of Warsaw University of Technology [CyberiADa-1_2020_W24]

Ask authors/readers for more resources

This paper addresses the security challenges in implementing network slices in 5G networks. The authors propose that network slice controllers should support security controls at different network layers. They analyze current standards and trends to mitigate vulnerabilities and propose a classification of security controls based on efficiency and applicability. The concept of security domains is introduced to structure the orchestration principles by considering the necessary security controls.
This paper focuses on the security challenges of network slice implementation in 5G networks. We propose that network slice controllers support security by enabling security controls at different network layers. The slice controller orchestrates multilevel domains with resources at a very high level but needs to understand how to define the resources at lower levels. In this context, the main outstanding security challenge is the compromise of several resources in the presence of an attack due to weak resource isolation at different levels. We analysed the current standards and trends directed to mitigate the vulnerabilities mentioned above, and we propose security controls and classify them by efficiency and applicability (easiness to develop). Security controls are a common way to secure networks, but they enforce security policies only in respective areas. Therefore, the security domains allow for structuring the orchestration principles by considering the necessary security controls to be applied. This approach is common for both vendor-neutral and vendor-dependent security solutions. In our classification, we considered the controls in the following fields: (i) fair resource allocation with dynamic security assurance, (ii) isolation in a multilayer architecture and (iii) response to DDoS attacks without service and security degradation.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available