{"title":"Network Slicing in 5G and the Security Concerns","authors":"A. Mathew","doi":"10.1109/ICCMC48092.2020.ICCMC-00014","DOIUrl":null,"url":null,"abstract":"The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16

Abstract

The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
5G中的网络切片和安全问题
第五代移动通信(5G)目前正在推出,服务提供商正在其网络中采用它。5G可以连接多个设备并通过互联网进行通信,从而使其能够支持物联网(IoT)。其支持多种设备的技术之一是网络切片技术,该技术有助于管理由不同用户设备组成的逻辑网络。本研究的目的是探索网络切片技术,并调查其给5G带来的安全问题。本研究采用定性研究方法——系统评价法来收集和分析数据。该综述包括对从Google Scholar、IEEE和Cochrane图书馆获得的各种文献来源的分析。数据分析过程本质上是主题性的,重点关注安全挑战、解决方案和网络切片的优点。文献研究结果表明,网络切片存在两大挑战,即安全性和5G无线接入网络(RAN)的实现以适应切片。应对这些挑战的潜在解决方案包括通过切片、加密、身份验证和手动将切片分配给不同设备来实现网络隔离。从本研究中得出的主要结论是,网络切片适用于5G,并且解决方案在最大限度地降低其对网络构成的安全风险方面仍然有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis of Time Domain Features of Dysarthria Speech Tourism Recommendation System based on Knowledge Graph Feature Learning IoT systems based on SOA services: Methodologies, Challenges and Future directions Wildfire forecast within the districts of Kerala using Fuzzy and ANFIS A Review Study on the Multiple and Useful Application of Fiber Optic Illumination System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1