{"title":"Digital Twins-Empowered Secure Network Slice Access and Isolation for Consumer Healthcare Applications","authors":"Basudeb Bera;Ashok Kumar Das;Biplab Sikdar","doi":"10.1109/TSC.2024.3422792","DOIUrl":null,"url":null,"abstract":"Existing wireless infrastructure and networks are unable to meet the diverse Quality of Service (QoS) demands inherent in a wide range of consumer healthcare applications (CHAs). In this context, the adoption of fifth generation of wireless cellular technology (5G)/Beyond fifth-generation (B5G)-based network slicing technology has become pivotal for CHAs. It facilitates the creation of multiple virtual networks on a shared physical infrastructure by catering to distinct QoS requirements, where digital twins (DTs) are providing a virtual representation and management framework for healthcare smart devices, services, and applications within network slices. This allows different services and applications to coexist. However, network slicing has to address various security concerns, including securing slice access, enabling secure inter-slice communication, ensuring slice isolation within the shared physical network with DTs, and authenticating end users. To address these challenges, we propose a security mechanism that is specifically designed to safeguard network slice access and isolation in CHAs empowered by DTs, where only legitimate devices with corresponding digital twins and matching attributes are granted access. The proposed model incorporates the use of digital certificates for authenticating both slice access and devices by providing enhanced slice isolation to mitigate unauthorized access. Through a detailed comparative assessment, we demonstrate that the proposed scheme offers superior security and improved functionality attributes, while maintaining low communication costs as compared to those for other similar existing schemes. Furthermore, we validate the feasibility of our scheme through testbed simulations.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3429-3444"},"PeriodicalIF":5.8000,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Services Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10584329/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Existing wireless infrastructure and networks are unable to meet the diverse Quality of Service (QoS) demands inherent in a wide range of consumer healthcare applications (CHAs). In this context, the adoption of fifth generation of wireless cellular technology (5G)/Beyond fifth-generation (B5G)-based network slicing technology has become pivotal for CHAs. It facilitates the creation of multiple virtual networks on a shared physical infrastructure by catering to distinct QoS requirements, where digital twins (DTs) are providing a virtual representation and management framework for healthcare smart devices, services, and applications within network slices. This allows different services and applications to coexist. However, network slicing has to address various security concerns, including securing slice access, enabling secure inter-slice communication, ensuring slice isolation within the shared physical network with DTs, and authenticating end users. To address these challenges, we propose a security mechanism that is specifically designed to safeguard network slice access and isolation in CHAs empowered by DTs, where only legitimate devices with corresponding digital twins and matching attributes are granted access. The proposed model incorporates the use of digital certificates for authenticating both slice access and devices by providing enhanced slice isolation to mitigate unauthorized access. Through a detailed comparative assessment, we demonstrate that the proposed scheme offers superior security and improved functionality attributes, while maintaining low communication costs as compared to those for other similar existing schemes. Furthermore, we validate the feasibility of our scheme through testbed simulations.
期刊介绍:
IEEE Transactions on Services Computing encompasses the computing and software aspects of the science and technology of services innovation research and development. It places emphasis on algorithmic, mathematical, statistical, and computational methods central to services computing. Topics covered include Service Oriented Architecture, Web Services, Business Process Integration, Solution Performance Management, and Services Operations and Management. The transactions address mathematical foundations, security, privacy, agreement, contract, discovery, negotiation, collaboration, and quality of service for web services. It also covers areas like composite web service creation, business and scientific applications, standards, utility models, business process modeling, integration, collaboration, and more in the realm of Services Computing.