{"title":"5G中的网络切片和安全问题","authors":"A. Mathew","doi":"10.1109/ICCMC48092.2020.ICCMC-00014","DOIUrl":null,"url":null,"abstract":"The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Network Slicing in 5G and the Security Concerns\",\"authors\":\"A. Mathew\",\"doi\":\"10.1109/ICCMC48092.2020.ICCMC-00014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.\",\"PeriodicalId\":130581,\"journal\":{\"name\":\"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00014\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.