5G Network Slicing: A Security Overview

2020 
The fifth-generation (5G) of cellular networks is currently under deployment by network operators, and new 5G end-user devices are about to be commercialized by many manufacturers. This is just a first step in the 5G’s development, and the true potential of 5G is still far from being reached. Currently, one of the main 5G technologies under the interest of the research community is the network slicing. Network slicing will allow exploiting the 5G infrastructure to flexibly and efficiently provide heterogeneous services (e.g., voice communication, video streaming, e-health, vehicular communication). Like every new technology, one of the critical aspects that need to be considered is the security. In this article, we spotlight the security in 5G network slicing. We highlight threats and recommendations, which are presented in terms of life-cycle security, intra-slice security, and inter-slice security. Furthermore, we identify and discuss open security issues related to network slicing.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    16
    Citations
    NaN
    KQI
    []