End-to-End Network Slicing Security Across Standards Organizations

Q1 Social Sciences
Ranganathan Mavureddi Dhanasekaran, Jing Ping, German Peinado Gomez
{"title":"End-to-End Network Slicing Security Across Standards Organizations","authors":"Ranganathan Mavureddi Dhanasekaran, Jing Ping, German Peinado Gomez","doi":"10.1109/MCOMSTD.0005.2200055","DOIUrl":null,"url":null,"abstract":"This article makes a holistic analysis of the security aspects specified for 5G network slicing across the main standards and industry organizations, namely 3GPP, ETSI, and GSMA. A network slice is a logical end-to-end network that provides specific network capabilities and characteristics to serve a defined business purpose of communications service providers' (CSPs') customers. That purpose can be motivated by CSP internal reasons including network operation optimization, services classification, resources optimization, cost savings, support of network automation, or other specific customer demands. Network slicing can be defined as a paradigm where network slices are created with appropriate isolation, set of resources, and optimized topology, becoming a key feature and business driver for 5G. The overall security architecture of the 5G network is being constantly enhanced with new security features available as well in network slices as logical networks created within the 5G network. In contrast, the threat surface is increased with network slicing as new factors such as business models, tenants, functions, interfaces, and signaling flows are introduced, especially when the isolation among network slices is not well designed and effectively enforced. By analyzing the underlying security threats on network slicing, the article derives the corresponding security requirements and studies the specified mechanisms to protect the network slices. The article concludes pointing out several gaps in current standards with respect to 5G network slicing security and depicts possible next steps for further investigation.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"40-47"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Communications Standards Magazine","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MCOMSTD.0005.2200055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 1

Abstract

This article makes a holistic analysis of the security aspects specified for 5G network slicing across the main standards and industry organizations, namely 3GPP, ETSI, and GSMA. A network slice is a logical end-to-end network that provides specific network capabilities and characteristics to serve a defined business purpose of communications service providers' (CSPs') customers. That purpose can be motivated by CSP internal reasons including network operation optimization, services classification, resources optimization, cost savings, support of network automation, or other specific customer demands. Network slicing can be defined as a paradigm where network slices are created with appropriate isolation, set of resources, and optimized topology, becoming a key feature and business driver for 5G. The overall security architecture of the 5G network is being constantly enhanced with new security features available as well in network slices as logical networks created within the 5G network. In contrast, the threat surface is increased with network slicing as new factors such as business models, tenants, functions, interfaces, and signaling flows are introduced, especially when the isolation among network slices is not well designed and effectively enforced. By analyzing the underlying security threats on network slicing, the article derives the corresponding security requirements and studies the specified mechanisms to protect the network slices. The article concludes pointing out several gaps in current standards with respect to 5G network slicing security and depicts possible next steps for further investigation.
跨标准组织的端到端网络切片安全
本文对5G网络切片的主要标准和行业组织(即3GPP、ETSI和GSMA)的安全方面进行了全面分析。网络切片是一种逻辑端到端网络,它提供特定的网络功能和特性,以服务于通信服务提供商(CSP)客户的特定业务目的。这一目的可能受到CSP内部原因的推动,包括网络运营优化、服务分类、资源优化、成本节约、网络自动化支持或其他特定客户需求。网络切片可以定义为一种范式,在这种范式中,网络切片是在适当的隔离、资源集和优化拓扑的情况下创建的,成为5G的关键功能和业务驱动因素。5G网络的整体安全架构正在不断增强,新的安全功能以及在5G网络中创建的逻辑网络等网络切片中可用。相比之下,随着业务模型、租户、功能、接口和信令流等新因素的引入,网络切片增加了威胁面,尤其是当网络切片之间的隔离没有得到很好的设计和有效实施时。通过分析网络切片的潜在安全威胁,推导出相应的安全需求,并研究了保护网络切片的特定机制。文章最后指出了当前5G网络切片安全标准中的几个差距,并描述了进一步调查的可能下一步。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
10.80
自引率
0.00%
发文量
55
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信