Ranganathan Mavureddi Dhanasekaran, Jing Ping, German Peinado Gomez
{"title":"End-to-End Network Slicing Security Across Standards Organizations","authors":"Ranganathan Mavureddi Dhanasekaran, Jing Ping, German Peinado Gomez","doi":"10.1109/MCOMSTD.0005.2200055","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0005.2200055","url":null,"abstract":"This article makes a holistic analysis of the security aspects specified for 5G network slicing across the main standards and industry organizations, namely 3GPP, ETSI, and GSMA. A network slice is a logical end-to-end network that provides specific network capabilities and characteristics to serve a defined business purpose of communications service providers' (CSPs') customers. That purpose can be motivated by CSP internal reasons including network operation optimization, services classification, resources optimization, cost savings, support of network automation, or other specific customer demands. Network slicing can be defined as a paradigm where network slices are created with appropriate isolation, set of resources, and optimized topology, becoming a key feature and business driver for 5G. The overall security architecture of the 5G network is being constantly enhanced with new security features available as well in network slices as logical networks created within the 5G network. In contrast, the threat surface is increased with network slicing as new factors such as business models, tenants, functions, interfaces, and signaling flows are introduced, especially when the isolation among network slices is not well designed and effectively enforced. By analyzing the underlying security threats on network slicing, the article derives the corresponding security requirements and studies the specified mechanisms to protect the network slices. The article concludes pointing out several gaps in current standards with respect to 5G network slicing security and depicts possible next steps for further investigation.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"40-47"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41903882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G Advanced: Sidelink Evolution","authors":"K. Ganesan","doi":"10.1109/MCOMSTD.0007.2200057","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0007.2200057","url":null,"abstract":"Third Generation Partnership Project (3GPP) standardization studied sidelink operation for 5G New Radio (NR), targeting advanced vehicle-to-everything (V2X) services in Release 16/17. 3GPP recently approved 5G Advanced study item, which includes NR sidelink for unlicensed operation, NR sidelink positioning for commercial devices, public safety, and V2X services. This article presents an overview of NR sidelink use case, requirements to be studied in 5G advanced, and discusses potential improvements needed in the physical layer. Furthermore, this article outlines design improvements needed in the NR sidelink physical layer, addressing it to meet regulatory requirements to operate in the unlicensed band, relative positioning calculation between peer sidelink devices, using sidelink relative positioning methods, and, finally, to meet ultra-low latency. Very high reliability enhancement is required for Industrial Internet of Things (IIoT) use case, such as end-to-end latency of 1msec, hi gh reliability up-to 99.9999 percen, t and tight requirement for clock synchronicity at $1 mumathrm{s}$.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"58-63"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47507777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Baskaran, Tooba Faisal, Chonggang Wang, D. López, Jose A. Ordonez-Lucena, Ismael Arribas
{"title":"The Role of DLT for Beyond 5G Systems and Services: A Vision","authors":"S. Baskaran, Tooba Faisal, Chonggang Wang, D. López, Jose A. Ordonez-Lucena, Ismael Arribas","doi":"10.1109/MCOMSTD.0004.2200053","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0004.2200053","url":null,"abstract":"Security, privacy, and trust are the key factors to unlock the full potential of future communication as beyond 5G and 6G systems enable new and more disruptive business models involved with multiple stakeholders, including mobile network operators, mobile virtual network operators, infrastructure providers, third party service providers, policy makers, end-users, and etc. The huge set of data, interaction process, and service management across these stakeholders require new technologies that can help the telecom industry to manage various data related to users, interaction process, and services in a way that is immutable, transparent, and secure with reduced OPEX to stay ahead of the market and to meet the evolving horizontal and vertical service and security requirements. This article presents an overview of the more promising key enablers, such as blockchain, permissioned distributed ledger technologies, and smart contract that can tackle the challenges of data security, privacy, and trust management in various potential beyond 5G and 6G application scenarios.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"32-38"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43086424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Twin Evolution for Hard-to-Follow Aeronautical Ad-Hoc Networks in Beyond 5G","authors":"T. Bilen, B. Canberk, T. Duong","doi":"10.1109/MCOMSTD.0001.2200040","DOIUrl":"https://doi.org/10.1109/MCOMSTD.0001.2200040","url":null,"abstract":"The aircrafts were top of the places that disrupted the seamless connectivity requirement of 5G and beyond. The Aeronautical Ad-hoc Networks (AANETs) take the attention of both industry and academia to satisfy this connectivity requirement with the low cost, easy deployment, and continuous coverage features. On the other hand, the ultra-dynamic characteristics of AANET with unstructured topology make its environment hard-to-follow. Here, Artificial Intelligence (AI)-based methodologies have an essential role in handling the management complexity of this hard-to-follow environment. However, these methodologies increase the computational complexity of aircraft due to the continuous update, convergence time, and scalability issues. At that point, we propose the utilization of the Digital Twin (DT) technology to handle the management complexity of AANET while solving the main issues of AI-based methodologies on it. The DT can virtually replicate the physical AANET components through closed-loop feedback in real-time. Therefore, this work introduces the utilization of DT technology for the AANET orchestration and, accordingly, proposes a DT-enabled AANET (DT-AANET) topology management framework. This framework consists of the Physical AANET Twin and Controller, including Digital AANET Twin with Operational Module. Here, the Digital AANET Twin virtually represents the physical environment while the operational module executes the AI-based computations on them through unsupervised learning-based training or supervised learning-based prediction. Finally, we present a case study based on Learning Vector Quantization (LVQ) to show the usability of the proposed framework and support this through evaluation results.","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"7 1","pages":"4-12"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41906538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Medal of Honor","authors":"","doi":"10.1109/mcomstd.2023.10078110","DOIUrl":"https://doi.org/10.1109/mcomstd.2023.10078110","url":null,"abstract":"","PeriodicalId":36719,"journal":{"name":"IEEE Communications Standards Magazine","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135130792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}