{"title":"5G网络切片技术中的网络安全研究:系统映射综述","authors":"Javier Cáceres-Hidalgo, D. Avila-Pesantez","doi":"10.1109/ETCM53643.2021.9590742","DOIUrl":null,"url":null,"abstract":"Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and greater capacity for millions of devices interconnected with low latency. However, having various enabling technologies like Network Slicing introduces new threats. In this work, we propose to carry out a systematic review of the literature that studies Cybersecurity in this environment. The Kitchenham & Carters method is used, posing three research questions. As a result, 41 papers that met the semantic search criteria were analyzed in the Science Direct Elsevier database, IEEE eXplorer digital library, and ACM digital library. The main security issues that affect 5G Network Slicing technology and the possible solutions that mitigate the vulnerabilities found were identified.","PeriodicalId":438567,"journal":{"name":"2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cybersecurity Study in 5G Network Slicing Technology: A Systematic Mapping Review\",\"authors\":\"Javier Cáceres-Hidalgo, D. Avila-Pesantez\",\"doi\":\"10.1109/ETCM53643.2021.9590742\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and greater capacity for millions of devices interconnected with low latency. However, having various enabling technologies like Network Slicing introduces new threats. In this work, we propose to carry out a systematic review of the literature that studies Cybersecurity in this environment. The Kitchenham & Carters method is used, posing three research questions. As a result, 41 papers that met the semantic search criteria were analyzed in the Science Direct Elsevier database, IEEE eXplorer digital library, and ACM digital library. The main security issues that affect 5G Network Slicing technology and the possible solutions that mitigate the vulnerabilities found were identified.\",\"PeriodicalId\":438567,\"journal\":{\"name\":\"2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETCM53643.2021.9590742\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCM53643.2021.9590742","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
第五代(5G)无线技术的特点是高速传输和更大的容量,可以实现数百万台设备的低延迟互联。然而,拥有各种启用技术(如网络切片)会带来新的威胁。在这项工作中,我们建议对在这种环境下研究网络安全的文献进行系统回顾。使用了Kitchenham & carter方法,提出了三个研究问题。结果,在Science Direct Elsevier数据库、IEEE eXplorer数字图书馆和ACM数字图书馆中分析了41篇符合语义检索标准的论文。确定了影响5G网络切片技术的主要安全问题以及缓解发现的漏洞的可能解决方案。
Cybersecurity Study in 5G Network Slicing Technology: A Systematic Mapping Review
Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and greater capacity for millions of devices interconnected with low latency. However, having various enabling technologies like Network Slicing introduces new threats. In this work, we propose to carry out a systematic review of the literature that studies Cybersecurity in this environment. The Kitchenham & Carters method is used, posing three research questions. As a result, 41 papers that met the semantic search criteria were analyzed in the Science Direct Elsevier database, IEEE eXplorer digital library, and ACM digital library. The main security issues that affect 5G Network Slicing technology and the possible solutions that mitigate the vulnerabilities found were identified.