5G网络切片技术中的网络安全研究:系统映射综述

Javier Cáceres-Hidalgo, D. Avila-Pesantez
{"title":"5G网络切片技术中的网络安全研究:系统映射综述","authors":"Javier Cáceres-Hidalgo, D. Avila-Pesantez","doi":"10.1109/ETCM53643.2021.9590742","DOIUrl":null,"url":null,"abstract":"Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and greater capacity for millions of devices interconnected with low latency. However, having various enabling technologies like Network Slicing introduces new threats. In this work, we propose to carry out a systematic review of the literature that studies Cybersecurity in this environment. The Kitchenham & Carters method is used, posing three research questions. As a result, 41 papers that met the semantic search criteria were analyzed in the Science Direct Elsevier database, IEEE eXplorer digital library, and ACM digital library. The main security issues that affect 5G Network Slicing technology and the possible solutions that mitigate the vulnerabilities found were identified.","PeriodicalId":438567,"journal":{"name":"2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cybersecurity Study in 5G Network Slicing Technology: A Systematic Mapping Review\",\"authors\":\"Javier Cáceres-Hidalgo, D. Avila-Pesantez\",\"doi\":\"10.1109/ETCM53643.2021.9590742\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and greater capacity for millions of devices interconnected with low latency. However, having various enabling technologies like Network Slicing introduces new threats. In this work, we propose to carry out a systematic review of the literature that studies Cybersecurity in this environment. The Kitchenham & Carters method is used, posing three research questions. As a result, 41 papers that met the semantic search criteria were analyzed in the Science Direct Elsevier database, IEEE eXplorer digital library, and ACM digital library. The main security issues that affect 5G Network Slicing technology and the possible solutions that mitigate the vulnerabilities found were identified.\",\"PeriodicalId\":438567,\"journal\":{\"name\":\"2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETCM53643.2021.9590742\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCM53643.2021.9590742","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

第五代(5G)无线技术的特点是高速传输和更大的容量,可以实现数百万台设备的低延迟互联。然而,拥有各种启用技术(如网络切片)会带来新的威胁。在这项工作中,我们建议对在这种环境下研究网络安全的文献进行系统回顾。使用了Kitchenham & carter方法,提出了三个研究问题。结果,在Science Direct Elsevier数据库、IEEE eXplorer数字图书馆和ACM数字图书馆中分析了41篇符合语义检索标准的论文。确定了影响5G网络切片技术的主要安全问题以及缓解发现的漏洞的可能解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cybersecurity Study in 5G Network Slicing Technology: A Systematic Mapping Review
Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and greater capacity for millions of devices interconnected with low latency. However, having various enabling technologies like Network Slicing introduces new threats. In this work, we propose to carry out a systematic review of the literature that studies Cybersecurity in this environment. The Kitchenham & Carters method is used, posing three research questions. As a result, 41 papers that met the semantic search criteria were analyzed in the Science Direct Elsevier database, IEEE eXplorer digital library, and ACM digital library. The main security issues that affect 5G Network Slicing technology and the possible solutions that mitigate the vulnerabilities found were identified.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信