基于切片使能因子的网络切片威胁分类:一项调查

Mohammad J.K. Abood , Ghassan H. Abdul-Majeed
{"title":"基于切片使能因子的网络切片威胁分类:一项调查","authors":"Mohammad J.K. Abood ,&nbsp;Ghassan H. Abdul-Majeed","doi":"10.1016/j.ijin.2023.04.002","DOIUrl":null,"url":null,"abstract":"<div><p>One of the Main expectation of the 5G environment is supporting various services in many areas such as healthcare, education, energy, streaming, V2X (vehicle to everything) communication, etc. To implement such an expectation, there is a need to assign dedicated resources and functionalities for each service by slicing the network which means creating a virtual network for each service inside a physical network. Each virtual network (Slice) should be isolated from the other virtual network (Slice), and the security of that slice becomes a core issue in most research and studies. In this study, after focusing on security challenges in network slices, we describe the network slicing idea, the isolation concept, and the enablers of the network slicing, as well as the prevention of related attacks, risks, and concerns in each enabler. The research also lists the previous surveys and maps out taxonomies to illustrate the contribution of each survey in presenting threats and attacks against network slicing.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 103-112"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Classification of network slicing threats based on slicing enablers: A survey\",\"authors\":\"Mohammad J.K. Abood ,&nbsp;Ghassan H. Abdul-Majeed\",\"doi\":\"10.1016/j.ijin.2023.04.002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>One of the Main expectation of the 5G environment is supporting various services in many areas such as healthcare, education, energy, streaming, V2X (vehicle to everything) communication, etc. To implement such an expectation, there is a need to assign dedicated resources and functionalities for each service by slicing the network which means creating a virtual network for each service inside a physical network. Each virtual network (Slice) should be isolated from the other virtual network (Slice), and the security of that slice becomes a core issue in most research and studies. In this study, after focusing on security challenges in network slices, we describe the network slicing idea, the isolation concept, and the enablers of the network slicing, as well as the prevention of related attacks, risks, and concerns in each enabler. The research also lists the previous surveys and maps out taxonomies to illustrate the contribution of each survey in presenting threats and attacks against network slicing.</p></div>\",\"PeriodicalId\":100702,\"journal\":{\"name\":\"International Journal of Intelligent Networks\",\"volume\":\"4 \",\"pages\":\"Pages 103-112\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Intelligent Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2666603023000076\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligent Networks","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666603023000076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

5G环境的主要期望之一是支持许多领域的各种服务,如医疗保健、教育、能源、流媒体、V2X(车辆到一切)通信等。为了实现这样的期望,需要通过对网络进行切片来为每个服务分配专用资源和功能,这意味着在物理网络内为每个服务创建虚拟网络。每个虚拟网络(Slice)都应该与另一个虚拟网络(Slice)隔离,而该切片的安全性成为大多数研究的核心问题。在这项研究中,在关注网络切片中的安全挑战之后,我们描述了网络切片的思想、隔离概念和网络切片的使能因素,以及每个使能因素中相关攻击、风险和问题的预防。该研究还列出了以前的调查,并绘制了分类法,以说明每项调查在呈现针对网络切片的威胁和攻击方面的贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Classification of network slicing threats based on slicing enablers: A survey

One of the Main expectation of the 5G environment is supporting various services in many areas such as healthcare, education, energy, streaming, V2X (vehicle to everything) communication, etc. To implement such an expectation, there is a need to assign dedicated resources and functionalities for each service by slicing the network which means creating a virtual network for each service inside a physical network. Each virtual network (Slice) should be isolated from the other virtual network (Slice), and the security of that slice becomes a core issue in most research and studies. In this study, after focusing on security challenges in network slices, we describe the network slicing idea, the isolation concept, and the enablers of the network slicing, as well as the prevention of related attacks, risks, and concerns in each enabler. The research also lists the previous surveys and maps out taxonomies to illustrate the contribution of each survey in presenting threats and attacks against network slicing.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
12.00
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信