Research on 5G core network slicing and its associated security issues

  • Author(s) / Creator(s)
  • Network slicing is a key enabling technology of 5G deployment. With this technology, MNOs could flexibly and logically dedicate some of their core network resources to various businesses and enterprises and provide a specific quality of service and policies based on agreed terms. This ability will enable MNOs or CSPs to maximize their revenue and provide more optimized services to meet the varying needs of different market verticals or diverse user experiences.
    But the catch is, before network slicing can be implemented fully, several troubling security challenges and vulnerabilities, some of which still need to be well investigated and explored yet need answers. This leaves much to be desired since information and data have to be protected from being compromised. What makes it more worrying is the virtualization of network functions and the shift to a cloud-based and service-based architecture exposing it to the internet, which, as we are aware, has several security implications that are graver than earlier-generation networks which relied on centralized hardware-based functions that provided security endpoints and checkpoints that were relatively easier to monitor. For key players in the network-slicing market to implement and maximize its benefits while gaining the confidence of businesses and consumers, many security and trust questions need to be identified, answered or resolved first.
    This project seeks to explore the various security flaws or vulnerabilities of 5G core network slicing in both standalone and non-standalone implementations. To do that, we have to explain how mobile technologies evolved over the years with a focus on the 5G architecture. We then narrow down to the 5G core network and look at Network slicing and its benefits as we seek to understand the implementation of Network slicing while using a case study of how slices will interact with each other in a city like Leduc with various enterprise customers using Telus as an MNO delivering this service. Furthermore, we explore the various security flaws that 5G core network slicing is exposed to. Finally, we look at some meaningful security recommendations and solutions that, if well implemented, could help squash the doubts and insecurities surrounding the implementation of a full-scale 5G core network slicing.

  • Date created
    2023-04-01
  • Subjects / Keywords
  • Type of Item
    Report
  • DOI
    https://doi.org/10.7939/r3-pph3-1h22
  • License
    Attribution-NonCommercial 4.0 International