ML-Based 5G Network Slicing Security: A Comprehensive Survey
Abstract
:1. Introduction
1.1. Contributions of This Paper
- This paper introduces all of the basics of 5G, the current trends of 5G, network slicing, layers within network slicing, and various standardized architectural frameworks (Section 3);
- The paper also provides a state-of-the-art comparison and map of existing related surveys, with an emphasis on their major contributions (Section 2);
- The paper demonstrates the use of state-of-the-art applied ML algorithms in different stages of network slicing, such as resource allocation and slice admission (Section 4);
- A taxonomy of attack prevention from the proposed frameworks, services, and security considerations of network slicing.
- The paper also discusses machine learning-based network slicing and the ML-based techniques that can be applied during different stages of slicing to prevent attacks over the network.
- The paper discusses network slicing threats and their countermeasures throughout the complete lifecycle of a network slice.
- Finally, the paper outlines ongoing research on and future directions for 5G network slicing security to enable 5G to become more secure and robust without affecting network and end-user connectivity (Section 7).
1.2. Outline of the Survey
2. Comparison with Existing Survey Articles and Roadmap
3. Network Slicing and Its Paradigms
- Radio Access Network (RAN) slicing: In the 4G network, one extra en-gNB master node is added to benefit the cloudification in the 5G network. The next-generation RAN is dynamic and scalable, adding or releasing the requirement’s network functions. It also balances the load over the slice and manages the resources over the slice [47]. Implementation of RAN in network slicing can be done through logical abstraction of physical resources such as base stations (master eNB and secondary en-gNB) packet data network gateway (PDN-GW), home subscriber server (HSS), serving gateway (S-GW), mobility management entity (MME) [48].
- Core Network (CN) slicing: The 4G network works on centralized architecture without a fully isolated control and data plane. The problems with such centralized architectures are its single point of failure and traffic congestion, etc. The core slicing developed in 3GPP isolates the control and data plane, effectively supporting mobile broadband services and massive and mission-critical IoT services. The core network architecture includes the following network functions: access and mobility management functions, authentication server functions, unified data management functions, data storage functions, session management functions, user equipment, user data plane functions, policy control functions, and RAN [49].
- The Service Instance layer offers the services to the end-user or subscriber based on their request. Each service in the service instance layer is represented as an ‘instance’.
- The Network Slice Instance layer includes the network slices, which are customized with all the network features and are provided to the service instance.
- The Resource layer is a pool of all the virtual and physical resources which are required by the network slices to serve the services of the service instance.
Architecture
- Infrastructure resource layer—the pool of physical resources such as access nodes, cloud nodes, networking nodes, and 5G supportable devices are constituted at this layer. These resources are disclosed to the upper layers through virtualization.
- Business enablement layer—the library of all modular network functions comprehended by software modules and value-enabling capabilities; a set of configuration parameters such as RAT config. These parameters and functions are called by orchestration entities via APIs.
- Business application layer—comprises applications of the operators, enterprises, verticals, and third-party services that use 5G.
4. Machine Learning Based Network Slicing
5. Emerging Threats and Security Concerns in ML Based 5G Network Slicing
6. Network Slicing Security Solutions and Management
7. Future Directions and Research Challenges
- AI driven 5G architecture and network slicing—This paper discussed the various standard architectures in 5G network slicing and how they have been framed to manage and secure the network. The AI modulates the robustness of the 5G network [112]. The architecture should be generalized with an in-built security mechanism to handle attacks and threats [113]. A standard AI-based architecture should be framed to support flexibility, reliability, and scalability, which supports a faster data rate, improved QoS, and efficiency in the network. The security in 5G is the primary concern that must be considered.
- Secure authentication—This paper discussed the various attacks and threats over the slice, which affect the user’s privacy and may lead to unauthorized access. Secure mutual authentication should be incorporated to verify the authenticity and secure the application in the 5G network [113]. Therefore, a cryptographic algorithm must be applied to the channel to secure the session and keys, with real-time security analysis to prevent the network from being breached [114].
- Secure service migration—Multi-access edge computing (MEC) can be applied to speed up the service migration in the network [115]. The high throughput and low latency communication with a time delay of 1 ms–10 ms is a key requirement in 5G. The connection between 5G and edge computing is empowering; 5G enables more data collection and faster processing [6], which encourages the demands of the users. Therefore, such requirements can be attained using MEC and AI techniques while supporting the properties of network slicing.
- Secure and continuous connectivity—This paper discussed various attacks on the slices in a 5G network, which affect the connectivity between the end-users and the service provider. Such attacks must be minimized by adapting NN-based security measures to avoid malicious requests, unauthorized access, or intrusion within the network without affecting the network and end-user connectivity. Adversarial machine learning attacks, which affect the ML and DL models in the network, should be reduced by redesigning the models with adversarial machine learning methods as provided in [116].
- Fronthaul/Backhaul/Xhaul Security—Fronthaul is an optic network link between multiple radio remote heads (RRH) and centralized baseband units (BBU) [117]. Backhaul is a bridge between RAN elements (wired network) and the mobile network, responsible for data transmission. Security in mobile backhaul is paramount. Due to continuous traffic by the 5G applicants and an increase in threats and attacks, security in mobile networks is of utmost importance [98]. Current 5G approaches employ C-RAN, but with increasing challenges and needs, it is necessary to reduce the operating cost, accelerate operation over the network, enhance the QoS, and save energy. Therefore the aim is to flexibly interconnect D-RAN and core network functions hosted over cloud network infrastructure. Xhaul architecture can enable such flexibility and reconfigure the network quickly and cost-effectively.
- Secure deployment—5G has been designed by considering multiple security mechanisms with secure control over the network to provide mutual authentication, subscriber identity protection, secure service migration, secure slicing, and many other benefits. For successful deployment of 5G, the provider needs to certify all the connections and verify all the carriers’ IDs, frequencies, and cell coverage in the network [118].
- Performance Metrics—In 5G communication networks, several parameters are involved, all of which have an impact on the network’s performance. Communication network performance can be measured in terms of the network’s capacity, quality, lifetime, efficiency of routing, low latency, and high reliability. 5G networks allow lots of traffic, requiring a higher load balancing capacity to keep the networks running well. According to Choudhary et al. [98], collaboration between the RAN and backhaul will open up new possibilities for improved performance. According to recent breakthroughs in the field, the energy consumption of communication networks is based on carried traffic modeling and topology options. Throughput can be increased through effective load balancing. Future research should concentrate on improving QoS and traffic control.
- Optimization—The 5G network is made up of several sub-modules, each of which has an essential function in ensuring secure data transmissions. A network’s efficiency will be harmed by channel interference and path loss. The bandwidth utilization of networks is affected by link failure and node isolation. Network slicing is a feature of 5G networks that allows for virtual network partitioning. In heterogeneous networks, time synchronization is a significant issue that affects inter-cell coordination, which are directly proportional to each other. This new idea aids in a variety of application-based network allocations. As a result, effective network slicing aids in network traffic optimization, load management, and traffic management efficiency [119].
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Li, X.; Samaka, M.; Chan, H.A.; Bhamare, D.; Gupta, L.; Guo, C.; Jain, R. Network slicing for 5G: Challenges and opportunities. IEEE Internet Comput. 2017, 21, 20–27. [Google Scholar] [CrossRef]
- Yu, H.; Lee, H.; Jeon, H. What is 5G? Emerging 5G mobile services and network requirements. Sustainability 2017, 9, 1848. [Google Scholar] [CrossRef] [Green Version]
- Werélius, G. What We Know: A Look at Current 5G Market Trends—Ericsson. 2020. Available online: https://www.ericsson.com/en/blog/2020/10/what-we-know-a-look-at-current-5g-market-trend (accessed on 17 March 2022).
- Nokia 5G 5G in India the Journey Is about to Begin. 2021. Available online: https://telecom.economictimes.indiatimes.com/news/5g-in-india-the-journey-is-about-to-begin/81671088 (accessed on 17 March 2022).
- 5G Companies 12 Players Are leading the Research. 2018. Available online: https://www.greyb.com/5g-companies/ (accessed on 17 March 2022).
- Narcisi, G. These Are the 5G Trends to Watch in 2021. 2021. Available online: https://www.crn.com/news/networking/these-are-the-5g-trends-to-watch-in-2021/ (accessed on 17 March 2022).
- Everything You Need to Know about 5G. 2020. Available online: https://www.qualcomm.com/5g/what-is-5g# (accessed on 17 March 2022).
- Brittain, N. 5G Projects Providing a Vision for the Future. 2021. Available online: https://www.5gradar.com/features/5g-projects-that-will-blow-your-mind (accessed on 17 March 2022).
- Zhang, H.; Liu, N.; Chu, X.; Long, K.; Aghvami, A.; Leung, V. Network Slicing Based 5G and Future Mobile Networks: Mobility. In Resource Management, and Challenges; IEEE Communications Magazine: 2017. Available online: https://ieeexplore.ieee.org/abstract/document/8004168 (accessed on 17 March 2023).
- Campolo, C.; Molinaro, A.; Iera, A.; Menichella, F. 5G network slicing for vehicle-to-everything services. IEEE Wirel. Commun. 2017, 24, 38–45. [Google Scholar] [CrossRef]
- Barakabitze, A.A.; Ahmad, A.; Mijumbi, R.; Hines, A. 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Comput. Netw. 2020, 167, 106984. [Google Scholar] [CrossRef]
- Kaloxylos, A. A survey and an analysis of network slicing in 5G networks. IEEE Commun. Stand. Mag. 2018, 2, 60–65. [Google Scholar] [CrossRef]
- Chen, Q.; Liu, C.-X. A Survey of Network Slicing in 5G. In DEStech Transactions on Computer Science and Engineering; Elsevier: Amsterdam, The Netherlands, 2017. [Google Scholar]
- Zhang, S. An overview of network slicing for 5G. IEEE Wirel. Commun. 2019, 26, 111–117. [Google Scholar] [CrossRef]
- Zhang, L.; Mei, C.; Li, J.; Liang, Y.; Song, J.; Xia, X.; Zhu, X. A Survey on 5g network slicing enabling the smart grid. In Proceedings of the 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), Tianjin, China, 4–6 December 2019; pp. 911–916. [Google Scholar]
- Ordonez-Lucena, J.; Ameigeiras, P.; Lopez, D.; Ramos-Munoz, J.J.; Lorca, J.; Folgueira, J. Network slicing for 5G with SDN/NFV: Concepts, architectures, and challenges. IEEE Commun. Mag. 2017, 55, 80–87. [Google Scholar] [CrossRef] [Green Version]
- Foukas, X.; Patounas, G.; Elmokashfi, A.; Marina, M.K. Network slicing in 5G: Survey and challenges. IEEE Commun. Mag. 2017, 55, 94–100. [Google Scholar] [CrossRef] [Green Version]
- Su, R.; Zhang, D.; Venkatesan, R.; Gong, Z.; Li, C.; Ding, F.; Jiang, F.; Zhu, Z. Resource allocation for network slicing in 5G telecommunication networks: A survey of principles and models. IEEE Netw. 2019, 33, 172–179. [Google Scholar] [CrossRef]
- Richart, M.; Baliosian, J.; Serrat, J.; Gorricho, J.L. Resource slicing in virtual wireless networks: A survey. IEEE Trans. Netw. Serv. Manag. 2016, 13, 462–476. [Google Scholar] [CrossRef] [Green Version]
- Khan, L.U.; Yaqoob, I.; Tran, N.H.; Han, Z.; Hong, C.S. Network slicing: Recent advances, taxonomy, requirements, and open research challenges. IEEE Access 2020, 8, 36009–36028. [Google Scholar] [CrossRef]
- Rafique, W.; Qi, L.; Yaqoob, I.; Imran, M.; Rasool, R.U.; Dou, W. Complementing IoT services through software defined networking and edge computing: A comprehensive survey. IEEE Commun. Surv. Tutor. 2020, 22, 1761–1804. [Google Scholar] [CrossRef]
- Afolabi, I.; Taleb, T.; Samdanis, K.; Ksentini, A.; Flinck, H. Network slicing and softwarization: A survey on principles, enabling technologies, and solutions. IEEE Commun. Surv. Tutor. 2018, 20, 2429–2453. [Google Scholar] [CrossRef]
- Wijethilaka, S.; Liyanage, M. Survey on network slicing for Internet of Things realization in 5G networks. IEEE Commun. Surv. Tutor. 2021, 23, 957–994. [Google Scholar] [CrossRef]
- Zhu, Y.; Ammar, M.H. Algorithms for assigning substrate network resources to virtual network components. In Proceedings of the INFOCOM, Barcelona, Spain, 23–29 April 2006; Volume 1200, pp. 1–12. [Google Scholar]
- Shrestha, S.L.; Lee, J.; Chong, S. Virtualization and slicing of wireless mesh network. In Proceedings of the International Conference on Future Internet Technologies, Seoul, Korea, 18–20 June 2008. [Google Scholar]
- Anadiotis, A.C.; Apostolaras, A.; Syrivelis, D.; Korakis, T.; Tassiulas, L.; Rodriguez, L.; Ott, M. A new slicing scheme for efficient use of wireless testbeds. In Proceedings of the 4th ACM International Workshop on Experimental Evaluation and Characterization, Beijing, China, 21 September 2009; pp. 83–84. [Google Scholar]
- Sherwood, R.; Chan, M.; Covington, A.; Gibb, G.; Flajslik, M.; Handigol, N.; Huang, T.Y.; Kazemian, P.; Kobayashi, M.; Naous, J.; et al. Carving research slices out of your production networks with OpenFlow. ACM SIGCOMM Comput. Commun. Rev. 2010, 40, 129–130. [Google Scholar] [CrossRef]
- Yiakoumis, Y.; Yap, K.K.; Katti, S.; Parulkar, G.; McKeown, N. Slicing home networks. In Proceedings of the 2nd ACM SIGCOMM Workshop on Home Networks, Toronto, ON, Canada, 15 August 2011; pp. 1–6. [Google Scholar]
- Corin, R.D.; Gerola, M.; Riggio, R.; De Pellegrini, F.; Salvadori, E. Vertigo: Network virtualization and beyond. In Proceedings of the 2012 IEEE European Workshop on Software Defined Networking, Darmstadt, Germany, 25–26 October 2012; pp. 24–29. [Google Scholar]
- Nikaein, N.; Schiller, E.; Favraud, R.; Katsalis, K.; Stavropoulos, D.; Alyafawi, I.; Zhao, Z.; Braun, T.; Korakis, T. Network store: Exploring slicing in future 5G networks. In Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, Paris, France, 7 September 2015; pp. 8–13. [Google Scholar]
- Shimojo, T.; Takano, Y.; Khan, A.; Kaptchouang, S.; Tamura, M.; Iwashina, S. Future mobile core network for efficient service operation. In Proceedings of the 2015 1st IEEE conference on Network Softwarization (NetSoft), London, UK, 13–17 April 2015; pp. 1–6. [Google Scholar]
- Iwamura, M. NGMN view on 5G architecture. In Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), Glasgow, UK, 11–14 May 2015; pp. 1–5. [Google Scholar]
- Inam, R.; Karapantelakis, A.; Vandikas, K.; Mokrushin, L.; Feljan, A.V.; Fersman, E. Towards automated service-oriented lifecycle management for 5G networks. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), Luxembourg, 8–11 September 2015; pp. 1–8. [Google Scholar]
- Zhou, X.; Li, R.; Chen, T.; Zhang, H. Network slicing as a service: Enabling enterprises’ own software-defined cellular networks. IEEE Commun. Mag. 2016, 54, 146–153. [Google Scholar] [CrossRef]
- Da Silva, I.; Mildh, G.; Kaloxylos, A.; Spapis, P.; Buracchini, E.; Trogolo, A.; Zimmermann, G.; Bayer, N. Impact of network slicing on 5G Radio Access Networks. In Proceedings of the 2016 European Conference on Networks and Communications (EuCNC), Athens, Greece, 27–30 June 2016; pp. 153–157. [Google Scholar]
- Jiang, M.; Condoluci, M.; Mahmoodi, T. Network slicing management & prioritization in 5G mobile systems. In Proceedings of the European Wireless 2016 22th European Wireless Conference, Oulu, Finland, 18–20 May 2016; pp. 1–6. [Google Scholar]
- Hao, Y.; Tian, D.; Fortino, G.; Zhang, J.; Humar, I. Network slicing technology in a 5G wearable network. IEEE Commun. Stand. Mag. 2018, 2, 66–71. [Google Scholar] [CrossRef]
- Li, R.; Zhao, Z.; Sun, Q.; Chih-Lin, I.; Yang, C.; Chen, X.; Zhao, M.; Zhang, H. Deep reinforcement learning for resource management in network slicing. IEEE Access 2018, 6, 74429–74441. [Google Scholar] [CrossRef]
- Kafle, V.P.; Fukushima, Y.; Martinez-Julia, P.; Miyazawa, T. Consideration on automation of 5G network slicing with machine learning. In Proceedings of the 2018 IEEE ITU Kaleidoscope: Machine Learning for a 5G Future (ITU K), Santa Fe, Argentina, 26–28 November 2018; pp. 1–8. [Google Scholar]
- Thantharate, A.; Paropkari, R.; Walunj, V.; Beard, C. DeepSlice: A deep learning approach towards an efficient and reliable network slicing in 5G networks. In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 10–12 October 2019; pp. 762–767. [Google Scholar]
- Han, B.; Schotten, H.D. Machine learning for network slicing resource management: A comprehensive survey. arXiv 2020, arXiv:2001.07974. [Google Scholar]
- Shen, X.; Gao, J.; Wu, W.; Lyu, K.; Li, M.; Zhuang, W.; Li, X.; Rao, J. AI-assisted network-slicing based next-generation wireless networks. IEEE Open J. Veh. Technol. 2020, 1, 45–66. [Google Scholar] [CrossRef]
- Cui, Y.; Huang, X.; Wu, D.; Zheng, H. Machine Learning based Resource Allocation Strategy for Network Slicing in Vehicular Networks. In Proceedings of the 2020 IEEE/CIC International Conference on Communications in China (ICCC), Xiamen, China, 28–30 July 2020; pp. 454–459. [Google Scholar]
- Zhao, L.; Li, L. Reinforcement learning for resource mapping in 5G network slicing. In Proceedings of the 2020 IEEE 5th International Conference on Computer and Communication Systems (ICCCS), Shanghai, China, 15–18 May 2020; pp. 869–873. [Google Scholar]
- Lei, L.; Yuan, Y.; Vu, T.X.; Chatzinotas, S.; Minardi, M.; Montoya, J.F. Dynamic-Adaptive AI Solutions for Network Slicing Management in Satellite-Integrated B5G Systems. IEEE Netw. Mag. 2021, 35, 91–97. [Google Scholar] [CrossRef]
- Abidi, M.H.; Alkhalefah, H.; Moiduddin, K.; Alazab, M.; Mohammed, M.K.; Ameen, W.; Gadekallu, T.R. Optimal 5G network slicing using machine learning and deep learning concepts. Comput. Stand. Interfaces 2021, 76, 103518. [Google Scholar] [CrossRef]
- Ghadialy, Z. The 3G4G Blog. 2013. Available online: https://blog.3g4g.co.uk/2013/04/ (accessed on 17 March 2022).
- Ferrús, R.; Sallent, O.; Pérez-Romero, J.; Agustí, R. Management of network slicing in 5G radio access networks: Functional framework and information models. arXiv 2018, arXiv:1803.01142. [Google Scholar]
- Choi, Y.i.; Park, N. Slice architecture for 5G core network. In Proceedings of the 2017 Ninth international conference on ubiquitous and future networks (ICUFN), Milan, Italy, 4–7 July 2017; pp. 571–575. [Google Scholar]
- Debbabi, F.; Jmal, R.; Fourati, L.C.; Ksentini, A. Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey. IEEE Access 2020, 8, 162748–162762. [Google Scholar] [CrossRef]
- European Telecommunications Standards Institute. Network Functions Virtualisation (NFV) Release 3; Evolution and Ecosystem; Report on Network Slicing Support with ETSI NFV Architecture Framework; ETSI: Sophia Antipolis, France, 2017. [Google Scholar]
- Kukliński, S.; Tomaszewski, L.; Osiński, T.; Ksentini, A.; Frangoudis, P.A.; Cau, E.; Corici, M. A reference architecture for network slicing. In Proceedings of the 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, QC, Canada, 25–29 June 2018; pp. 217–221. [Google Scholar]
- Duan, Q.; Ansari, N.; Toy, M. Software-defined network virtualization: An architectural framework for integrating SDN and NFV for service provisioning in future networks. IEEE Netw. 2016, 30, 10–16. [Google Scholar] [CrossRef]
- Saboorian, T.; Xiang, A.; Thiébaut, L. Network Slicing and 3GPP Service and Systems Aspects (SA) Standard; IEEE Software Defined Networks, IEEE Softwarization: Piscataway, NJ, USA, 2017; Volume 7. [Google Scholar]
- Schmit, E. The Powerful Combination of Machine Learning and 5G Networks. 2019. Available online: https://shape.att.com/blog/combination-of-machine-learning-and-5g (accessed on 17 March 2022).
- Kelechi, A.H.; Alsharif, M.H.; Ramly, A.M.; Abdullah, N.F.; Nordin, R. The four-C framework for high capacity ultra-low latency in 5G networks: A review. Energies 2019, 12, 3449. [Google Scholar] [CrossRef] [Green Version]
- Wang, H.; Wu, Y.; Min, G.; Xu, J.; Tang, P. Data-driven dynamic resource scheduling for network slicing: A deep reinforcement learning approach. Inf. Sci. 2019, 498, 106–116. [Google Scholar] [CrossRef]
- Wang, Q.; Alcaraz-Calero, J.; Ricart-Sanchez, R.; Weiss, M.B.; Gavras, A.; Nikaein, N.; Vasilakos, X.; Giacomo, B.; Pietro, G.; Roddy, M.; et al. Enable advanced QoS-aware network slicing in 5G networks for slice-based media use cases. IEEE Trans. Broadcast. 2019, 65, 444–453. [Google Scholar] [CrossRef] [Green Version]
- Gupta, R.K.; Misra, R. Machine learning-based slice allocation algorithms in 5G networks. In Proceedings of the 2019 IEEE International Conference on Advances in Computing, Communication and Control (ICAC3), Mumbai, India, 20–21 December 2019; pp. 1–4. [Google Scholar]
- Raza, M.R.; Natalino, C.; Wosinska, L.; Monti, P. Machine learning methods for slice admission in 5g networks. In Proceedings of the 2019 IEEE 24th OptoElectronics and Communications Conference (OECC) and 2019 International Conference on Photonics in Switching and Computing (PSC), Fukuoka, Japan, 7–11 July 2019; pp. 1–3. [Google Scholar]
- Nakao, A.; Du, P. Toward in-network deep machine learning for identifying mobile applications and enabling application specific network slicing. IEICE Trans. Commun. 2018, E101-B, 1536–1543. [Google Scholar] [CrossRef] [Green Version]
- Thantharate, A.; Paropkari, R.; Walunj, V.; Beard, C.; Kankariya, P. Secure5g: A deep learning framework towards a secure network slicing in 5g and beyond. In Proceedings of the 2020 IEEE 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; pp. 0852–0857. [Google Scholar]
- Sedjelmaci, H. Cooperative attacks detection based on artificial intelligence system for 5G networks. Comput. Electr. Eng. 2021, 91, 107045. [Google Scholar] [CrossRef]
- Shi, Y.; Sagduyu, Y.E.; Erpek, T.; Gursoy, M.C. How to attack and defend 5G radio access network slicing with reinforcement learning. arXiv 2021, arXiv:2101.05768. [Google Scholar]
- Le, L.V.; Lin, B.S.P.; Tung, L.P.; Sinh, D. SDN/NFV, machine learning, and big data driven network slicing for 5G. In Proceedings of the 2018 IEEE 5G World Forum (5GWF), Santa Clara, CA, USA, 9–11 July 2018; pp. 20–25. [Google Scholar]
- Gupta, R.K.; Choubey, A.; Jain, S.; Greeshma, R.; Misra, R. Machine Learning Based Network Slicing and Resource Allocation for Electric Vehicles (EVs). In Proceedings of the International Conference on Internet of Things and Connected Technologies, Paris, France, 14–16 December 2020; Springer: Berlin, Germany, 2020; pp. 333–347. [Google Scholar]
- Chergui, H.; Verikoukis, C. Big data for 5G intelligent network slicing management. IEEE Netw. 2020, 34, 56–61. [Google Scholar] [CrossRef]
- Gong, Y.; Sun, S.; Wei, Y.; Song, M. Deep Reinforcement Learning for Edge Computing Resource Allocation in Blockchain Network Slicing Broker Framework. In Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, 25–28 April 2021; pp. 1–6. [Google Scholar]
- Zhou, H.; Erol-Kantarci, M.; Poor, V. Learning from Peers: Transfer Reinforcement Learning for Joint Radio and Cache Resource Allocation in 5G Network Slicing. arXiv 2021, arXiv:2109.07999. [Google Scholar]
- Shome, D.; Kudeshia, A. Deep Q-learning for 5G network slicing with diverse resource stipulations and dynamic data traffic. In Proceedings of the 2021 IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Jeju-si, Korea, 13–16 April 2021; pp. 134–139. [Google Scholar]
- Xiao, L.; Wan, X.; Lu, X.; Zhang, Y.; Wu, D. IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 2018, 35, 41–49. [Google Scholar] [CrossRef]
- Hussain, F.; Hassan, S.A.; Hussain, R.; Hossain, E. Machine learning for resource management in cellular and IoT networks: Potentials, current solutions, and open challenges. IEEE Commun. Surv. Tutor. 2020, 22, 1251–1275. [Google Scholar] [CrossRef] [Green Version]
- Mei, J.; Wang, X.; Zheng, K. Intelligent network slicing for V2X services toward 5G. IEEE Netw. 2019, 33, 196–204. [Google Scholar] [CrossRef]
- De Bast, S.; Torrea-Duran, R.; Chiumento, A.; Pollin, S.; Gacanin, H. Deep reinforcement learning for dynamic network slicing in IEEE 802.11 networks. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France, 29 April–2 May 2019; pp. 264–269. [Google Scholar]
- Afaq, M.; Iqbal, J.; Ahmed, T.; Islam, I.U.; Khan, M.; Khan, M.S. Towards 5G network slicing for vehicular ad hoc networks: An end-to-end approach. Comput. Commun. 2020, 149, 252–258. [Google Scholar] [CrossRef]
- Lal, N.; Tiwari, S.M.; Khare, D.; Saxena, M. Prospects for Handling 5G Network Security: Challenges, Recommendations and Future Directions. J. Phys. Conf. Ser. 2021, 1714, 012052. [Google Scholar] [CrossRef]
- Ahmad, I.; Kumar, T.; Liyanage, M.; Okwuibe, J.; Ylianttila, M.; Gurtov, A. Overview of 5G security challenges and solutions. IEEE Commun. Stand. Mag. 2018, 2, 36–43. [Google Scholar] [CrossRef] [Green Version]
- Park, J.H.; Rathore, S.; Singh, S.K.; Salim, M.M.; Azzaoui, A.E.; Kim, T.W.; Pan, Y.; Park, J.H. A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions. Hum.-Centric Comput. Inf. Sci. 2021, 11, 22. [Google Scholar]
- Wollschlaeger, M.; Sauter, T.; Jasperneite, J. The future of industrial communication: Automation networks in the era of the internet of things and industry 4.0. IEEE Ind. Electron. Mag. 2017, 11, 17–27. [Google Scholar] [CrossRef]
- Ehrlich, M.; Wisniewski, L.; Trsek, H.; Mahrenholz, D.; Jasperneite, J. Automatic mapping of cyber security requirements to support network slicing in software-defined networks. In Proceedings of the 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus, 12–15 September 2017; pp. 1–4. [Google Scholar]
- Radanliev, P.; De Roure, D.; Burnap, P.; Santos, O. Epistemological equation for analysing uncontrollable states in complex systems: Quantifying cyber risks from the internet of things. Rev. Socionetwork Strateg. 2021, 15, 381–411. [Google Scholar] [CrossRef]
- Radanliev, P.; De Roure, D. Review of algorithms for artificial intelligence on low memory devices. IEEE Access 2021, 9, 109986–109993. [Google Scholar] [CrossRef]
- Adesina, D.; Hsieh, C.C.; Sagduyu, Y.E.; Qian, L. Adversarial machine learning in wireless communications using RF data: A review. arXiv 2020, arXiv:2012.14392. [Google Scholar]
- Shi, Y.; Sagduyu, Y.E. Adversarial machine learning for flooding attacks on 5G radio access network slicing. In Proceedings of the 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Xiamen, China, 28–30 July 2021; pp. 1–6. [Google Scholar]
- Sagduyu, Y.E.; Erpek, T.; Shi, Y. Adversarial machine learning for 5G communications security. In Game Theory and Machine Learning for Cyber Security; Cornell University: Ithaca, NY, USA, 2021; pp. 270–288. [Google Scholar]
- Kalør, A.E.; Guillaume, R.; Nielsen, J.J.; Mueller, A.; Popovski, P. Network slicing in industry 4.0 applications: Abstraction methods and end-to-end analysis. IEEE Trans. Ind. Inform. 2018, 14, 5419–5427. [Google Scholar] [CrossRef]
- Khan, H.; Luoto, P.; Bennis, M.; Latva-aho, M. On the application of network slicing for 5G-V2X. In Proceedings of the European Wireless 2018, 24th European Wireless Conference, Catania, Italy, 2–4 May 2018; pp. 1–6. [Google Scholar]
- Nerini, M.; Palma, D. 5G Network Slicing for Wi-Fi Networks. arXiv 2021, arXiv:2101.12644. [Google Scholar]
- Mathew, A. Network slicing in 5G and the security concerns. In Proceedings of the 2020 IEEE Fourth International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 11–13 March 2020; pp. 75–78. [Google Scholar]
- Jain, A.; Singh, T.; Sharma, S.K.; Prajapati, V. Implementing security in IOT ecosystem using 5G network slicing and pattern matched intrusion detection system: A simulation study. Interdiscip. J. Inform. Knowl. Manag. 2021, 16, 1–38. [Google Scholar] [CrossRef]
- Chemodanov, D.; Esposito, F.; Sukhov, A.; Calyam, P.; Trinh, H.; Oraibi, Z. AGRA: AI-augmented geographic routing approach for IoT-based incident-supporting applications. Future Gener. Comput. Syst. 2019, 92, 1051–1065. [Google Scholar] [CrossRef]
- Cunha, V.A.; da Silva, E.; de Carvalho, M.B.; Corujo, D.; Barraca, J.P.; Gomes, D.; Granville, L.Z.; Aguiar, R.L. Network slicing security: Challenges and directions. Internet Technol. Lett. 2019, 2, e125. [Google Scholar] [CrossRef] [Green Version]
- Martini, B.; Mori, P.; Marino, F.; Saracino, A.; Lunardelli, A.; La Marra, A.; Martinelli, F.; Castoldi, P. Pushing forward security in network slicing by leveraging continuous usage control. IEEE Commun. Mag. 2020, 58, 65–71. [Google Scholar] [CrossRef]
- Ni, J.; Lin, X.; Shen, X.S. Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun. 2018, 36, 644–657. [Google Scholar] [CrossRef]
- Porambage, P.; Miche, Y.; Kalliola, A.; Liyanage, M.; Ylianttila, M. Secure keying scheme for network slicing in 5G architecture. In Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking (CSCN), Granada, Spain, 28–30 October 2019; pp. 1–6. [Google Scholar]
- Liu, Q.; Han, T.; Ansari, N. Learning-assisted secure end-to-end network slicing for cyber-physical systems. IEEE Netw. 2020, 34, 37–43. [Google Scholar] [CrossRef]
- Sattar, D.; Matrawy, A. Towards secure slicing: Using slice isolation to mitigate DDoS attacks on 5G core network slices. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; pp. 82–90. [Google Scholar]
- Choudhary, G.; Kim, J.; Sharma, V. Security of 5G-mobile backhaul networks: A survey. arXiv 2019, arXiv:1906.11427. [Google Scholar]
- Costa-Perez, X.; Garcia-Saavedra, A.; Li, X.; Deiss, T.; De La Oliva, A.; Di Giglio, A.; Iovanna, P.; Moored, A. 5G-crosshaul: An SDN/NFV integrated fronthaul/backhaul transport network architecture. IEEE Wirel. Commun. 2017, 24, 38–45. [Google Scholar] [CrossRef] [Green Version]
- Sharma, V.; You, I.; Leu, F.Y.; Atiquzzaman, M. Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. J. Netw. Comput. Appl. 2018, 102, 38–57. [Google Scholar] [CrossRef]
- Bonfim, M.; Santos, M.; Dias, K.; Fernandes, S. A real-time attack defense framework for 5G network slicing. Softw. Pract. Exp. 2020, 50, 1228–1257. [Google Scholar] [CrossRef]
- Mamolar, A.S.; Pervez, Z.; Calero, J.M.A.; Khattak, A.M. Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks. Comput. Secur. 2018, 79, 132–147. [Google Scholar] [CrossRef] [Green Version]
- Sathi, V.N.; Murthy, C.S.R. Distributed Slice Mobility Attack: A Novel Targeted Attack Against Network Slices of 5G Networks. IEEE Netw. Lett. 2020, 3, 5–9. [Google Scholar] [CrossRef]
- Olimid, R.F.; Nencioni, G. 5G network slicing: A security overview. IEEE Access 2020, 8, 99999–100009. [Google Scholar] [CrossRef]
- Al-Makhadmeh, Z.; Tolba, A. Independent and tailored network-slicing architecture for leveraging industrial internet of things job processing. Comput. Netw. 2021, 187, 107827. [Google Scholar] [CrossRef]
- Yang, P.; Xi, X.; Quek, T.Q.; Chen, J.; Cao, X.; Wu, D. RAN slicing for massive IoT and bursty URLLC service multiplexing: Analysis and optimization. IEEE Internet Things J. 2021. [Google Scholar] [CrossRef]
- Abbas, K.; Afaq, M.; Ahmed Khan, T.; Rafiq, A.; Song, W.C. Slicing the core network and radio access network domains through intent-based networking for 5g networks. Electronics 2020, 9, 1710. [Google Scholar] [CrossRef]
- Luu, Q.T.; Kerboeuf, S.; Kieffer, M. Uncertainty-aware resource provisioning for network slicing. IEEE Trans. Netw. Serv. Manag. 2021, 18, 79–93. [Google Scholar] [CrossRef]
- Li, X.; Jiao, K.; Jiang, F.; Wang, J.; Pan, M. A service-oriented spectrum-aware RAN-slicing trading scheme under spectrum sharing. IEEE Internet Things J. 2020, 7, 11303–11317. [Google Scholar] [CrossRef]
- Sun, Y.; Jiang, W.; Feng, G.; Klaine, P.V.; Zhang, L.; Imran, M.A.; Liang, Y.C. Efficient handover mechanism for radio access network slicing by exploiting distributed learning. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2620–2633. [Google Scholar] [CrossRef]
- Dangi, R.; Lalwani, P.; Choudhary, G.; You, I.; Pau, G. Study and Investigation on 5G Technology: A Systematic Review. Sensors 2022, 22, 26. [Google Scholar] [CrossRef]
- Abubakar, A.I.; Omeke, K.G.; Ozturk, M.; Hussain, S.; Imran, M.A. The role of artificial intelligence driven 5G networks in COVID-19 outbreak: Opportunities, challenges, and future outlook. Front. Commun. Netw. 2020, 1, 4. [Google Scholar] [CrossRef]
- Choudhary, G.; Sharma, V. A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks. In 5G Enabled Secure Wireless Networks; Springer: Berlin, Germany, 2019; pp. 69–102. [Google Scholar]
- Dangi, R.; Pawar, S. An Improved Authentication and Data Security Approach Over Cloud Environment. In Harmony Search and Nature Inspired Optimization Algorithms; Springer: Berlin, Germany, 2019; pp. 1069–1076. [Google Scholar]
- Addad, R.A.; Dutra, D.L.C.; Bagaa, M.; Taleb, T.; Flinck, H. Fast service migration in 5G trends and scenarios. IEEE Netw. 2020, 34, 92–98. [Google Scholar] [CrossRef]
- Catak, F.O.; Kuzlu, M.; Catak, E.; Cali, U.; Unal, D. Security concerns on machine learning solutions for 6G networks in mmWave beam prediction. Phys. Commun. 2022, 52, 101626. [Google Scholar] [CrossRef]
- Chitimalla, D.; Kondepu, K.; Valcarenghi, L.; Tornatore, M.; Mukherjee, B. 5G fronthaul–latency and jitter studies of CPRI over Ethernet. J. Opt. Commun. Netw. 2017, 9, 172–182. [Google Scholar] [CrossRef] [Green Version]
- Ranaweera, C.; Monti, P.; Skubic, B.; Furdek, M.; Wosinska, L.; Nirmalathas, A.; Lim, C.; Wong, E. Optical X-haul options for 5G fixed wireless access: Which one to choose? In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA, 16–19 April 2018; pp. 1–2. [Google Scholar]
- Dawaliby, S.; Bradai, A.; Pousset, Y. Network slicing optimization in large scale lora wide area networks. In Proceedings of the 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, 24–28 June 2019; pp. 72–77. [Google Scholar]
Abbreviations | Full Forms | Abbreviations | Full Forms |
---|---|---|---|
3GPP | Third Generation Partnership Project | MEC | Multi-Access Edge Computing |
5G | Fifth Generation Wireless Network | ML | Machine Learning |
5GC | Fifth Generation Core | MME | Mobility Management Entity |
5GPPP | Fifth Generation Infrastructure Public Private Partnership | mMIMO | Massive Multi Input Multi Output |
AI | Artificial Intelligence | mMTC | Massive Machine Type Communication |
APIs | Application Programmable Interfaces | mmWAVE | millimeter WAVE |
AR | Augmented Reality | NFV | Network Function virtualization |
BBU | BaseBand Units | NFVI | NFV Infrastructure |
C-RAN | Centralised Radio Access Network | NGMN | Next Generation Mobile Network Alliance’s |
CN | Core Network | NMS | Network Management System |
CSP | Communication Service Providers | NN | Neural Network |
D-RAN | Distributed Radio Access Network | NS | Network Slicing |
D2D | Device to Device | NS3 | Network Simulator 3 |
DBN | Deep Belief Network | ONF | Open Network Foundation |
DDoS | Distributed Denial of Service | OSS/BSS | Operation/Business Support System |
DL | Deep Learning | OWFE | Optimal Weight Feature Extraction |
DoS | Denial of Service | PDN-GW | Packet Data Network Gateway |
DRL | Deep Reinforcement Learning | QoE | Quality of Experience |
DSP | Digital Service Providers | QoS | Quality of Service |
E2E | End to End | RAN | Radio Access Network |
eMBB | Enhanced Mobile Broadband | RRH | Radio Remote Heads |
eMTC | Enhanced Machine Type Communication | S-GW | Serving Gateway |
ETSI | European Telecommunications Standards Institute | SDN | Software Defined Networking |
GS-DHOA | Glowworm Swarm-based Deer Hunting Optimization Algorithm | SLA | Service Level Agreement |
HSS | Home Subscriber Server | SONs | Self Organising Networks |
IDS | Intrusion Detection System | SSIDs | Service Set Identifiers |
IETF | Internet Engineering Task Force | SVM | Support Vector Machine |
InPs | Infrastructure Providers | TS | Technical Specifications |
IoT | Internet of Things | UCON | Usage Control Mechanism |
kNN | k Nearest Neighbors | UltraHD | Ultra High Definition |
KPIs | Key Programmable Interface | URLLC | Ultra-Reliable Low Latency Communication |
LTE | Long Term Evolution | V2V | Vehicle-to-Vehicle |
LTE-A | Long Term Evolution-Advance | V2X | Vehicle-to-Everything |
M2M | Machine to Machine | VNF | Virtualized Network Functions |
MANO | Management and Orchestration | VR | Virtual Reality |
Authors | Main Contribution | SDN and NFV Based NS | ML Based NS | Threats and Attacks | Security Solutions | Research Challenges |
---|---|---|---|---|---|---|
[11] | Author contributed a comprehensive survey with updated solutions related to 5G NS using SDN and NFV. | 🗸 | - | 🗸 | 🗸 | ML based NS is not covered |
[12] | This survey covers solutions for network slicing domains such as access, transport and core. | 🗸 | - | - | 🗸 | ML based NS and security considerations are not covered |
[13] | The author contributed the importance of SDN and NFV, to overcome the traditional problems in the network. | 🗸 | - | - | 🗸 | ML based NS and security considerations are not covered |
[14] | The author discussed the key technologies such as NFV, modularisation, dynamic service chaining, and MANO. | 🗸 | - | - | 🗸 | ML based NS and security considerations are not covered |
[15] | This survey provided a study on End to End network slicing model to enable Smart Grid. | 🗸 | - | - | - | ML based NS, threats and security considerations not discussed. |
[16] | The survey mainly focuses on applications of 5G. Additionally, emphasize ETSI architecture with capabilities of SDN and NFV. | 🗸 | - | - | 🗸 | ML base NS and threats are not discussed in the study. |
[17] | The author discussed the network slicing and its architecture, services along with the challenges. | 🗸 | - | - | - | ML based NS, threats and security considerations not discussed. |
[18] | The article mainly focuses on principles and models of resource allocation in NS. Additionally, categorised the mathematical model of resource allocation. | 🗸 | - | - | 🗸 | ML base NS and threats are not discussed in the study. |
[19] | The author discussed the challenges and open issues regarding resource allocation and isolation in slices. | 🗸 | - | - | 🗸 | Discussed a fact that machine learning techniques can be considered to learn control policies in wireless networks. |
[20] | The article focuses on the advancement of network slicing in IoT and smart applications. Additionally, discussed the key requirements to enable smart services. | 🗸 | 🗸 | - | 🗸 | Recommended machine learning approaches for future research. |
[21] | The survey emphasises on Software defined IoT orchestration using Edge computing to solve the challenges in IoT service management. | 🗸 | * | 🗸 | 🗸 | Discussed the use of machine learning for IoT to prevent malicious attacks, traffic and to manage user requests. |
[22] | The author discussed the end-to-end network slicing along with the enabling technologies and solutions. Additionally, explained how slicing can be achieved while considering RAN sharing and the core network. | 🗸 | - | - | 🗸 | ML base NS and threats are not discussed in the study. |
[23] | This article discussed the utilization of NS in IoT applications, along with the obstacles in network slicing which occurs due to the advancement of the IoT. | - | 🗸 | 🗸 | 🗸 | Recommended ML for future research direction in terms of NS and IoT. |
This Survey | This survey incorporates the basics of network slicing, services, and the threats associated along with the attacks. Additionally, includes the machine learning approaches and solutions based on the stages in the network slice lifecycle. | 🗸 | 🗸 | 🗸 | 🗸 | ML base NS concepts, threats, and attacks are discussed in the study. Research challenges- AI driven 5G architecture and network slicing, Secure authentication, Secure service migration, Fronthaul/Backhaul/Xhaul Security is covered. |
References | 3GPP | 5G-PPP | SDN | NFV | ETSI | NGMN |
---|---|---|---|---|---|---|
[17] | Yes | Yes | ||||
[16] | Yes | Yes | Yes | |||
[12] | Yes | |||||
[14] | Yes | |||||
[47] | Yes | |||||
[50] | Yes | |||||
[51] | Yes | Yes | Yes | |||
[52] | Yes | |||||
[53] | Yes | Yes | ||||
[54] | Yes | |||||
[22] | Yes | Yes | Yes | Yes | ||
[55] | Yes | Yes | Yes | Yes |
Authors | Key Contribution | ML Applied | Network Participants Component | 5G Network Application Parameters | Security Consideration | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Z1 | Z2 | Z3 | Z4 | Z5 | LB | NVF | SDN | HO | RA | SEC | ||||
[57] | Resource Scheduling | Deep Reinforcement Learning (DRL) | 🗸 | X | X | X | X | X | 🗸 | 🗸 | X | 🗸 | X | - |
[58] | QoS | ML algorithm | 🗸 | X | X | X | 🗸 | X | 🗸 | 🗸 | X | 🗸 | X | - |
[40] | Security in Network Slicing | Deep Learning Neural Network (DLNN) | 🗸 | X | X | X | X | 🗸 | 🗸 | 🗸 | X | 🗸 | 🗸 | DLNN: to manage load load efficiency and network availability |
[46] | Optimization and Slice prediction | GS-DOHA + NN + DBN | 🗸 | X | X | X | X | X | 🗸 | 🗸 | X | 🗸 | X | - |
[59] | Slice Allocation | Random Forest, SVM, kNN, Decision Tree | 🗸 | X | X | X | X | X | 🗸 | 🗸 | X | * | X | - |
[60] | Slice Admission | Reinforcement learning | X | 🗸 | 🗸 | X | 🗸 | X | 🗸 | 🗸 | X | 🗸 | X | - |
[39] | Automation in Network Function | ML algorithm | 🗸 | X | X | X | X | X | 🗸 | 🗸 | X | 🗸 | 🗸 | Traffic analysis, DPI, threat identification and infection isolation |
[43] | Resource Allocation | LSTM | 🗸 | X | X | X | 🗸 | 🗸 | 🗸 | 🗸 | X | 🗸 | X | - |
[61] | Identifying mobile applications and enabling application specific Network Slicing | Deep Learning (DL) | X | X | X | X | 🗸 | X | 🗸 | 🗸 | X | X | X | - |
[62] | Security in Network Slicing | Deep learning (DL) | 🗸 | X | X | X | 🗸 | 🗸 | 🗸 | 🗸 | X | 🗸 | 🗸 | Secure 5G: to detect and eliminate threats based on incoming connections. |
[63] | Cooperative attack detection | Reinforcement learning | 🗸 | X | X | X | 🗸 | X | 🗸 | 🗸 | X | X | 🗸 | To secure end-end network against internal and external attacks |
[64] | Designed jamming attack | Reinforcement learning | X | X | X | X | 🗸 | X | X | X | X | 🗸 | 🗸 | To secure network slicing against RL based jamming attacks, they introduced a defense mechanism such as Q-table update. |
[65] | To built comprehensive architecture and experimental framework for the future self organising network | Naive Bayes, SVM, NN, GBT and RF | X | X | X | X | 🗸 | X | 🗸 | 🗸 | X | 🗸 | X | - |
[66] | Resource Allocation | Unsupervised ML | 🗸 | X | X | X | X | X | 🗸 | 🗸 | X | 🗸 | X | - |
[67] | Big-data driven dynamic slicing | ML and DL algorithm | 🗸 | X | X | X | X | X | 🗸 | 🗸 | X | 🗸 | X | - |
[68] | Resource allocation for Edge Computing | Deep Reinforcement Learning | 🗸 | X | X | X | X | X | X | X | X | 🗸 | 🗸 | The Blockchain Network Slicing Broker (BNSB) handles requests and manages resource allocation. The Blockchain technology ensures the security of transactions. |
[69] | Joint Radio and Cache Resource Allocation | Transfer Reinforcement Learning (TRL) | 🗸 | X | X | X | 🗸 | X | X | X | X | 🗸 | X | - |
[70] | Network slicing with diverse resource stipulations and dynamic data traffic | Deep Q Learning | X | X | X | X | 🗸 | X | 🗸 | 🗸 | X | 🗸 | X | - |
Authors | Proposed framework | Security Mechanism | Security Considerations | Services | Attack Prevention | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Z1 | Z2 | Z3 | Z4 | LB | RA | Handover | DoS | DDoS | IoT | MANO | KCI | Other Attacks | |||
[89] | Network isolation is done through slicing, cryptography and authentication | Slice Isolation | 🗸 | X | X | X | X | 🗸 | X | 🗸 | 🗸 | X | X | X | X |
[90] | 5G IoT architecture using Network Slicing | Intrusion Detection System (IDS) | 🗸 | X | X | X | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | X | X | X |
[92] | Prevents security concerns at packet core using Network Slicing | Slice Isolation | 🗸 | X | X | X | X | * | X | X | X | 🗸 | X | X | Side Channel |
[93] | Secured network slicing deployment by targeting access control and authorization | MANO Security | 🗸 | X | X | X | X | 🗸 | X | X | X | X | 🗸 | X | X |
[95] | Develop a secure network slicing architecture for third party application using secure key scheme | Multi party computation | 🗸 | X | X | X | X | X | X | 🗸 | 🗸 | X | X | 🗸 | Data tampering |
[40] | Proposed framework Secure 5G quarantines the threats which challenge the end-end security | NN based Secure 5G network slicing model | 🗸 | X | X | X | X | 🗸 | * | X | 🗸 | X | X | X | X |
[94] | Efficient and secure service oriented authentication framework is proposed to support network slicing and fog computing for 5G IoT services | Privacy preserving slice selection mechanism | 🗸 | X | X | X | X | 🗸 | X | 🗸 | X | 🗸 | X | X | X |
[96] | Proposed a solution which prevents Denial of Service (DoS) attack for secure network slicing | Learning assisted secure network slicing | 🗸 | X | X | X | 🗸 | 🗸 | X | 🗸 | X | 🗸 | X | X | X |
[97] | Proposed a mathematical model, which offers on-demand slice allocation with guaranteed end-end delay for 5G core network slices. | Intra and Inter Slice isolation | 🗸 | X | X | X | X | 🗸 | X | X | 🗸 | * | X | X | X |
[63] | To secure the main segments of the end-end 5G network, proposed a hierarchical detection scheme with reinforcement learning | Reinforcement Learning (RL) | 🗸 | X | X | X | X | X | X | X | 🗸 | X | X | X | Botnet attack |
[98] | The potential design issues and challenges of the secure 5G mobile fronthaul architecture | Backhaul Security | 🗸 | * | 🗸 | * | 🗸 | 🗸 | 🗸 | 🗸 | X | X | X | X | Replay and man-in middle attack |
[99] | Proposed an architectural design for 5G transfer solution which targets the integration of existing and fronthaul and backhaul technologies and interfaces. | SDN/NFV based MANO entity (XCI) and Ethernet based packet forwarding entity (XFE) | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | * | X | X | X | X | 🗸 | X | X |
[100] | A key exchange and authentication protocol is proposed, which secures Xhaul for a moving terminal in the network. The paper targets the privacy and forward secrecy in the mobile Xhaul network. | BAN logic and AVISPA evaluations | X | 🗸 | 🗸 | 🗸 | X | X | 🗸 | 🗸 | X | X | X | X | Replay and eavesdropping attacks |
[101] | The proposed framework provides real time detection and mitigation of known attacks in 5G Network Slicing. It used P4 based switches which implemented a service function chaining protocol layer, and reduced the overhead induced on the control channel. | Frame RTP4, a P4 based framework | 🗸 | X | X | X | 🗸 | 🗸 | X | X | 🗸 | X | X | X | Zero-day attack |
[102] | The capability of the IDS has been extended to identify the attacking nodes in a 5G network, despite multiple network traffic encapsulations. | IDS | 🗸 | X | X | X | X | 🗸 | X | X | 🗸 | X | X | X | X |
[103] | This letter introduced a new type of Distributed Slice Mobility (DSM) attack, which is caused by inter-slice mobility of the user in the 5G network. Additionally, mentioned that the damage caused by DSM is higher than DoS and yo-yo attacks, in terms of performance and economy. | Autoscaling of resources | 🗸 | X | X | X | * | * | * | * | 🗸 | X | X | X | Distributed Slice Mobility (DSM), yo-yo attack |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dangi, R.; Jadhav, A.; Choudhary, G.; Dragoni, N.; Mishra, M.K.; Lalwani, P. ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet 2022, 14, 116. https://doi.org/10.3390/fi14040116
Dangi R, Jadhav A, Choudhary G, Dragoni N, Mishra MK, Lalwani P. ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet. 2022; 14(4):116. https://doi.org/10.3390/fi14040116
Chicago/Turabian StyleDangi, Ramraj, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra, and Praveen Lalwani. 2022. "ML-Based 5G Network Slicing Security: A Comprehensive Survey" Future Internet 14, no. 4: 116. https://doi.org/10.3390/fi14040116
APA StyleDangi, R., Jadhav, A., Choudhary, G., Dragoni, N., Mishra, M. K., & Lalwani, P. (2022). ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet, 14(4), 116. https://doi.org/10.3390/fi14040116