5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches

This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classificat...

Full description

Saved in:
Bibliographic Details
Main Authors: José Dias, Pedro Pinto, Ricardo Santos, Silvestre Malta
Format: Article
Language:English
Published: MDPI AG 2025-06-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/25/13/3940
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849320901974163456
author José Dias
Pedro Pinto
Ricardo Santos
Silvestre Malta
author_facet José Dias
Pedro Pinto
Ricardo Santos
Silvestre Malta
author_sort José Dias
collection DOAJ
description This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5G, complemented by practical mitigation approaches suitable for multi-tenant environments. The classification depicts specific attacks and categorizes vulnerabilities across layers such as orchestration, virtualization, and inter-slice communication. Additionally, mitigation strategies are discussed, emphasizing the importance of real-time monitoring and robust access controls. The proposed classification aims to support the development of advanced security mechanisms, including risk assessment models and automated mitigation strategies, tailored to the dynamic and heterogeneous nature of 5G slicing. The findings highlight the need for layered defenses, AI-driven monitoring, and architectural isolation as critical components to enhance the resilience of 5G slicing deployments.
format Article
id doaj-art-ee6950c1519d469b8688b4349c4aa0f1
institution Kabale University
issn 1424-8220
language English
publishDate 2025-06-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj-art-ee6950c1519d469b8688b4349c4aa0f12025-08-20T03:49:55ZengMDPI AGSensors1424-82202025-06-012513394010.3390/s251339405G Network Slicing: Security Challenges, Attack Vectors, and Mitigation ApproachesJosé Dias0Pedro Pinto1Ricardo Santos2Silvestre Malta3ESTG—Instituto Politécnico de Viana do Castelo, 4900 Viana do Castelo, PortugalISEP—Instituto Politécnico do Porto, 4249 Porto, PortugalESTG—Instituto Politécnico do Porto, 4610 Felgueiras, PortugalESTG—Instituto Politécnico de Viana do Castelo, 4900 Viana do Castelo, PortugalThis paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5G, complemented by practical mitigation approaches suitable for multi-tenant environments. The classification depicts specific attacks and categorizes vulnerabilities across layers such as orchestration, virtualization, and inter-slice communication. Additionally, mitigation strategies are discussed, emphasizing the importance of real-time monitoring and robust access controls. The proposed classification aims to support the development of advanced security mechanisms, including risk assessment models and automated mitigation strategies, tailored to the dynamic and heterogeneous nature of 5G slicing. The findings highlight the need for layered defenses, AI-driven monitoring, and architectural isolation as critical components to enhance the resilience of 5G slicing deployments.https://www.mdpi.com/1424-8220/25/13/39405G networksnetwork slicingvulnerabilitiessecurityrisk mitigation
spellingShingle José Dias
Pedro Pinto
Ricardo Santos
Silvestre Malta
5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
Sensors
5G networks
network slicing
vulnerabilities
security
risk mitigation
title 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
title_full 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
title_fullStr 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
title_full_unstemmed 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
title_short 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
title_sort 5g network slicing security challenges attack vectors and mitigation approaches
topic 5G networks
network slicing
vulnerabilities
security
risk mitigation
url https://www.mdpi.com/1424-8220/25/13/3940
work_keys_str_mv AT josedias 5gnetworkslicingsecuritychallengesattackvectorsandmitigationapproaches
AT pedropinto 5gnetworkslicingsecuritychallengesattackvectorsandmitigationapproaches
AT ricardosantos 5gnetworkslicingsecuritychallengesattackvectorsandmitigationapproaches
AT silvestremalta 5gnetworkslicingsecuritychallengesattackvectorsandmitigationapproaches