5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classificat...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-06-01
|
| Series: | Sensors |
| Subjects: | |
| Online Access: | https://www.mdpi.com/1424-8220/25/13/3940 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849320901974163456 |
|---|---|
| author | José Dias Pedro Pinto Ricardo Santos Silvestre Malta |
| author_facet | José Dias Pedro Pinto Ricardo Santos Silvestre Malta |
| author_sort | José Dias |
| collection | DOAJ |
| description | This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5G, complemented by practical mitigation approaches suitable for multi-tenant environments. The classification depicts specific attacks and categorizes vulnerabilities across layers such as orchestration, virtualization, and inter-slice communication. Additionally, mitigation strategies are discussed, emphasizing the importance of real-time monitoring and robust access controls. The proposed classification aims to support the development of advanced security mechanisms, including risk assessment models and automated mitigation strategies, tailored to the dynamic and heterogeneous nature of 5G slicing. The findings highlight the need for layered defenses, AI-driven monitoring, and architectural isolation as critical components to enhance the resilience of 5G slicing deployments. |
| format | Article |
| id | doaj-art-ee6950c1519d469b8688b4349c4aa0f1 |
| institution | Kabale University |
| issn | 1424-8220 |
| language | English |
| publishDate | 2025-06-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Sensors |
| spelling | doaj-art-ee6950c1519d469b8688b4349c4aa0f12025-08-20T03:49:55ZengMDPI AGSensors1424-82202025-06-012513394010.3390/s251339405G Network Slicing: Security Challenges, Attack Vectors, and Mitigation ApproachesJosé Dias0Pedro Pinto1Ricardo Santos2Silvestre Malta3ESTG—Instituto Politécnico de Viana do Castelo, 4900 Viana do Castelo, PortugalISEP—Instituto Politécnico do Porto, 4249 Porto, PortugalESTG—Instituto Politécnico do Porto, 4610 Felgueiras, PortugalESTG—Instituto Politécnico de Viana do Castelo, 4900 Viana do Castelo, PortugalThis paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5G, complemented by practical mitigation approaches suitable for multi-tenant environments. The classification depicts specific attacks and categorizes vulnerabilities across layers such as orchestration, virtualization, and inter-slice communication. Additionally, mitigation strategies are discussed, emphasizing the importance of real-time monitoring and robust access controls. The proposed classification aims to support the development of advanced security mechanisms, including risk assessment models and automated mitigation strategies, tailored to the dynamic and heterogeneous nature of 5G slicing. The findings highlight the need for layered defenses, AI-driven monitoring, and architectural isolation as critical components to enhance the resilience of 5G slicing deployments.https://www.mdpi.com/1424-8220/25/13/39405G networksnetwork slicingvulnerabilitiessecurityrisk mitigation |
| spellingShingle | José Dias Pedro Pinto Ricardo Santos Silvestre Malta 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches Sensors 5G networks network slicing vulnerabilities security risk mitigation |
| title | 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches |
| title_full | 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches |
| title_fullStr | 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches |
| title_full_unstemmed | 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches |
| title_short | 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches |
| title_sort | 5g network slicing security challenges attack vectors and mitigation approaches |
| topic | 5G networks network slicing vulnerabilities security risk mitigation |
| url | https://www.mdpi.com/1424-8220/25/13/3940 |
| work_keys_str_mv | AT josedias 5gnetworkslicingsecuritychallengesattackvectorsandmitigationapproaches AT pedropinto 5gnetworkslicingsecuritychallengesattackvectorsandmitigationapproaches AT ricardosantos 5gnetworkslicingsecuritychallengesattackvectorsandmitigationapproaches AT silvestremalta 5gnetworkslicingsecuritychallengesattackvectorsandmitigationapproaches |