IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v14y2022i4p116-d789792.html
   My bibliography  Save this article

ML-Based 5G Network Slicing Security: A Comprehensive Survey

Author

Listed:
  • Ramraj Dangi

    (School of Computing Science and Engineering, VIT Bhopal University, Bhopal 466114, India)

  • Akshay Jadhav

    (School of Computing Science and Engineering, VIT Bhopal University, Bhopal 466114, India)

  • Gaurav Choudhary

    (DTU Compute, Department of Applied Mathematics and Computer Science, Technical University of Denmark, DK-2800 Kongens Lyngby, Denmark)

  • Nicola Dragoni

    (DTU Compute, Department of Applied Mathematics and Computer Science, Technical University of Denmark, DK-2800 Kongens Lyngby, Denmark)

  • Manas Kumar Mishra

    (School of Computing Science and Engineering, VIT Bhopal University, Bhopal 466114, India)

  • Praveen Lalwani

    (School of Computing Science and Engineering, VIT Bhopal University, Bhopal 466114, India)

Abstract

Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband (eMBB), massive machine type communication (eMTC), and ultra-reliable low-latency services (URLLC). Since it is difficult to provide all of these services on a physical network, the 5G network is partitioned into multiple virtual networks called “slices”. These slices customize these unique services and enable the network to be reliable and fulfill the needs of its users. This phenomenon is called network slicing. Security is a critical concern in network slicing as adversaries have evolved to become more competent and often employ new attack strategies. This study focused on the security issues that arise during the network slice lifecycle. Machine learning and deep learning algorithm solutions were applied in the planning and design, construction and deployment, monitoring, fault detection, and security phases of the slices. This paper outlines the 5G network slicing concept, its layers and architectural framework, and the prevention of attacks, threats, and issues that represent how network slicing influences the 5G network. This paper also provides a comparison of existing surveys and maps out taxonomies to illustrate various machine learning solutions for different application parameters and network functions, along with significant contributions to the field.

Suggested Citation

  • Ramraj Dangi & Akshay Jadhav & Gaurav Choudhary & Nicola Dragoni & Manas Kumar Mishra & Praveen Lalwani, 2022. "ML-Based 5G Network Slicing Security: A Comprehensive Survey," Future Internet, MDPI, vol. 14(4), pages 1-28, April.
  • Handle: RePEc:gam:jftint:v:14:y:2022:i:4:p:116-:d:789792
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/14/4/116/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/14/4/116/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Petar Radanliev & David Roure & Pete Burnap & Omar Santos, 2021. "Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things," The Review of Socionetwork Strategies, Springer, vol. 15(2), pages 381-411, November.
    2. Anabi Hilary Kelechi & Mohammed H. Alsharif & Athirah Mohd Ramly & Nor Fadzilah Abdullah & Rosdiadee Nordin, 2019. "The Four-C Framework for High Capacity Ultra-Low Latency in 5G Networks: A Review," Energies, MDPI, vol. 12(18), pages 1-35, September.
    3. Heejung Yu & Howon Lee & Hongbeom Jeon, 2017. "What is 5G? Emerging 5G Mobile Services and Network Requirements," Sustainability, MDPI, vol. 9(10), pages 1-22, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Yves Adou & Ekaterina Markova & Yuliya Gaidamaka, 2022. "Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework," Future Internet, MDPI, vol. 14(10), pages 1-16, October.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Andrzej Paszkiewicz & Bartosz Pawłowicz & Bartosz Trybus & Mateusz Salach, 2021. "Traffic Intersection Lane Control Using Radio Frequency Identification and 5G Communication," Energies, MDPI, vol. 14(23), pages 1-17, December.
    2. Louisa von der Assen, 2023. "Digitalization as a Provider of Sustainability?—The Role and Acceptance of Digital Technologies in Fashion Stores," Sustainability, MDPI, vol. 15(5), pages 1-20, March.
    3. Constantin Aurelian Ionescu & Melinda Timea Fülöp & Dan Ioan Topor & Sorinel Căpușneanu & Teodora Odett Breaz & Sorina Geanina Stănescu & Mihaela Denisa Coman, 2021. "The New Era of Business Digitization through the Implementation of 5G Technology in Romania," Sustainability, MDPI, vol. 13(23), pages 1-23, December.
    4. Jonghyuk Kim & Hyunwoo Hwangbo & Sung Jun Kim & Soyean Kim, 2019. "Location-Based Tracking Data and Customer Movement Pattern Analysis for Sustainable Fashion Business," Sustainability, MDPI, vol. 11(22), pages 1-17, November.
    5. Waqas Khalid & Heejung Yu, 2018. "Sum Utilization of Spectrum with Spectrum Handoff and Imperfect Sensing in Interweave Multi-Channel Cognitive Radio Networks," Sustainability, MDPI, vol. 10(6), pages 1-18, May.
    6. Xiaoqian Zhu & Yinghui Wang & Jianping Li, 2022. "What drives reputational risk? Evidence from textual risk disclosures in financial statements," Palgrave Communications, Palgrave Macmillan, vol. 9(1), pages 1-15, December.
    7. Xin Du & Hengming Zhang & Yawen Han, 2022. "How Does New Infrastructure Investment Affect Economic Growth Quality? Empirical Evidence from China," Sustainability, MDPI, vol. 14(6), pages 1-30, March.
    8. Qian Yang & Suoping Li & Hongli Li & Weiru Chen, 2022. "Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain," Future Internet, MDPI, vol. 15(1), pages 1-15, December.
    9. Ammar Alazab & Ansam Khraisat & Moutaz Alazab & Sarabjot Singh, 2022. "Detection of Obfuscated Malicious JavaScript Code," Future Internet, MDPI, vol. 14(8), pages 1-15, July.
    10. Queder, Fabian & Lehr, William & Haucap, Justus, 2020. "5G and Mobile Broadband Disruption," ITS Conference, Online Event 2020 224872, International Telecommunications Society (ITS).
    11. Mashael Khayyat & Abdullah Alshahrani & Soltan Alharbi & Ibrahim Elgendy & Alexander Paramonov & Andrey Koucheryavy, 2020. "Multilevel Service-Provisioning-Based Autonomous Vehicle Applications," Sustainability, MDPI, vol. 12(6), pages 1-16, March.
    12. Yousaf Bin Zikria & Sung Won Kim & Muhammad Khalil Afzal & Haoxiang Wang & Mubashir Husain Rehmani, 2018. "5G Mobile Services and Scenarios: Challenges and Solutions," Sustainability, MDPI, vol. 10(10), pages 1-9, October.
    13. Van-Duc Phan & Tan N. Nguyen & Minh Tran & Tran Thanh Trang & Miroslav Voznak & Duy-Hung Ha & Thanh-Long Nguyen, 2019. "Power Beacon-Assisted Energy Harvesting in a Half-Duplex Communication Network under Co-Channel Interference over a Rayleigh Fading Environment: Energy Efficiency and Outage Probability Analysis," Energies, MDPI, vol. 12(13), pages 1-14, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:14:y:2022:i:4:p:116-:d:789792. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.