{"id":52,"date":"2021-05-28T12:32:42","date_gmt":"2021-05-28T16:32:42","guid":{"rendered":"https:\/\/carleton.ca\/ngn\/?p=52"},"modified":"2023-11-16T14:30:45","modified_gmt":"2023-11-16T19:30:45","slug":"secure-5g-core-network-slicing-in-support-of-iot-application","status":"publish","type":"post","link":"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/","title":{"rendered":"Secure 5G Core Network Slicing in Support of IoT Application"},"content":{"rendered":"<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-528 size-full aligncenter\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482.png\" alt=\"\" width=\"1314\" height=\"638\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482.png 1314w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-240x117.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-400x194.png 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-160x78.png 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-768x373.png 768w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-360x175.png 360w\" sizes=\"(max-width: 1314px) 100vw, 1314px\" \/><\/p>\n<p>The key motivation for this work is that future smart services (e.g. IoT applications) will have competing and perhaps conflicting networking performance requirements. These services will also require flexible and agile deployment. 5G networks, an essential component of future virtualized infrastructures, deal with this issue \u2013 in part \u2013 by relying on network slicing. To define a network slice, one has to consider the allocation of recourses \u2013 both in the radio and core parts \u2013 of the 5G network to form a logical entity where a service could be deployed. Network slicing has emerged as a key-enabler for proving heterogeneous services. It takes advantage of the virtualization elements of future networking infrastructures where multiple services can be hosted on the same physical infrastructure.<\/p>\n<p>A shift in the mobile network paradigm also mandates changes in the security architecture with new\u00a0<strong>security<\/strong>\u00a0challenges that do not exist in the past or present mobile networks. In the current mobile network, if an attacker launches flooding Distributed Denial of Service (DDoS) attack against a mobile service, only that service will be affected, and there is a very low risk of host resource starvation-based attacks in current mobile networks (i.e., usually mobile network infrastructure is not virtualized). However, in a 5G network, a DDoS against one slice might affect other services because they could be tenants of the same shared virtualized infrastructure. An important requirement for 5G network slicing is\u00a0<strong>isolation<\/strong>.<\/p>\n<h4><strong>Slice Allocation:<\/strong><\/h4>\n<p>Two key challenges of 5G network slicing are function isolation (intra-slice) and guaranteeing end-to-end delay for a slice. In this work, we address the question of optimal allocation of a slice in 5G core networks by addressing these two challenges. We create a model that satisfies constraints on end-to-end delay as well as isolation between components of a slice for reliability.<\/p>\n<p>[1] D. Sattar and A. Matrawy, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8676260\"><strong>Optimal slice allocation in 5g core networks<\/strong><\/a>,\u201d in IEEE Networking Letters, vol. 1, no. 2, pp. 48-51, June 2019.<\/p>\n<h4><strong>DDoS Mitigation using Slice isolation:<\/strong><\/h4>\n<p><strong>In this research<\/strong>, we address the issue of DDoS attacks in 5G network slicing. In 5G virtualized network, multiple tenants will share the same physical resources. A DDoS attack on one slice could disrupt the services hosted on other slices. We try to mitigate the Distributed Denial-of-Service (DDoS) attacks using\u00a0<strong>slice isolation<\/strong>\u00a0(i.e., inter-slice and intra-slice isolation).<\/p>\n<p><strong>Inter-slice isolation<\/strong>\u00a0provides mitigation against the DDoS attacks because the hardware resources are not shared between the slices and DDoS on one slice does not impact the other slices. Whereas\u00a0<strong>intra-slice isolation<\/strong>\u00a0provides better availability for the slices since the components of the slice are hosted on different hosts. Enabling intra-slice isolation could reduce the impact of DDoS attack and increase the availability of the target slice as well as faster recovery of the service because the slice operator may not need to deploy reactive mitigation defense for all slices (e.g., migrating only affected slices).<\/p>\n<p>[2.] D. Sattar and A. Matrawy, \u201c<a href=\"https:\/\/arxiv.org\/abs\/1901.01443\"><strong>Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices<\/strong><\/a>,\u201d to appear in 7th Annual IEEE Conference on Communications and Network Security (CNS 2019), June 2019.<\/p>\n<h4><strong>DSAF: Dynamic Slice Allocation Framework for 5G Core Network:<\/strong><\/h4>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-528 size-large aligncenter\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-400x194.png\" alt=\"\" width=\"400\" height=\"194\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-400x194.png 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-240x117.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-160x78.png 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-768x373.png 768w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482-360x175.png 360w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Network-1-e1632532216482.png 1314w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/p>\n<p>To automate the process of slice allocation in 5G core network, we propose a framework. In the proposed framework, slices can be allocated and deallocated dynamically [3]. The Dynamic Slice Allocation Framework (DSAF) consists of five components as shown in Fig. 2.<br \/>\n[3.] D. Sattar and A. Matrawy, \u201c<a href=\"https:\/\/arxiv.org\/pdf\/1905.03873.pdf\"><strong>DSAF: Dynamic Slice Allocation Framework for 5G Core Network<\/strong><\/a>,\u201d CoRR, vol. abs\/1905.03873, 2019.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The key motivation for this work is that future smart services (e.g. IoT applications) will have competing and perhaps conflicting networking performance requirements. These services will also require flexible and agile deployment. 5G networks, an essential component of future virtualized infrastructures, deal with this issue \u2013 in part \u2013 by relying on network slicing. To [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[23],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secure 5G Core Network Slicing in Support of IoT Application - Next Generation Networks Lab<\/title>\n<meta name=\"description\" content=\"&nbsp; &nbsp; &nbsp; The key motivation for this work is that future smart services (e.g. IoT applications) will have competing and perhaps conflicting\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"QUINNLIN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/\",\"url\":\"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/\",\"name\":\"Secure 5G Core Network Slicing in Support of IoT Application - Next Generation Networks Lab\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\"},\"datePublished\":\"2021-05-28T16:32:42+00:00\",\"dateModified\":\"2023-11-16T19:30:45+00:00\",\"author\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/f6858f943b91186c55078b8857a212c9\"},\"description\":\"&nbsp; &nbsp; &nbsp; The key motivation for this work is that future smart services (e.g. IoT applications) will have competing and perhaps conflicting\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/ngn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\/\/carleton.ca\/ngn\/category\/projects\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure 5G Core Network Slicing in Support of IoT Application\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\",\"url\":\"https:\/\/carleton.ca\/ngn\/\",\"name\":\"Next Generation Networks Lab\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/ngn\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/f6858f943b91186c55078b8857a212c9\",\"name\":\"QUINNLIN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9f862b64c2ec8824458e4ccbcf5da408?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9f862b64c2ec8824458e4ccbcf5da408?s=96&d=mm&r=g\",\"caption\":\"QUINNLIN\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure 5G Core Network Slicing in Support of IoT Application - Next Generation Networks Lab","description":"&nbsp; &nbsp; &nbsp; The key motivation for this work is that future smart services (e.g. IoT applications) will have competing and perhaps conflicting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/","twitter_misc":{"Written by":"QUINNLIN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/","url":"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/","name":"Secure 5G Core Network Slicing in Support of IoT Application - Next Generation Networks Lab","isPartOf":{"@id":"https:\/\/carleton.ca\/ngn\/#website"},"datePublished":"2021-05-28T16:32:42+00:00","dateModified":"2023-11-16T19:30:45+00:00","author":{"@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/f6858f943b91186c55078b8857a212c9"},"description":"&nbsp; &nbsp; &nbsp; The key motivation for this work is that future smart services (e.g. IoT applications) will have competing and perhaps conflicting","breadcrumb":{"@id":"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/ngn\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/carleton.ca\/ngn\/category\/projects\/"},{"@type":"ListItem","position":3,"name":"Secure 5G Core Network Slicing in Support of IoT Application"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/ngn\/#website","url":"https:\/\/carleton.ca\/ngn\/","name":"Next Generation Networks Lab","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/ngn\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/f6858f943b91186c55078b8857a212c9","name":"QUINNLIN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9f862b64c2ec8824458e4ccbcf5da408?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9f862b64c2ec8824458e4ccbcf5da408?s=96&d=mm&r=g","caption":"QUINNLIN"}}]}},"acf":{"Post Thumbnail Icon":"news-4","Post Thumbnail":{"ID":530,"id":530,"title":"5G-Slicing","filename":"5G-Slicing.png","filesize":112870,"url":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing.png","link":"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/5g-slicing\/","alt":"","author":"8","description":"","caption":"","name":"5g-slicing","status":"inherit","uploaded_to":52,"date":"2023-11-16 19:28:20","modified":"2023-11-16 19:28:20","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/carleton.ca\/ngn\/wp\/wp-includes\/images\/media\/default.png","width":800,"height":388,"sizes":{"thumbnail":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing-160x78.png","thumbnail-width":160,"thumbnail-height":78,"medium":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing-240x116.png","medium-width":240,"medium-height":116,"medium_large":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing-768x372.png","medium_large-width":768,"medium_large-height":372,"large":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing-400x194.png","large-width":400,"large-height":194,"gallery-thumb":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing-300x230.png","gallery-thumb-width":300,"gallery-thumb-height":230,"1536x1536":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing.png","1536x1536-width":800,"1536x1536-height":388,"2048x2048":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing.png","2048x2048-width":800,"2048x2048-height":388,"banner":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing.png","banner-width":800,"banner-height":388,"people":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing-200x200.png","people-width":200,"people-height":200,"post-thumb":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing-300x230.png","post-thumb-width":300,"post-thumb-height":230,"rotator-image":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing.png","rotator-image-width":800,"rotator-image-height":388,"video-thumb":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slicing-360x175.png","video-thumb-width":360,"video-thumb-height":175}}},"_links":{"self":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/52"}],"collection":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/comments?post=52"}],"version-history":[{"count":5,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/52\/revisions"}],"predecessor-version":[{"id":533,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/52\/revisions\/533"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/media?parent=52"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/categories?post=52"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/tags?post=52"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}