Full Text

Turn on search term navigation

© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband (eMBB), massive machine type communication (eMTC), and ultra-reliable low-latency services (URLLC). Since it is difficult to provide all of these services on a physical network, the 5G network is partitioned into multiple virtual networks called “slices”. These slices customize these unique services and enable the network to be reliable and fulfill the needs of its users. This phenomenon is called network slicing. Security is a critical concern in network slicing as adversaries have evolved to become more competent and often employ new attack strategies. This study focused on the security issues that arise during the network slice lifecycle. Machine learning and deep learning algorithm solutions were applied in the planning and design, construction and deployment, monitoring, fault detection, and security phases of the slices. This paper outlines the 5G network slicing concept, its layers and architectural framework, and the prevention of attacks, threats, and issues that represent how network slicing influences the 5G network. This paper also provides a comparison of existing surveys and maps out taxonomies to illustrate various machine learning solutions for different application parameters and network functions, along with significant contributions to the field.

Details

Title
ML-Based 5G Network Slicing Security: A Comprehensive Survey
Author
Ramraj Dangi 1   VIAFID ORCID Logo  ; Jadhav, Akshay 1   VIAFID ORCID Logo  ; Choudhary, Gaurav 2   VIAFID ORCID Logo  ; Dragoni, Nicola 2   VIAFID ORCID Logo  ; Mishra, Manas Kumar 1   VIAFID ORCID Logo  ; Lalwani, Praveen 1 

 School of Computing Science and Engineering, VIT Bhopal University, Bhopal 466114, India; [email protected] (R.D.); [email protected] (A.J.); [email protected] (M.K.M.); [email protected] (P.L.) 
 DTU Compute, Department of Applied Mathematics and Computer Science, Technical University of Denmark, DK-2800 Kongens Lyngby, Denmark; [email protected] 
First page
116
Publication year
2022
Publication date
2022
Publisher
MDPI AG
e-ISSN
19995903
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2652967727
Copyright
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.