Header menu link for other important links
DSM Attack Resistant Slice Selection in 5G
Published in Institute of Electrical and Electronics Engineers Inc.
In a previous letter, we proposed the distributed slice mobility (DSM) attack 1. The DSM attack can cause severe performance and economic damage to 5G networks. Attackers can launch the DSM attack by exploiting a vulnerability in the existing slice selection protocol 1. In this letter, we propose a DSM attack resistant slice selection protocol for 5G networks. In the proposed protocol, the network selects the best slice for a session between a user and an external data network based on the type of services offered by the external data network and the user’s subscription details. The proposed protocol implements neutral slice selection and mitigation of traffic analysis attacks by ensuring user anonymity. The proposed protocol is implemented, and its computation overhead is compared with that of the traditional protocol and a privacy preserving slice selection protocol. IEEE
About the journal
JournalData powered by TypesetIEEE Wireless Communications Letters
PublisherData powered by TypesetInstitute of Electrical and Electronics Engineers Inc.
Open AccessNo