Authentication Techniques in 5G Network Slicing Security: A Survey

Authors

  • Essam A. Abduh Department of Information Technology, Faculty of Computing and Information Technology, University of Science and Technology, Ibb, Yemen
  • Belal A. Al-Fuhaidi Department of Computer Science, Faculty of Computing and Information Technology, University of Science and Technology, Sana’a, Yemen
  • Fahd A. Alqasemi Department of Information Technology, Faculty of Computing and Information Technology, University of Science and Technology, Ibb, Yemen

DOI:

https://doi.org/10.59222/ustjet.2.2.2

Keywords:

5th generation networks (5G), network slicing (NS), NS security, data encryption, hashing functions, convolutional neural network

Abstract

Emerging network slicing technology is a key feature of 5G cellular networks. Network slice and cloud computing provide promising solutions in 5G architecture. Network Slicing Security (NSS) is also important in 5G research. The emerging environment is a fertile breeding ground for the attacker. This study discusses authentication techniques in fifth-generation networks, as the authentication process is the first wall of defense against various network attacks. Meanwhile, techniques and algorithms are important in achieving confidentiality, integrity, and availability while maintaining speed and accuracy. The diversity and multiplicity of devices, in addition to the movement between slices and operators, make the authentication process extremely important. This article presents and explains the main issues related to network segment threats and attacks, highlighting the authentication techniques used in NS. The authentication process mainly focuses on the use of encryption and digital signature technology, either implicitly within the devices or directly when connecting to the network.

Downloads

Published

2024-12-30

Issue

Section

Articles