Abstract
In a previous letter, we proposed the distributed slice mobility (DSM) attack. The DSM attack can cause severe performance and economic damage to 5G networks. Attackers can launch the DSM attack by exploiting a vulnerability in the existing slice selection protocol. In this letter, we propose a DSM attack resistant slice selection protocol for 5G networks. In the proposed protocol, the network selects the best slice for a session between a user and an external data network based on the type of services offered by the external data network and the user's subscription details. The proposed protocol implements neutral slice selection and mitigation of traffic analysis attacks by ensuring user anonymity. The proposed protocol is implemented, and its computation overhead is compared with that of the traditional protocol and a privacy preserving slice selection protocol.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.