Abstract
Starting with Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies, network slicing is emerging as a critical technology in 5G-Advanced and 6G mobile communications to allocate logical networks end-to-end, meeting diverse service requirements. However, the advent of network slicing introduces new security threats, including inter-slice security, intra-slice security, and lifecycle security of network slicing. While recent research has focused on security orchestration technologies using SDN/NFV for network slicing and AI-based attack detection, there remains a gap in research on security by design within the components of 3GPP 5G systems. Therefore, this paper investigates security by design in the 5G-Advanced and 6G architectures. To address these issues, we propose a malicious User Equipment (UE) detection function to identify attacks within the network-slicing environment. We illustrate the interaction between the detection function and other 3GPP 5G system components for network slicing security with its algorithm for detecting malicious UEs in network slices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ITU-R M.2160: Framework and overall objectives of the future development of IMT for 2030 and beyond (2023). https://www.itu.int/rec/R-REC-M.2160-0-202311-I/en
ETSI GR NFV-EVE 018 V5.1.1.: Network Functions Virtualisation (NFV) Release 5; Evolution and Ecosystem; Report on Multi-tenancy in NFV (2024)
Wijethilaka, S., Liyanage, M.: The role of security orchestrator in network slicing for future networks. J. Commun. Netw. 25(3), 355–369 (2023)
Alwis, C.D., Porambage, P., Dev, K., Gadekallu, T.R., Liyanage, M.: A survey on network slicing security: attacks, challenges, solutions and research directions. IEEE Commun. Surv. Tutor. 26(1), 534–570 (2024)
Zharabad, A.J., Yousefi, S., Kunz, T.: Network slicing in virtualized 5G core with VNF sharing. J. Netw. Comput. Appl. 215, 103631 (2023)
Popovski, P., Trillingsgaard, K.F., Simeone, O., Durisi, G.: 5G wireless network slicing for eMBB, URLLC, and mMTC: a communication-theoretic view. IEEE Access 6, 55765–55779 (2018)
Afolabi, I., Taleb, T., Samdanis, K., Ksentini, A., Flinck, H.: Network slicing and softwarization: a survey on principles, enabling technologies, and solutions. IEEE Commun. Surv. Tutor. 20(3), 2429–2453 (2018)
Lin, X.: An Overview of 5G Advanced Evolution in 3GPP Release 18. IEEE Commun. Stan. Mag. 6(3), 77–83 (2022)
Ebrahimi, S., Bouali, F., Haas, O.C.L.: Resource management from single-domain 5G to end-to-end 6G network slicing: a survey. IEEE Commun. Surv. Tutor. (2024)
Odida, M.: Network Slicing in Software Defined Networking for 5G (2024)
Singh, P.S., Singh, M.P., Hegde, S., Gupta, M.: Security in 5G network slices: concerns and opportunities. IEEE Access 12, 52727–52743 (2024)
Martini, B., et al.: Pushing forward security in network slicing by leveraging continuous usage control. IEEE Commun. Mag. 58(7), 65–71 (2020)
Bisht, H., Patra, M., Kumar, S.: Detection and localization of DDoS attack during inter-slice handover in 5G network slicing. In: 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), pp. 798–803 (2023)
Benzaïd, C., Taleb, T., Sami, A., Hireche, O.: A deep transfer learning-powered ED-oS detection mechanism for 5G and beyond network slicing. In: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, pp. 4747–4753 (2023)
Javadpour, A., Ja’fari, F., Taleb, T., Benzaïd, C.: Reinforcement learning-based slice isolation against DDoS attacks in beyond 5G networks. IEEE Trans. Netw. Serv. Manage. 20(3), 3930–3946 (2023)
Bekkouche, R., Omar, M., Langar, R.: Securing 5G network slices with adaptive machine learning models as-a-service: a novel approach. In: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, pp. 4754–4759 (2023)
Acknowledgments
This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. RS-2021-II210796, Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Park, J., Kim, J., Lee, JH. (2025). Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. In: Lee, JH., Emura, K., Lee, S. (eds) Information Security Applications. WISA 2024. Lecture Notes in Computer Science, vol 15499. Springer, Singapore. https://doi.org/10.1007/978-981-96-1624-4_9
Download citation
DOI: https://doi.org/10.1007/978-981-96-1624-4_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-1623-7
Online ISBN: 978-981-96-1624-4
eBook Packages: Computer ScienceComputer Science (R0)