• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2023, Volume: 16, Issue: Special Issue 1, Pages: 179-191

Original Article

Enhancing Secured Network Slicer for Cloud Security Systems

Received Date:23 January 2023, Accepted Date:09 June 2023, Published Date:13 September 2023

Abstract

Objectives: The mobile’s Ad-hoc 5G networks are now used in almost every sector. The increasing usage of mobile Ad-hoc 5G networks may be used not only on personal computers but also on mobile phones, tablets, and laptops due to their low cost and simplicity. Developing a slicing approach to security for mobile Ad-hoc 5G/6G networks and their wired equivalents are proposed. If the attacker must first get physical access to the cable system or terminal devices on the mobile Ad-hoc 5G networks, then a standard receiver put within the network range on the mobile Ad-hoc 5G networks will be granted authorization. Methods: The 5G network slicing design allows the multiplexing of virtualized and separate logical networks on the same physical network infrastructure. Each network slice is a self-contained, end-to-end network designed to meet the unique needs of a certain application. Mobile Ad-hoc 5G data encryption is handled using the Temporal Key Integrity Protocol (TKIP), which employs the same encryption method as RC4 as WEP but, unlike WEP, utilizes static keys (i.e., keys change frequently). Findings: 5G network slicing enables mobile network operators to build a virtual border for a single customer or range of devices. Only approved devices are permitted to connect to the segmented network, reducing this attack vector significantly. Slicing may be used as part of a private network to provide an extra layer of security, or on a public network to add a security layer without incurring the costs associated with maintaining the network infrastructure. There is a notion of shared security responsibility when network slicing is employed on public mobile networks. Comparable to cloud computing, where network operators are responsible for safeguarding the infrastructure and the business handles the software security layer. Future 6G network security planning must take into account the new possibilities, risks, and trust paradigms presented by the development of cellular communication offered by 5G. Despite changes in communication implementation, the slicing approach to security for mobile Ad-hoc 5G/6G networks and their wired equivalents is comparable to the proposed model. This model focuses more on the needs for authentication of mobile Ad-hoc 5G clients and access points,as well as maintaining the confidentiality and integrity of the data shared, in order to secure information on mobile Ad-hoc 5G/6G networks. Novelty: The signals of Mobile Ad-hoc 5G devices have a highly complicated structure and a broad spectrum, so standard radio surveillance equipment cannot detect these signals and the nearby Mobile Ad-hoc 5G devices. The experiment has demonstrated that reliable detection of a Mobile Ad-hoc 5G signal by contemporary radio surveillance systems within a broad frequency band is only possible based on an energy characteristic in the presence of parallel analytics bands of several tens of megahertz width at a minimum of 400 velocities and its ranges MHz/s and in the adjacent field zone.

Keywords: Cloud Security; Mobile Adhoc; 5G networks; Personal Computers; Security; Terminal device; Slicing approach

References

  1. Subedi P, Alsadoon A, Prasad PWC, Rehman S, Giweli N, Imran M, et al. Network slicing: a next generation 5G perspective. EURASIP Journal on Wireless Communications and Networking. 2021;2021(102):1–26. Available from: https://doi.org/10.1186/s13638-021-01983-7
  2. Lv J, Man D, Yang W, Gong L, Du X, Yu M. Robust Device-Free Intrusion Detection Using Physical Layer Information of WiFi Signals. Applied Sciences. 2019;9(1):1–17. Available from: https://doi.org/10.3390/app9010175
  3. Bhardwaj A, El-Ocla H. Multipath Routing Protocol Using Genetic Algorithm in Mobile Ad Hoc Networks. IEEE Access. 2020;8:177534–177548. Available from: https://doi.org/10.1109/ACCESS.2020.3027043
  4. Ande R, Adebisi B, Hammoudeh M, Saleem J. Internet of Things: Evolution and technologies from a security perspective. Sustainable Cities and Society. 2020;54:101728. Available from: https://doi.org/10.1016/j.scs.2019.101728
  5. Haque ME, Baroudi U. Dynamic energy efficient routing protocol in wireless sensor networks. Wireless Networks. 2020;26:3715–3733. Available from: https://doi.org/10.1007/s11276-020-02290-7
  6. Zhang Y, Wu A, Chen Z, Zheng D, Cao J, Jiang X. Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. Computer Communications. 2021;166:165–173. Available from: https://doi.org/10.1016/j.comcom.2020.12.014
  7. Kourtis MAA, Anagnostopoulos T, Kuklilski S, Wierzbicki M, Oikonomakis A, Xilouris G, et al. 5G Network Slicing Enabling Edge Services. In: 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). Leganes, Spain, 10-12 November 2020. IEEE. .
  8. Serckumecka A, Medeiros I, Ferreira B, Bessani A. SLICER: Safe Long-Term Cloud Event Archival. In: 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC). Kyoto, Japan, 01-03 December 2019. IEEE. .
  9. Zhang S. An Overview of Network Slicing for 5G. IEEE Wireless Communications. 2019;26(3):111–117.
  10. Sun G, Xiong K, Boateng GO, Liu G, Jiang W. Resource slicing and customization in RAN with dueling deep Q-Network. Journal of Network and Computer Applications. 2020;157:102573. Available from: https://doi.org/10.1016/j.jnca.2020.102573
  11. Esmaeily A, Kralevska K, Gligoroski D. A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G. In: 2020 6th IEEE Conference on Network Softwarization (NetSoft). Ghent, Belgium, 29 June 2020 - 03 July 2020. IEEE. p. 29–35.
  12. Hussain R, Hussain F, Zeadally S. Integration of VANET and 5G Security: A review of design and implementation issues. Future Generation Computer Systems. 2019;101:843–864. Available from: https://doi.org/10.1016/j.future.2019.07.006
  13. Butt UA, Mehmood M, Shah SBH, Amin R, Shaukat MW, Raza SM, et al. A Review of Machine Learning Algorithms for Cloud Computing Security. Electronics. 2020;9(9):1–25. Available from: https://doi.org/10.3390/electronics9091379
  14. Barakabitze AA, Ahmad A, Mijumbi R, Hines A. 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Computer Networks. 2020;167:1–40. Available from: https://doi.org/10.1016/j.comnet.2019.106984
  15. Cheng X, Wu Y, Min G, Zomaya AY, Fang X. Safeguard Network Slicing in 5G: A Learning Augmented Optimization Approach. IEEE Journal on Selected Areas in Communications. 2020;38(7):1600–1613. Available from: https://doi.org/10.1109/JSAC.2020.2999696
  16. Wichary T, Batalla JM, Mavromoustakis CX, Żurek J, Mastorakis G. Network Slicing Security Controls and Assurance for Verticals. Electronics. 2022;11(2):1–29. Available from: https://doi.org/10.3390/electronics11020222
  17. Khan AA, Abolhasan M, Ni W, Lipman J, Jamalipour A. An End-to-End (E2E) Network Slicing Framework for 5G Vehicular Ad-Hoc Networks. IEEE Transactions on Vehicular Technology. 2021;70(7):7103–7112. Available from: https://doi.org/10.1109/TVT.2021.3084735
  18. Hamdi MM, Audah L, Rashid SA, Mohammed AH, Alani S, Mustafa AS. A review of applications, characteristics and challenges in vehicular ad hoc networks (VANETs) In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). Ankara, Turkey, 26-28 June 2020. IEEE. p. 1–7.
  19. Mazurczyk W, Bisson P, Jover RP, Nakao K, Cabaj K. Challenges and Novel Solutions for 5G Network Security, Privacy and Trust. IEEE Wireless Communications. 2020;27(4):6–7. Available from: https://doi.org/10.1109/MWC.2020.9170261

Copyright

© 2023 Hnamte et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.