Security controls roles in network slicing management and orchestration

Tomasz Wichary

supervisor: Jordi Mongay Batalla



The network slicing concept requires the main key objectives: integrity and confidentiality of the data in the slice and ensure the slice availability in the whole network. When it attaches security to the slice, it turns out that it is a dynamic process that requires robust management and orchestration.

The author in this research work aims to deliver a security model in the context of network slicing. The network slice controller needs to understand how to define and describe the resources from high to low layers of the network. Therefore, the crucial security challenge is to mitigate attacks at different levels due to weak resource isolation levels. The way to mitigate the vulnerabilities mentioned above is to activate security controls. The author, during research, classified them as easy to develop based on the current standards and security trends. The classification is guided by isolating resources at different levels and fair resource allocations to respond to DDoS attacks without service degradation. In this context, the proposed isolation level model better describes and structured security controls and attributes representing security constraints.

The presented isolation classes and classification based on security domains in conjunction with hierarchical management and orchestration allow a better understanding of security needs and select proper security controls for the whole end-to-end network slice.