Security of 5G Network Slicing: Identifying Vulnerabilities in The Virtualization of Mobile Network
DOI:
https://doi.org/10.32628/IJSRST2613356Abstract
5G network slicing is currently an important element of modern mobile networks' architecture. It lets many virtualised logical networks operate on the same physical infrastructure. This model supports a wide range of service requirements, consisting of enhanced Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communications (URLLC), and massive Machine-Type Communications (mMTC). It provides this by employing Software-Defined Networking (SDN), Network Function Virtualisation (NFV), cloud/edge computing, and programmable orchestration. Even though virtualisation has these advantages, it also presents serious security issues through creating the attack surface greater and placing slices at risk because of vulnerable isolation, insecure orchestration, authentication failures, shared-resource exploitation, and inter-slice attacks. This study investigates the main vulnerabilities influencing the security of 5G network slicing using a qualitative literature review of existing research. The investigation shows that vulnerabilities in SDN/NFV-enabled environments may threaten confidentiality, integrity, and availability over the entire slice lifecycle. The research suggests that traditional static security measures are not sufficient for highly dynamic and multi-tenant 5G ecosystems. Accordingly, to protect a system effectively, it requires security frameworks that are properly integrated, adaptable, and cross-layered. These should include strong slice isolation, secure management and orchestration, continuous monitoring, and smart defense mechanisms.
Downloads
References
Abduh, E., Al-Fuhaidi, B., & Alqasemi, F. (2024). Authentication Techniques in 5G Network Slicing Security: A Survey. University of Science and Technology Journal for Engineering and Technology, 2, 17–36. https://doi.org/10.59222/ustjet.2.2.2
Abood, M. J. K., & Abdul-Majeed, G. H. (2023). Classification of network slicing threats based on slicing enablers: A survey. International Journal of Intelligent Networks, 4, 103–112. https://doi.org/https://doi.org/10.1016/j.ijin.2023.04.002
Allaw, Z., Zein, O., & Ahmad, A.-M. (2025). Cross-Layer Security for 5G/6G Network Slices: An SDN, NFV, and AI-Based Hybrid Framework. Sensors, 25, 3335. https://doi.org/10.3390/s25113335
Alotaibi, D. (2021). Survey on Network Slice Isolation in 5G Networks: Fundamental Challenges. Procedia Computer Science, 182, 38–45. https://doi.org/https://doi.org/10.1016/j.procs.2021.02.006
Barakabitze, A., Ahmad, A., Hines, A., & Mijumbi, R. (2019). 5G Network Slicing using SDN and NFV: A Survey of Taxonomy, Architectures and Future Challenges. Computer Networks, 167, 106984. https://doi.org/10.1016/j.comnet.2019.106984
Barakabitze, A. A., Ahmad, A., Mijumbi, R., & Hines, A. (2020). 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Computer Networks, 167, 106984. https://doi.org/https://doi.org/10.1016/j.comnet.2019.106984
Diallo, E.-h., Agha, K. A., & Martin, S. (2025). TRADE-5G: A blockchain-based transparent and secure resource exchange for 5G network slicing. Blockchain: Research and Applications, 6(1), 100246. https://doi.org/https://doi.org/10.1016/j.bcra.2024.100246
Dias, J., Pinto, P., Santos, R., & Malta, S. (2025). 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches. Sensors, 25, 3940. https://doi.org/10.3390/s25133940
Gabla, E. S., Enyejo, L. A., & Uche James, U. (2025). Investigating 5G Network Slicing Security Vulnerabilities Using Artificial Intelligence–Driven Intrusion Detection for Telecommunication Resilience. World Journal of Advanced Engineering Technology and Sciences, 17, 098–112. https://doi.org/10.30574/wjaets.2025.17.2.1431
Knieps, G. (2024a). Internet of Things, critical infrastructures, and the governance of cybersecurity in 5G network slicing. Telecommunications Policy, 48(10), 102867. https://doi.org/https://doi.org/10.1016/j.telpol.2024.102867
Knieps, G. (2024b). Internet of Things, critical infrastructures, and the governance of cybersecurity in 5G network slicing. Telecommunications Policy, 48(10). https://doi.org/10.1016/j.telpol.2024.102867
Olimid, R., & Nencioni, G. (2020). 5G Network Slicing: A Security Overview. IEEE Access, PP, 1–1. https://doi.org/10.1109/ACCESS.2020.2997702
Ordóñez, J., Ameigeiras, P., Lopez, D., Ramos-Munoz, J., Lorca, J., & Folgueira, J. (2017). Network Slicing for 5G with SDN/NFV: Concepts, Architectures and Challenges. IEEE Communications Magazine, 55. https://doi.org/10.1109/MCOM.2017.1600935
Park, K., Sung, S., Kim, H., & Jung, J.-i. (2023). Technology trends and challenges in SDN and service assurance for end-to-end network slicing. Computer Networks, 234, 109908. https://doi.org/https://doi.org/10.1016/j.comnet.2023.109908
Rafiq, W., Barai, J., Fapojuwo, A., & Krishnamurthy, D. (2024). A Survey on Beyond 5G Network Slicing for Smart Cities Applications. IEEE Communications Surveys & Tutorials, PP, 1–1. https://doi.org/10.1109/COMST.2024.3410295
Singh, V., Singh, M., Hegde, S., & Gupta, M. (2024). Security in 5G Network Slices: Concerns and Opportunities. IEEE Access, PP, 1–1. https://doi.org/10.1109/ACCESS.2024.3386632
Wichary, T., Batalla, J., Mavromoustakis, C., Żurek, J., & Mastorakis, G. (2022). Network Slicing Security Controls and Assurance for Verticals. Electronics, 11, 222. https://doi.org/10.3390/electronics11020222
Wong, S., Han, B., & Schotten, H. (2022a). 5G Network Slice Isolation. Network, 2, 153–167. https://doi.org/10.3390/network2010011
Wong, S., Han, B., & Schotten, H. (2022b). 5G Network Slice Isolation. https://doi.org/10.48550/arXiv.2203.01590
Downloads
Published
Issue
Section
License
Copyright (c) 2026 International Journal of Scientific Research in Science and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0