Security of 5G Network Slicing: Identifying Vulnerabilities in The Virtualization of Mobile Network

Authors

  • Prof. Madya Ts. Dr. Mohamad Fadli bin Zolkipli School of Computing, University Utara Malaysia, Malaysia Author
  • Ihab Hussein Al-Musawi School of Computing, University Utara Malaysia, Malaysia Author

DOI:

https://doi.org/10.32628/IJSRST2613356

Abstract

5G network slicing is currently an important element of modern mobile networks' architecture. It lets many virtualised logical networks operate on the same physical infrastructure. This model supports a wide range of service requirements, consisting of enhanced Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communications (URLLC), and massive Machine-Type Communications (mMTC). It provides this by employing Software-Defined Networking (SDN), Network Function Virtualisation (NFV), cloud/edge computing, and programmable orchestration. Even though virtualisation has these advantages, it also presents serious security issues through creating the attack surface greater and placing slices at risk because of vulnerable isolation, insecure orchestration, authentication failures, shared-resource exploitation, and inter-slice attacks. This study investigates the main vulnerabilities influencing the security of 5G network slicing using a qualitative literature review of existing research. The investigation shows that vulnerabilities in SDN/NFV-enabled environments may threaten confidentiality, integrity, and availability over the entire slice lifecycle. The research suggests that traditional static security measures are not sufficient for highly dynamic and multi-tenant 5G ecosystems. Accordingly, to protect a system effectively, it requires security frameworks that are properly integrated, adaptable, and cross-layered. These should include strong slice isolation, secure management and orchestration, continuous monitoring, and smart defense mechanisms.

Downloads

Download data is not yet available.

References

Abduh, E., Al-Fuhaidi, B., & Alqasemi, F. (2024). Authentication Techniques in 5G Network Slicing Security: A Survey. University of Science and Technology Journal for Engineering and Technology, 2, 17–36. https://doi.org/10.59222/ustjet.2.2.2

Abood, M. J. K., & Abdul-Majeed, G. H. (2023). Classification of network slicing threats based on slicing enablers: A survey. International Journal of Intelligent Networks, 4, 103–112. https://doi.org/https://doi.org/10.1016/j.ijin.2023.04.002

Allaw, Z., Zein, O., & Ahmad, A.-M. (2025). Cross-Layer Security for 5G/6G Network Slices: An SDN, NFV, and AI-Based Hybrid Framework. Sensors, 25, 3335. https://doi.org/10.3390/s25113335

Alotaibi, D. (2021). Survey on Network Slice Isolation in 5G Networks: Fundamental Challenges. Procedia Computer Science, 182, 38–45. https://doi.org/https://doi.org/10.1016/j.procs.2021.02.006

Barakabitze, A., Ahmad, A., Hines, A., & Mijumbi, R. (2019). 5G Network Slicing using SDN and NFV: A Survey of Taxonomy, Architectures and Future Challenges. Computer Networks, 167, 106984. https://doi.org/10.1016/j.comnet.2019.106984

Barakabitze, A. A., Ahmad, A., Mijumbi, R., & Hines, A. (2020). 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Computer Networks, 167, 106984. https://doi.org/https://doi.org/10.1016/j.comnet.2019.106984

Diallo, E.-h., Agha, K. A., & Martin, S. (2025). TRADE-5G: A blockchain-based transparent and secure resource exchange for 5G network slicing. Blockchain: Research and Applications, 6(1), 100246. https://doi.org/https://doi.org/10.1016/j.bcra.2024.100246

Dias, J., Pinto, P., Santos, R., & Malta, S. (2025). 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches. Sensors, 25, 3940. https://doi.org/10.3390/s25133940

Gabla, E. S., Enyejo, L. A., & Uche James, U. (2025). Investigating 5G Network Slicing Security Vulnerabilities Using Artificial Intelligence–Driven Intrusion Detection for Telecommunication Resilience. World Journal of Advanced Engineering Technology and Sciences, 17, 098–112. https://doi.org/10.30574/wjaets.2025.17.2.1431

Knieps, G. (2024a). Internet of Things, critical infrastructures, and the governance of cybersecurity in 5G network slicing. Telecommunications Policy, 48(10), 102867. https://doi.org/https://doi.org/10.1016/j.telpol.2024.102867

Knieps, G. (2024b). Internet of Things, critical infrastructures, and the governance of cybersecurity in 5G network slicing. Telecommunications Policy, 48(10). https://doi.org/10.1016/j.telpol.2024.102867

Olimid, R., & Nencioni, G. (2020). 5G Network Slicing: A Security Overview. IEEE Access, PP, 1–1. https://doi.org/10.1109/ACCESS.2020.2997702

Ordóñez, J., Ameigeiras, P., Lopez, D., Ramos-Munoz, J., Lorca, J., & Folgueira, J. (2017). Network Slicing for 5G with SDN/NFV: Concepts, Architectures and Challenges. IEEE Communications Magazine, 55. https://doi.org/10.1109/MCOM.2017.1600935

Park, K., Sung, S., Kim, H., & Jung, J.-i. (2023). Technology trends and challenges in SDN and service assurance for end-to-end network slicing. Computer Networks, 234, 109908. https://doi.org/https://doi.org/10.1016/j.comnet.2023.109908

Rafiq, W., Barai, J., Fapojuwo, A., & Krishnamurthy, D. (2024). A Survey on Beyond 5G Network Slicing for Smart Cities Applications. IEEE Communications Surveys & Tutorials, PP, 1–1. https://doi.org/10.1109/COMST.2024.3410295

Singh, V., Singh, M., Hegde, S., & Gupta, M. (2024). Security in 5G Network Slices: Concerns and Opportunities. IEEE Access, PP, 1–1. https://doi.org/10.1109/ACCESS.2024.3386632

Wichary, T., Batalla, J., Mavromoustakis, C., Żurek, J., & Mastorakis, G. (2022). Network Slicing Security Controls and Assurance for Verticals. Electronics, 11, 222. https://doi.org/10.3390/electronics11020222

Wong, S., Han, B., & Schotten, H. (2022a). 5G Network Slice Isolation. Network, 2, 153–167. https://doi.org/10.3390/network2010011

Wong, S., Han, B., & Schotten, H. (2022b). 5G Network Slice Isolation. https://doi.org/10.48550/arXiv.2203.01590

Downloads

Published

12-04-2026

Issue

Section

Research Articles

How to Cite

[1]
Prof. Madya Ts. Dr. Mohamad Fadli bin Zolkipli and Ihab Hussein Al-Musawi, Trans., “Security of 5G Network Slicing: Identifying Vulnerabilities in The Virtualization of Mobile Network”, Int J Sci Res Sci & Technol, vol. 13, no. 2, pp. 787–795, Apr. 2026, doi: 10.32628/IJSRST2613356.