{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:34Z","timestamp":1750221034370,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science and Engineering Research Board (SERB) Department of Science and Technology (DST) New Delhi","award":["SB\/S2\/JCB-008\/2016"],"award-info":[{"award-number":["SB\/S2\/JCB-008\/2016"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3242102.3242135","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:34:05Z","timestamp":1540582445000},"page":"249-253","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["A Novel Protocol for Securing Network Slice Component Association and Slice Isolation in 5G Networks"],"prefix":"10.1145","author":[{"given":"Vipin N.","family":"Sathi","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]},{"given":"Manikantan","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]},{"given":"Prabhu K.","family":"Thiruvasagam","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]},{"given":"Siva Ram Murthy","family":"Chebiyyam","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ETSI GS NFV-SEC 001. 2014. Network Functions Virtualisation (NFV); NFV Security;Problem Statement. http:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SEC\/001_099\/001\/01.01.01_60\/gs_NFV-SEC001v010101p.pdf  ETSI GS NFV-SEC 001. 2014. Network Functions Virtualisation (NFV); NFV Security;Problem Statement. http:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SEC\/001_099\/001\/01.01.01_60\/gs_NFV-SEC001v010101p.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"5GPP Architecture Working Group. 2017. View on 5G Architecture Version 2.0 . 5G Architecture White Paper (Dec 2017).  5GPP Architecture Working Group. 2017. View on 5G Architecture Version 2.0 . 5G Architecture White Paper (Dec 2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"NGMN Alliance. 2016. Description of Network Slicing Concept NGMN 5G P1. https:\/\/www.ngmn.org\/fileadmin\/user_upload\/161010_NGMN_Network_Slicing_framework_v1.0.8.pdf  NGMN Alliance. 2016. Description of Network Slicing Concept NGMN 5G P1. https:\/\/www.ngmn.org\/fileadmin\/user_upload\/161010_NGMN_Network_Slicing_framework_v1.0.8.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600951"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600899"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Mutual Heterogeneous Signcryption Schemes for 5GNetwork Slicings","volume":"6","author":"Liu J.","year":"2018","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_8_1","first-page":"3","article-title":"Efficient and Secure Service-OrientedAuthentication Supporting Network Slicing for 5G-Enabled IoT","volume":"36","author":"Ni J.","year":"2018","journal-title":"IEEE Journal on Selected Areas inCommunications"},{"key":"e_1_3_2_1_9_1","unstructured":"NOKIA. 2017. Security challenges and opportunities for 5G mobilenetworks. https:\/\/onestore.nokia.com\/asset\/201049\/Nokia_5G_Security_White_Paper_EN.pdf  NOKIA. 2017. Security challenges and opportunities for 5G mobilenetworks. https:\/\/onestore.nokia.com\/asset\/201049\/Nokia_5G_Security_White_Paper_EN.pdf"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502487"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600942"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905337"}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal QC Canada","acronym":"MSWIM '18"},"container-title":["Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242135","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242102.3242135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:36Z","timestamp":1750207416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":12,"alternative-id":["10.1145\/3242102.3242135","10.1145\/3242102"],"URL":"https:\/\/doi.org\/10.1145\/3242102.3242135","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}