{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:02Z","timestamp":1750309502808,"version":"3.41.0"},"reference-count":42,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T00:00:00Z","timestamp":1726531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science and Engineering Research Board, New Delhi, India","award":["JBR\/2021\/000005"],"award-info":[{"award-number":["JBR\/2021\/000005"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:p>\n            G networks can offer network slices customized according to the demands of the services to enhance the quality of their users\u2019 experience. The time for selecting an appropriate network slice to facilitate traffic flow between users and services by the core network functions in 5G networks is crucial for services such as emergency service and ultra-reliable low latency services. Therefore, we propose a distributed slice selection architecture for 5G and beyond networks to reduce the waiting time for starting services for users. The proposed architecture distributes slice selection function\u00a0(SSF) to the edge of the network. The networks have to ensure stealthy slice selection attack\u00a0(S3 attack) free operation, as moving the SSF to the edge increases attack surface. Attackers can launch S3 attack by manipulating the slice selection decisions of SSFs distributed in the network edge. The S3 attacker intentionally maps service requests from users to inappropriate network slices to damage cloud radio access network utilization and the quality of experience of users. In this article, we also present a countermeasure to tackle the S3 attack using a novel protocol called\n            <jats:italic>VACCINE<\/jats:italic>\n            (\n            <jats:underline>v<\/jats:underline>\n            erifi\n            <jats:underline>a<\/jats:underline>\n            ble priva\n            <jats:underline>c<\/jats:underline>\n            y-preserving proto\n            <jats:underline>c<\/jats:underline>\n            ol for sl\n            <jats:underline>i<\/jats:underline>\n            ce selectio\n            <jats:underline>n<\/jats:underline>\n            in 5G and beyond n\n            <jats:underline>e<\/jats:underline>\n            tworks). VACCINE also ensures privacy-preserving slice selection by the SSFs to prevent traffic analysis attacks. We prove the chosen-ciphertext attack security strength of VACCINE and also compare the computational cost of VACCINE with other related protocols.\n          <\/jats:p>","DOI":"10.1145\/3686152","type":"journal-article","created":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T11:14:15Z","timestamp":1722683655000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Boost Your Immunity: VACCINE for Preventing a Novel Stealthy Slice Selection Attack in 5G and Beyond"],"prefix":"10.1145","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8508-0211","authenticated-orcid":false,"given":"Vipin","family":"N. sathi","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1032-8857","authenticated-orcid":false,"given":"C Siva Ram","family":"Murthy","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]}],"member":"320","published-online":{"date-parts":[[2024,9,17]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"193","volume-title":"Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN\u201917)","author":"Ahmad I.","year":"2017","unstructured":"I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, and A. Gurtov. 2017. 5G Security: Analysis of threats and solutions. In Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN\u201917). 193\u2013199."},{"key":"e_1_3_1_3_2","unstructured":"Award Solutions. 2019. Network Slicing | Webinar. Retrieved August 5 2024 from https:\/\/www.youtube.com\/watch?v=oNtZtseutQ0"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106984"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_3_1_6_2","first-page":"185","article-title":"Chosen-ciphertext secure proxy re-encryption","author":"Canetti Ran","year":"2007","unstructured":"Ran Canetti and Susan Hohenberger. 2007. Chosen-ciphertext secure proxy re-encryption. In Proceedings of the ACM Conference on Computer and Communications Security. 185\u2013194.","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2951818"},{"key":"e_1_3_1_8_2","first-page":"316","volume-title":"Proceedings of the International Conference on Cryptology in Africa","author":"Chow Sherman S. M.","year":"2010","unstructured":"Sherman S. M. Chow, Jian Weng, Yanjiang Yang, and Robert H. Deng. 2010. Efficient unidirectional proxy re-encryption. In Proceedings of the International Conference on Cryptology in Africa. 316\u2013332."},{"key":"e_1_3_1_9_2","unstructured":"Cheng-Kang Chu and Wen-Guey Tzeng. 2007. Identity-based proxy re-encryption without random oracles. In Information Security. Lecture Notes in Computer Science Vol. 4779. Springer 189\u2013202."},{"key":"e_1_3_1_10_2","first-page":"850","volume-title":"Proceedings of the IEEE Symposium on Computers and Communications (ISCC\u201911)","author":"Caro Angelo De","year":"2011","unstructured":"Angelo De Caro and Vincenzo Iovino. 2011. JPBC: Java pairing based cryptography. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC\u201911). 850\u2013855."},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","first-page":"102638","DOI":"10.1016\/j.jnca.2020.102638","article-title":"A comprehensive survey on resource allocation for CRAN in 5G and beyond networks","author":"Ejaz Waleed","year":"2020","unstructured":"Waleed Ejaz, Shree K. Sharma, Salman Saadat, Muhammad Naeem, Alagan Anpalagan, and Naveed Ahmad Chughtai. 2020. A comprehensive survey on resource allocation for CRAN in 5G and beyond networks. Journal of Network and Computer Applications 160 (2020), 102638.","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2793859"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Guiseppe Ateniese Karyn Benson and Susan Hohenberger. 2009. Key-private proxy re-encryption. In Topics in Cryptology\u2014CT-RSA 2009. Lecture Notes in Computer Science Vol. 5473. Springer 279\u2013294.","DOI":"10.1007\/978-3-642-00862-7_19"},{"key":"e_1_3_1_14_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","article-title":"Improved proxy re-encryption schemes with applications to secure distributed storage","volume":"9","author":"Hohenberger Susan","year":"2006","unstructured":"Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. 2006. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security 9, 1 (2006), 1\u201330.","journal-title":"ACM Transactions on Information and System Security"},{"key":"e_1_3_1_15_2","first-page":"1","volume-title":"Proceedings of the International Conference on Network and Service Management (CNSM\u201917)","author":"Harutyunyan D.","year":"2017","unstructured":"D. Harutyunyan and R. Riggio. 2017. Flexible functional split in 5G networks. In Proceedings of the International Conference on Network and Service Management (CNSM\u201917). 1\u20139."},{"key":"e_1_3_1_16_2","first-page":"1","volume-title":"Proceedings of the IEEE Vehicular Technology Conference","author":"Hirayama H.","year":"2019","unstructured":"H. Hirayama, Y. Tsukamoto, S. Nanba, and K. Nishimura. 2019. RAN slicing in multi-CU\/DU architecture for 5G services. In Proceedings of the IEEE Vehicular Technology Conference. 1\u20135."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2933899"},{"key":"e_1_3_1_18_2","first-page":"1","volume-title":"Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC\u201918)","author":"Khettab Y.","year":"2018","unstructured":"Y. Khettab, M. Bagaa, D. L. C. Dutra, T. Taleb, and N. Toumi. 2018. Virtual security as a service for 5G verticals. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC\u201918). 1\u20136."},{"key":"e_1_3_1_19_2","first-page":"464","volume-title":"Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P\u201919)","author":"Koutsos A.","year":"2019","unstructured":"A. Koutsos. 2019. The 5G-AKA authentication protocol privacy. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P\u201919). 464\u2013479."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2828002"},{"key":"e_1_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Beno\u0131t Libert and Damien Vergnaud. 2008. Tracing malicious proxies in proxy re-encryption. In Pairing-Based Cryptography\u2014Pairing 2008. Lecture Notes in Computer Science Vol. 5209. Springer 332\u2013353.","DOI":"10.1007\/978-3-540-85538-5_22"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Beno\u0131t Libert and Damien Vergnaud. 2008. Unidirectional chosen-ciphertext secure proxy re-encryption. In Public Key Cryptography\u2014PKC 2008. Lecture Notes in Computer Science Vol. 4939. Springer 360\u2013379.","DOI":"10.1007\/978-3-540-78440-1_21"},{"key":"e_1_3_1_23_2","article-title":"Inter-slice mobility management in 5G: Motivations, standard principles, challenges and research directions","author":"Mohtasim S. Muhammad","year":"2020","unstructured":"S. Muhammad Mohtasim, B. Carlos J, J. Dhammika, and T. Yu-Chu. 2020. Inter-slice mobility management in 5G: Motivations, standard principles, challenges and research directions. arXiv preprint arXiv:2003.11343 (2020).","journal-title":"arXiv preprint arXiv:2003.11343"},{"key":"e_1_3_1_24_2","unstructured":"NGMN Alliance. 2016. 5G Security Recommendations Package #1. NGMN."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815418"},{"key":"e_1_3_1_26_2","first-page":"1","volume-title":"Proceedings of the IEEE International Conference on Communications (ICC\u201919)","author":"Ojaghi B.","year":"2019","unstructured":"B. Ojaghi, F. Adelantado, E. Kartsakli, A. Antonopoulos, and C. Verikoukis. 2019. Sliced-RAN: Joint slicing and functional split in future 5G radio access networks. In Proceedings of the IEEE International Conference on Communications (ICC\u201919). 1\u20136."},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2997702"},{"key":"e_1_3_1_28_2","first-page":"111","volume-title":"Proceedings of the Cryptographers\u2019 Track at the RSA Conference","author":"Pointcheval David","year":"2016","unstructured":"David Pointcheval and Olivier Sanders. 2016. Short randomizable signatures. In Proceedings of the Cryptographers\u2019 Track at the RSA Conference. 111\u2013126."},{"key":"e_1_3_1_29_2","unstructured":"3GPP. 2020. 3GPP TS 23.502:Procedures for the 5G System; Stage 2 Release 16. Rev. V16.4.0. 3GPP."},{"key":"e_1_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Robert H. Deng Jian Weng Shengli Liu and Kefei Chen. 2008. Chosen-ciphertext secure proxy re-encryption without pairings. In Cryptology and Network Security. Lecture Notes in Computer Science Vol. 5339. Springer 1\u201317.","DOI":"10.1007\/978-3-540-89641-8_1"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2908351"},{"key":"e_1_3_1_32_2","first-page":"82","volume-title":"Proceedings of the IEEE Conference on Communications and Network Security (CNS\u201919)","author":"Sattar D.","year":"2019","unstructured":"D. Sattar and A. Matrawy. 2019. Towards secure slicing: Using slice isolation to mitigate DDoS attacks on 5G core network slices. In Proceedings of the IEEE Conference on Communications and Network Security (CNS\u201919). 82\u201390."},{"key":"e_1_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Jun Shao and Zhenfu Cao. 2009. CCA-secure proxy re-encryption without pairings. In Public Key Cryptography\u2014PKC 2009. Springer 357\u2013376.","DOI":"10.1007\/978-3-642-00468-1_20"},{"key":"e_1_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Susan Hohenberger Guy N. Rothblum Abhi Shelat and Vinod Vaikuntanathan. 2007. Securely obfuscating re-encryption. In Theory of Cryptography. Lecture Notes in Computer Science Vol. 4392. Springer 233\u2013252.","DOI":"10.1007\/978-3-540-70936-7_13"},{"key":"e_1_3_1_35_2","unstructured":"3GPP. 2020. 3GPP TS 23.501:System Architecture for the 5G System; Stage 2 Release 16. Rev. V16.4.0. 3GPP."},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2717852"},{"key":"e_1_3_1_37_2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-3-540-68914-0_4","volume-title":"Proceedings of the International Conference on Applied Cryptography and Network Security","author":"Tsang Patrick P.","year":"2008","unstructured":"Patrick P. Tsang and Sean W. Smith. 2008. PPAA: Peer-to-peer anonymous authentication. In Proceedings of the International Conference on Applied Cryptography and Network Security. 55\u201374."},{"key":"e_1_3_1_38_2","article-title":"Distributed slice mobility attack: A novel targeted attack against network slices of 5G networks","author":"Sathi Vipin N.","year":"2020","unstructured":"Vipin N. Sathi and C. Siva Ram Murthy. 2020. Distributed slice mobility attack: A novel targeted attack against network slices of 5G networks. IEEE Networking Letters. Published Online, December 15, 2020.","journal-title":"IEEE Networking Letters."},{"key":"e_1_3_1_39_2","article-title":"Novel protocols to mitigate network slice topology learning attacks and protect privacy of users\u2019 service access behavior in softwarized 5G networks","author":"Sathi Vipin N.","year":"2020","unstructured":"Vipin N. Sathi, S. Manikantan, K. T. Prabhu, and C. Siva Ram Murthy. 2020. Novel protocols to mitigate network slice topology learning attacks and protect privacy of users\u2019 service access behavior in softwarized 5G networks. IEEE Transactions on Dependable and Secure Computing. Published Online, January 23, 2020.","journal-title":"IEEE Transactions on Dependable and Secure Computing."},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3242102.3242135"},{"key":"e_1_3_1_41_2","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/LWC.2021.3070322","article-title":"DSM attack resistant slice selection in 5G","author":"Sathi Vipin N.","year":"2021","unstructured":"Vipin N. Sathi and C. Siva Ram Murthy. 2021. DSM attack resistant slice selection in 5G. IEEE Wireless Communications Letters 10, 7 (2021), 1469\u20131473.","journal-title":"IEEE Wireless Communications Letters"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2842189"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800234"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686152","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:50Z","timestamp":1750295870000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,17]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1145\/3686152"],"URL":"https:\/\/doi.org\/10.1145\/3686152","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2024,9,17]]},"assertion":[{"value":"2023-02-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}