{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:40:11Z","timestamp":1778085611378,"version":"3.51.4"},"reference-count":38,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T00:00:00Z","timestamp":1750723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5G, complemented by practical mitigation approaches suitable for multi-tenant environments. The classification depicts specific attacks and categorizes vulnerabilities across layers such as orchestration, virtualization, and inter-slice communication. Additionally, mitigation strategies are discussed, emphasizing the importance of real-time monitoring and robust access controls. The proposed classification aims to support the development of advanced security mechanisms, including risk assessment models and automated mitigation strategies, tailored to the dynamic and heterogeneous nature of 5G slicing. The findings highlight the need for layered defenses, AI-driven monitoring, and architectural isolation as critical components to enhance the resilience of 5G slicing deployments.<\/jats:p>","DOI":"10.3390\/s25133940","type":"journal-article","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T12:05:40Z","timestamp":1750766740000},"page":"3940","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches"],"prefix":"10.3390","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0015-1283","authenticated-orcid":false,"given":"Jos\u00e9","family":"Dias","sequence":"first","affiliation":[{"name":"ESTG\u2014Instituto Polit\u00e9cnico de Viana do Castelo, 4900 Viana do Castelo, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1856-6101","authenticated-orcid":false,"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[{"name":"ISEP\u2014Instituto Polit\u00e9cnico do Porto, 4249 Porto, Portugal"},{"name":"GECAD\u2014Instituto Superior de Engenharia do Porto, R. Dr. Ant\u00f3nio Bernardino de Almeida, 4249 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2139-5414","authenticated-orcid":false,"given":"Ricardo","family":"Santos","sequence":"additional","affiliation":[{"name":"ESTG\u2014Instituto Polit\u00e9cnico do Porto, 4610 Felgueiras, Portugal"},{"name":"CIICESI, ESTG\u2014Instituto Polit\u00e9cnico do Porto, 4610 Felgueiras, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5274-3733","authenticated-orcid":false,"given":"Silvestre","family":"Malta","sequence":"additional","affiliation":[{"name":"ESTG\u2014Instituto Polit\u00e9cnico de Viana do Castelo, 4900 Viana do Castelo, Portugal"},{"name":"ADiT-LAB\u2014Rua Escola Industrial e Comercial de Nun\u2019\u00c1lvares, N\u00ba34, 4900 Viana do Castelo, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/MWC.2019.1800234","article-title":"An Overview of Network Slicing for 5G","volume":"26","author":"Zhang","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.procs.2021.02.006","article-title":"Survey on Network Slice Isolation in 5G Networks: Fundamental Challenges","volume":"182","author":"Alotaibi","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_3","first-page":"17","article-title":"Authentication Techniques in 5G Network Slicing Security: A Survey","volume":"2","author":"Abduh","year":"2024","journal-title":"Univ. Sci. Technol. J. Eng. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Gao, S., Lin, R., Fu, Y., Li, H., and Cao, J. (2024). Security threats, requirements and recommendations on creating 5G network slicing system: A survey. Electronics, 13.","DOI":"10.3390\/electronics13101860"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3988","DOI":"10.1109\/TNSM.2024.3416418","article-title":"Blockchain-based secure authentication and authorization framework for robust 5g network slicing","volume":"21","author":"Wijethilaka","year":"2024","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/j.telpol.2018.05.005","article-title":"How disruptive is 5G?","volume":"42","author":"Cave","year":"2018","journal-title":"Telecommun. Policy"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2","DOI":"10.23919\/ETR.2024.10759706","article-title":"The History of Mobile Internet: The Technology Transformation That Changed the Lives of Billions","volume":"2024","author":"Ekelund","year":"2024","journal-title":"Ericsson Technol. Rev."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"12","DOI":"10.63180\/jcsra.thestap.2025.1.2","article-title":"Applying risk analysis for determining threats and countermeasures in workstation domain","volume":"2025","author":"Mousa","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MITP.2017.9","article-title":"Technologies for 5G networks: Challenges and opportunities","volume":"19","author":"Alani","year":"2017","journal-title":"IT Prof."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"55765","DOI":"10.1109\/ACCESS.2018.2872781","article-title":"5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View","volume":"6","author":"Popovski","year":"2018","journal-title":"IEEE Access"},{"key":"ref_11","unstructured":"(2025, January 13). What is 5G?\u2014Westcott Space Cluster, A Growing Nucleus of Space Related Companies. Available online: https:\/\/westcottspacecluster.org.uk\/centres\/future-networks-development-centre\/what-is-5g\/."},{"key":"ref_12","unstructured":"Gaurav, H. (2025, January 13). 5G Network Architecture, 2022. Available online: https:\/\/stl.tech\/blog\/5g-network-architecture\/."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCOMSTD.2018.1700072","article-title":"A survey and an analysis of network slicing in 5G networks","volume":"2","author":"Kaloxylos","year":"2018","journal-title":"IEEE Commun. Stand. Mag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1109\/JLT.2016.2524209","article-title":"Data plane and control architectures for 5G transport networks","volume":"34","author":"Skubic","year":"2016","journal-title":"J. Light. Technol."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Patil, R., Tian, Z., Gurusamy, M., and McCloud, J. (2024). 5G core network control plane: Network security challenges and solution requirements. Comput. Commun., 107982.","DOI":"10.1016\/j.comcom.2024.107982"},{"key":"ref_16","unstructured":"Flinck, H., Sartori, C., Andrianov, A., Mannweiler, C., and Sprecher, N. (2025, January 13). Network Slicing Management and Orchestration. Internet Engineering Task Force, Tech. Rep.. Available online: https:\/\/www.ietf.org\/proceedings\/99\/slides\/slides-99-netslicing-hannu-flinck-network-slicing-management-and-orchestration-00.pdf."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2429","DOI":"10.1109\/COMST.2018.2815638","article-title":"Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions","volume":"20","author":"Afolabi","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.comcom.2023.10.024","article-title":"QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G","volume":"213","author":"Kumar","year":"2024","journal-title":"Comput. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"36009","DOI":"10.1109\/ACCESS.2020.2975072","article-title":"Network slicing: Recent advances, taxonomy, requirements, and open research challenges","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"106984","DOI":"10.1016\/j.comnet.2019.106984","article-title":"5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges","volume":"167","author":"Barakabitze","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"108283","DOI":"10.1016\/j.comnet.2021.108288","article-title":"NFV security survey in 5G networks: A three-dimensional threat taxonomy","volume":"197","author":"Madi","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_22","first-page":"60","article-title":"5G Network Slicing: A Security Overview","volume":"4","author":"Olimid","year":"2020","journal-title":"IEEE Commun. Stand. Mag."},{"key":"ref_23","first-page":"2410","article-title":"Secure5G: A Deep Learning Framework Towards a Secure Network Slicing in 5G and Beyond","volume":"17","author":"Thantharate","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1109\/COMST.2024.3410295","article-title":"A Survey on Beyond 5G Network Slicing for Smart Cities Applications","volume":"27","author":"Rafique","year":"2024","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"104068","DOI":"10.1016\/j.jnca.2024.104068","article-title":"Optimizing 5G network slicing with DRL: Balancing eMBB, URLLC, and mMTC with OMA, NOMA, and RSMA","volume":"234","author":"Malta","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_26","unstructured":"Nerini, M., and Palma, D. (2021, January 17\u201321). 5G Network Slicing for Wi-Fi Networks. Proceedings of the 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM), Bordeaux, France."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"14048","DOI":"10.1109\/ACCESS.2021.3051940","article-title":"Adaptive Network Slicing in Multi-Tenant 5G IoT Networks","volume":"9","author":"Escolar","year":"2021","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"102867","DOI":"10.1016\/j.telpol.2024.102867","article-title":"Internet of Things, critical infrastructures, and the governance of cybersecurity in 5G network slicing","volume":"48","author":"Knieps","year":"2024","journal-title":"Telecommun. Policy"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Gonzalez, A.J., Ordonez-Lucena, J., Helvik, B.E., Nencioni, G., Xie, M., Lopez, D.R., and Gr\u00f8nsund, P. (2020, January 15\u201318). The isolation concept in the 5G network slicing. Proceedings of the 2020 European Conference on Networks and Communications (EuCNC), Dubrovnik, Croatia.","DOI":"10.1109\/EuCNC48522.2020.9200939"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"108802","DOI":"10.1016\/j.comnet.2022.108802","article-title":"A comprehensive survey of vulnerability and information security in SDN","volume":"206","author":"Deb","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Oladejo, S.O., and Falowo, O.E. (2017, January 15\u201318). 5G network slicing: A multi-tenancy scenario. Proceedings of the 2017 Global Wireless Summit (GWS), Cape Town, South Africa.","DOI":"10.1109\/GWS.2017.8300476"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"e4825","DOI":"10.1002\/dac.4825","article-title":"Distributed denial-of-service attack mitigation in network functions virtualization-based 5G networks using management and orchestration","volume":"34","author":"Dalveren","year":"2021","journal-title":"Int. J. Commun. Syst."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Dao, N.N., Tu, N.H., Hoang, T.D., Nguyen, T.H., Nguyen, L.V., Lee, K., Park, L., Na, W., and Cho, S. (2024). A review on new technologies in 3GPP standards for 5G access and beyond. Comput. Netw.","DOI":"10.1016\/j.comnet.2024.110370"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"108052","DOI":"10.1109\/ACCESS.2020.3000662","article-title":"GDPR Interference With Next Generation 5G and IoT Networks","volume":"8","author":"Rizou","year":"2020","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.63180\/jcsra.thestap.2025.1.1","article-title":"Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions","volume":"1","author":"Almuqren","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_36","unstructured":"Security, A. (2025, June 13). Security Research: 5G Network Slicing Vulnerabilities, 2021. Available online: https:\/\/www.enea.com\/insights\/white-paper-slicing-security-in-5g\/."},{"key":"ref_37","unstructured":"Shan, J., Shaik, A., Borgaonkar, R., Park, J.H., Seifert, J.P., and Kim, T. (2021, January 11\u201313). 5Glatte: Mapping the Security Landscape of 5G Device Implementation. Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Online."},{"key":"ref_38","unstructured":"Li, X., Yu, X., Zhang, Y., Guo, Y., Zheng, Z., and Zhou, Z. (2023, January 26\u201330). 5Greplay: Characterizing and Attacking Dynamic Protocol Stack in 5G Standalone Access. Proceedings of the 30th ACM Conference on Computer and Communications Security (CCS \u201923), Copenhagen, Denmark."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/25\/13\/3940\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:58:00Z","timestamp":1760032680000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/25\/13\/3940"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,24]]},"references-count":38,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["s25133940"],"URL":"https:\/\/doi.org\/10.3390\/s25133940","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,24]]}}}