{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:26:20Z","timestamp":1764332780214,"version":"3.41.2"},"reference-count":14,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T00:00:00Z","timestamp":1567382400000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["POCI\u201001\u20100247\u2010FEDER\u2010021949"],"award-info":[{"award-number":["POCI\u201001\u20100247\u2010FEDER\u2010021949"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["PTDC\/EEI\u2010TEL\/30685\/2017"],"award-info":[{"award-number":["PTDC\/EEI\u2010TEL\/30685\/2017"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2019,9]]},"abstract":"<jats:p>Network slicing emerges as a key technology in next generation networks, boosted by the integration of software\u2010defined networking and network functions virtualization. However, while allowing resource sharing among multiple tenants, such networks must also ensure the security requirements needed for the scenarios they are employed. This letter presents the leading security challenges on the use of network slices at the packet core, the solutions that academy and industry are proposing to address them, pointing out some directions that should be considered.<\/jats:p>","DOI":"10.1002\/itl2.125","type":"journal-article","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T12:40:03Z","timestamp":1564404003000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Network slicing security: Challenges and directions"],"prefix":"10.1002","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4566-0198","authenticated-orcid":false,"given":"Vitor A.","family":"Cunha","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es  Aveiro Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6070-7532","authenticated-orcid":false,"given":"Eduardo","family":"da Silva","sequence":"additional","affiliation":[{"name":"Department of Informatics Catarinense Federal Institute  Araquari Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2975-9913","authenticated-orcid":false,"given":"Marcio B.","family":"de Carvalho","sequence":"additional","affiliation":[{"name":"Institute of Informatics Federal University of Rio Grande do Sul  Porto Alegre Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7484-1027","authenticated-orcid":false,"given":"Daniel","family":"Corujo","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es  Aveiro Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5029-6191","authenticated-orcid":false,"given":"Joao P.","family":"Barraca","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es  Aveiro Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5848-2802","authenticated-orcid":false,"given":"Diogo","family":"Gomes","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es  Aveiro Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8956-8660","authenticated-orcid":false,"given":"Lisandro Z.","family":"Granville","sequence":"additional","affiliation":[{"name":"Institute of Informatics Federal University of Rio Grande do Sul  Porto Alegre Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0107-6253","authenticated-orcid":false,"given":"Rui L.","family":"Aguiar","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es  Aveiro Portugal"}]}],"member":"311","published-online":{"date-parts":[[2019,9,2]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.8493125"},{"volume-title":"An Introduction to Network Slicing","year":"2017","author":"GSM A","key":"e_1_2_6_3_1"},{"key":"e_1_2_6_4_1","unstructured":"GalisA MakhijaniK.Network slicing landscape:a holistic architectural approach orchestration and management with applicability in Mobile and fixed networks and clouds (tutorials). Paper presented at: Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops (NetSoft 2018). IEEE;2018; Montreal Canada."},{"issue":"2","key":"e_1_2_6_5_1","first-page":"1","article-title":"Towards constructive approach to end\u2010to\u2010end slice isolation in 5G networks","volume":"2018","author":"Kotulski Z","year":"2018","journal-title":"EURASIP J Inf Secur"},{"volume-title":"5G Security Recommendations Package #2: Network Slicing","year":"2016","author":"NGMN Alliance","key":"e_1_2_6_6_1"},{"key":"e_1_2_6_7_1","unstructured":"ETSI NFV. Network functions virtualisation (NFV); NFV security; problem statement. ETSI GS NFV\u2010SEC\u2010001;2014."},{"key":"e_1_2_6_8_1","first-page":"144","volume-title":"Advances in Intelligent Systems and Computing","author":"Mareca P","year":"2018"},{"key":"e_1_2_6_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2815567"},{"key":"e_1_2_6_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815418"},{"key":"e_1_2_6_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2797102"},{"key":"e_1_2_6_12_1","doi-asserted-by":"crossref","unstructured":"EhrlichM WisniewskiL TrsekH MahrenholzD JasperneiteJ. Automatic mapping of cyber security requirements to support network slicing in software\u2010defined networks. Paper presented at: Proceedings of the 22nd IEEE ETFA; IEEE Industrial Electronics Society;2017; Limassol Cyprus","DOI":"10.1109\/ETFA.2017.8247728"},{"key":"e_1_2_6_13_1","unstructured":"CanellaC Van BulckJ SchwarzM et al. A systematic evaluation of transient execution attacks and defenses.arXiv 1811.05441 2018."},{"key":"e_1_2_6_14_1","unstructured":"HutchinsEM CloppertMJ AminRM. Intelligence\u2010driven computer network Defense informed by analysis of adversary campaigns and intrusion kill chains. Paper presented at: Proceedings of the 6th International Conference on Information Warfare and Security;2011; Washington DC."},{"issue":"2","key":"e_1_2_6_15_1","first-page":"46","article-title":"Trifork, a new pseudorandom number generator based on lagged Fibonacci maps","volume":"2","author":"Orue AB","year":"2010","journal-title":"J Comput Sci Eng"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fitl2.125","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T18:37:09Z","timestamp":1694284629000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":14,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["10.1002\/itl2.125"],"URL":"https:\/\/doi.org\/10.1002\/itl2.125","archive":["Portico"],"relation":{},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"type":"print","value":"2476-1508"},{"type":"electronic","value":"2476-1508"}],"subject":[],"published":{"date-parts":[[2019,9]]},"assertion":[{"value":"2019-02-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-04-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e125"}}