DSM Attack Resistant Slice Selection in 5G

In a previous letter, we proposed the distributed slice mobility (DSM) attack. The DSM attack can cause severe performance and economic damage to 5G networks. Attackers can launch the DSM attack by exploiting a vulnerability in the existing slice selection protocol. In this letter, we propose a DSM attack resistant slice selection protocol for 5G networks. In the proposed protocol, the network selects the best slice for a session between a user and an external data network based on the type of services offered by the external data network and the user’s subscription details. The proposed protocol implements neutral slice selection and mitigation of traffic analysis attacks by ensuring user anonymity. The proposed protocol is implemented, and its computation overhead is compared with that of the traditional protocol and a privacy preserving slice selection protocol.