University of Leicester
Browse

E2E Network Slicing for Enhanced Cybersecurity, Orchestration, Automation and Response in 5G/6G: The RIGOUROUS Approach

Download (4.06 MB)
journal contribution
posted on 2025-11-20, 14:22 authored by Pablo Benlloch-Caballero, Antonio Matencio-Escolar, Jorge Bernal Bernabe, Antonio Skarmeta, Qi WangQi Wang, Jose M Alcaraz-Calero
<p dir="ltr">This paper addresses the challenge of cybersecurity in ensuring cybersecurity in complex 5G and future 6G network environments, characterized by multi-domain, multi-tenant architectures and diverse technologies. The RIGOUROUS project proposes a novel network self-protection (NSP) scheme based on End-to-End (E2E) network slicing to address these challenges. The paper details this scheme’s design, prototype, and preliminary results, which leverage a Security Orchestration, Automation, and Response (Security Orchestration, Automation and Response (SOAR)) loop to automate threat detection, mitigation planning, and enforcement. The core components of the SOAR loop, including the Topology Inventory Agent (TIA), Network Security Flow Monitoring (NSFM), Slice Mitigation Planner Service (SMPS), Security Orchestrator (SO), and Slice Manager (SM), are described. Additionally, the solution is centered on NSP based on the Open vSwitch (OVS) platform, for which significant extensions have been undertaken to support Network Slicing capabilities in multi-tenant, multi-domain beyond 5G networks. Preliminary experiments show promising results in terms of overhead introduced in the data plane (on the order of microseconds) and high scalability when deploying up to 2048 network slices. The implementation of the network slicing-based mitigation strategy in the software data path is presented, along with a use case demonstrating its effectiveness in mitigating cyberattacks. The preliminary results highlight, in a scenario with up to 64 infected UEs, a reaction time of 15.28 s in the best-case scenario and 51.52 s in the worst-case scenario. The proposed solution shows potential to enhance the security and resilience of next-generation network infrastructures.</p>

Funding

European Commission under Grant Agreements HORIZON-JU-SNS-2022-STREAM-B-01-04/101095933 - RIGOUROUS: secuRe desIGn and deplOyment of trUsthwoRthy cOntinUum computing 6G Services.

History

Author affiliation

University of Leicester College of Science & Engineering Comp' & Math' Sciences

Version

  • VoR (Version of Record)

Published in

Journal of Network and Systems Management

Volume

34

Issue

1

Publisher

Springer Science and Business Media LLC

issn

1064-7570

eissn

1573-7705

Copyright date

2025

Available date

2025-11-20

Language

en

Deposited by

Professor Qi Wang

Deposit date

2025-11-12

Data Access Statement

No datasets were generated or analysed during the current study.