Publication:
End-to-End Network Slicing: Securing Sensitive Data Across the Network
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.orcid | 0000-0003-4824-1199 | |
| cris.virtual.orcid | 0000-0003-3623-2754 | |
| cris.virtual.orcid | 0000-0003-0575-5894 | |
| cris.virtual.orcid | 0009-0005-0050-7922 | |
| cris.virtual.orcid | 0000-0001-8152-7143 | |
| cris.virtual.orcid | 0009-0008-7721-410X | |
| cris.virtual.orcid | 0000-0001-5660-3597 | |
| cris.virtual.orcid | 0000-0003-1719-772X | |
| cris.virtual.orcid | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtualsource.department | 505a9fa2-2261-4859-8c77-73c2ba21244c | |
| cris.virtualsource.department | 1fbf8551-ac0f-4865-81c0-df24d268a250 | |
| cris.virtualsource.department | be209fe9-cb8c-4c91-821b-9c93bd548ca7 | |
| cris.virtualsource.department | 45051954-ec4b-4501-9392-b1e53d5247ed | |
| cris.virtualsource.department | 98d400a1-d8f8-4a7e-8c33-b0ab4294736f | |
| cris.virtualsource.department | f5f40d7b-4225-4633-a2a5-d6dd9f8d57d6 | |
| cris.virtualsource.department | 56da7b46-07c1-453c-bffa-0cd5c15f72e4 | |
| cris.virtualsource.department | f8c352c3-58c2-457e-ac61-634af6ac5a12 | |
| cris.virtualsource.department | c3d5cc1c-eed7-4d24-8718-51a6ede35c39 | |
| cris.virtualsource.orcid | 505a9fa2-2261-4859-8c77-73c2ba21244c | |
| cris.virtualsource.orcid | 1fbf8551-ac0f-4865-81c0-df24d268a250 | |
| cris.virtualsource.orcid | be209fe9-cb8c-4c91-821b-9c93bd548ca7 | |
| cris.virtualsource.orcid | 45051954-ec4b-4501-9392-b1e53d5247ed | |
| cris.virtualsource.orcid | 98d400a1-d8f8-4a7e-8c33-b0ab4294736f | |
| cris.virtualsource.orcid | f5f40d7b-4225-4633-a2a5-d6dd9f8d57d6 | |
| cris.virtualsource.orcid | 56da7b46-07c1-453c-bffa-0cd5c15f72e4 | |
| cris.virtualsource.orcid | f8c352c3-58c2-457e-ac61-634af6ac5a12 | |
| cris.virtualsource.orcid | c3d5cc1c-eed7-4d24-8718-51a6ede35c39 | |
| dc.contributor.author | Limani, Xhulio | |
| dc.contributor.author | Troch, Arno | |
| dc.contributor.author | Van Kenhove, Michiel | |
| dc.contributor.author | Papageorgiou, Alexandra | |
| dc.contributor.author | De Turck, Filip | |
| dc.contributor.author | Pohle, Erik | |
| dc.contributor.author | Schild, Leonard | |
| dc.contributor.author | Zbudila, Martin | |
| dc.contributor.author | Abidin, Aysajan | |
| dc.contributor.author | Volckaert, Bruno | |
| dc.contributor.author | Camelo Botero, Miguel | |
| dc.contributor.author | Marquez-Barja, Johann | |
| dc.contributor.author | Slamnik-Krijestorac, Nina | |
| dc.contributor.orcidext | 0009-0008-7721-410X | |
| dc.contributor.orcidext | 0009-0005-0050-7922 | |
| dc.contributor.orcidext | 0000-0003-3623-2754 | |
| dc.contributor.orcidext | 0009-0001-4107-6461 | |
| dc.contributor.orcidext | 0000-0003-4824-1199 | |
| dc.contributor.orcidext | 0000-0001-8871-8532 | |
| dc.contributor.orcidext | 0009-0007-3336-1258 | |
| dc.contributor.orcidext | 0000-0002-0831-8123 | |
| dc.contributor.orcidext | 0000-0002-5128-3608 | |
| dc.contributor.orcidext | 0000-0003-0575-5894 | |
| dc.date.accessioned | 2026-04-30T14:13:53Z | |
| dc.date.available | 2026-04-30T14:13:53Z | |
| dc.date.createdwos | 2025-12-17 | |
| dc.date.issued | 2025 | |
| dc.description.abstract | Internet of Things (IoT) devices are increasingly being deployed in critical applications, such as eHealth systems, enabled by advancements in 5G technology, which offer more than 100 Mbps of throughput, less than 5 ms of latency, and 99,999% of reliability. However, to overcome computing limitations and security measures, IoT devices rely on cloudbased solutions to outsource data processing. This dependency introduces significant security concerns, as sensitive data must be transmitted over the network and processed in external environments, increasing the risk of interception, unauthorized access, and data breaches. To mitigate these security risks, within the scope of the MOZAIK project, we deploy Network Slicing to ensure end-to-end inter-slice and intra-slice isolation across all network domains i.e., 5G Core (5GC), Transport Network (TN), and Radio Access Network (RAN). We deploy a synergy across the entire network infrastructure i.e., 5GC,TN, and RAN, to isolate the IoT data flows from the moment the data is generated until it reaches the cloud, safeguarding sensitive data during transmission. The results of our real-life experiments demonstrate that our proof of concept provides robust isolation between slices, effectively addressing the security concerns of IoT devices and enhancing the reliability and security of IoT applications. Additionally, we also include aspects of secure data storage and secure data processing, covered in the MOZAIK project. | |
| dc.description.wosFundingText | This work has been performed in the framework of the Flemish Government through FWO SBO project MOZAIK S003321N, and the European project SNS JU TrialsNet (Grant Agreement No. 101095871). | |
| dc.identifier.doi | 10.1109/iccc65529.2025.11149332 | |
| dc.identifier.isbn | 979-8-3315-4445-4 | |
| dc.identifier.issn | 2377-8644 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/59261 | |
| dc.language.iso | eng | |
| dc.provenance.editstepuser | greet.vanhoof@imec.be | |
| dc.publisher | IEEE | |
| dc.relation.ispartofseries | IEEE International Conference on Communications in China | |
| dc.source.beginpage | 1 | |
| dc.source.conference | IEEE/CIC International Conference on Communications in China (ICCC) | |
| dc.source.conferencedate | 2025-08-10 | |
| dc.source.conferencelocation | Shanghai | |
| dc.source.endpage | 6 | |
| dc.source.journal | 2025 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA, ICCC | |
| dc.source.numberofpages | 6 | |
| dc.title | End-to-End Network Slicing: Securing Sensitive Data Across the Network | |
| dc.type | Proceedings paper | |
| dspace.entity.type | Publication | |
| imec.internal.crawledAt | 2025-10-22 | |
| imec.internal.source | crawler | |
| imec.internal.wosCreatedAt | 2026-04-07 | |
| Files | ||
| Publication available in collections: |