Publication:

End-to-End Network Slicing: Securing Sensitive Data Across the Network

 
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.orcid0000-0003-4824-1199
cris.virtual.orcid0000-0003-3623-2754
cris.virtual.orcid0000-0003-0575-5894
cris.virtual.orcid0009-0005-0050-7922
cris.virtual.orcid0000-0001-8152-7143
cris.virtual.orcid0009-0008-7721-410X
cris.virtual.orcid0000-0001-5660-3597
cris.virtual.orcid0000-0003-1719-772X
cris.virtual.orcid#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtualsource.department505a9fa2-2261-4859-8c77-73c2ba21244c
cris.virtualsource.department1fbf8551-ac0f-4865-81c0-df24d268a250
cris.virtualsource.departmentbe209fe9-cb8c-4c91-821b-9c93bd548ca7
cris.virtualsource.department45051954-ec4b-4501-9392-b1e53d5247ed
cris.virtualsource.department98d400a1-d8f8-4a7e-8c33-b0ab4294736f
cris.virtualsource.departmentf5f40d7b-4225-4633-a2a5-d6dd9f8d57d6
cris.virtualsource.department56da7b46-07c1-453c-bffa-0cd5c15f72e4
cris.virtualsource.departmentf8c352c3-58c2-457e-ac61-634af6ac5a12
cris.virtualsource.departmentc3d5cc1c-eed7-4d24-8718-51a6ede35c39
cris.virtualsource.orcid505a9fa2-2261-4859-8c77-73c2ba21244c
cris.virtualsource.orcid1fbf8551-ac0f-4865-81c0-df24d268a250
cris.virtualsource.orcidbe209fe9-cb8c-4c91-821b-9c93bd548ca7
cris.virtualsource.orcid45051954-ec4b-4501-9392-b1e53d5247ed
cris.virtualsource.orcid98d400a1-d8f8-4a7e-8c33-b0ab4294736f
cris.virtualsource.orcidf5f40d7b-4225-4633-a2a5-d6dd9f8d57d6
cris.virtualsource.orcid56da7b46-07c1-453c-bffa-0cd5c15f72e4
cris.virtualsource.orcidf8c352c3-58c2-457e-ac61-634af6ac5a12
cris.virtualsource.orcidc3d5cc1c-eed7-4d24-8718-51a6ede35c39
dc.contributor.authorLimani, Xhulio
dc.contributor.authorTroch, Arno
dc.contributor.authorVan Kenhove, Michiel
dc.contributor.authorPapageorgiou, Alexandra
dc.contributor.authorDe Turck, Filip
dc.contributor.authorPohle, Erik
dc.contributor.authorSchild, Leonard
dc.contributor.authorZbudila, Martin
dc.contributor.authorAbidin, Aysajan
dc.contributor.authorVolckaert, Bruno
dc.contributor.authorCamelo Botero, Miguel
dc.contributor.authorMarquez-Barja, Johann
dc.contributor.authorSlamnik-Krijestorac, Nina
dc.contributor.orcidext0009-0008-7721-410X
dc.contributor.orcidext0009-0005-0050-7922
dc.contributor.orcidext0000-0003-3623-2754
dc.contributor.orcidext0009-0001-4107-6461
dc.contributor.orcidext0000-0003-4824-1199
dc.contributor.orcidext0000-0001-8871-8532
dc.contributor.orcidext0009-0007-3336-1258
dc.contributor.orcidext0000-0002-0831-8123
dc.contributor.orcidext0000-0002-5128-3608
dc.contributor.orcidext0000-0003-0575-5894
dc.date.accessioned2026-04-30T14:13:53Z
dc.date.available2026-04-30T14:13:53Z
dc.date.createdwos2025-12-17
dc.date.issued2025
dc.description.abstractInternet of Things (IoT) devices are increasingly being deployed in critical applications, such as eHealth systems, enabled by advancements in 5G technology, which offer more than 100 Mbps of throughput, less than 5 ms of latency, and 99,999% of reliability. However, to overcome computing limitations and security measures, IoT devices rely on cloudbased solutions to outsource data processing. This dependency introduces significant security concerns, as sensitive data must be transmitted over the network and processed in external environments, increasing the risk of interception, unauthorized access, and data breaches. To mitigate these security risks, within the scope of the MOZAIK project, we deploy Network Slicing to ensure end-to-end inter-slice and intra-slice isolation across all network domains i.e., 5G Core (5GC), Transport Network (TN), and Radio Access Network (RAN). We deploy a synergy across the entire network infrastructure i.e., 5GC,TN, and RAN, to isolate the IoT data flows from the moment the data is generated until it reaches the cloud, safeguarding sensitive data during transmission. The results of our real-life experiments demonstrate that our proof of concept provides robust isolation between slices, effectively addressing the security concerns of IoT devices and enhancing the reliability and security of IoT applications. Additionally, we also include aspects of secure data storage and secure data processing, covered in the MOZAIK project.
dc.description.wosFundingTextThis work has been performed in the framework of the Flemish Government through FWO SBO project MOZAIK S003321N, and the European project SNS JU TrialsNet (Grant Agreement No. 101095871).
dc.identifier.doi10.1109/iccc65529.2025.11149332
dc.identifier.isbn979-8-3315-4445-4
dc.identifier.issn2377-8644
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/59261
dc.language.isoeng
dc.provenance.editstepusergreet.vanhoof@imec.be
dc.publisherIEEE
dc.relation.ispartofseriesIEEE International Conference on Communications in China
dc.source.beginpage1
dc.source.conferenceIEEE/CIC International Conference on Communications in China (ICCC)
dc.source.conferencedate2025-08-10
dc.source.conferencelocationShanghai
dc.source.endpage6
dc.source.journal2025 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA, ICCC
dc.source.numberofpages6
dc.title

End-to-End Network Slicing: Securing Sensitive Data Across the Network

dc.typeProceedings paper
dspace.entity.typePublication
imec.internal.crawledAt2025-10-22
imec.internal.sourcecrawler
imec.internal.wosCreatedAt2026-04-07
Files
Publication available in collections: