A Bottom-Up Approach to 5G Network Slicing Security in User Equipment Whitepaper

This white paper will help you understand how to use testing and verification of network slicing functionality as part of a bottom-up strategy for hardening your products against cyberthreats. Many of the same practices discussed here can also be applied to the ASICs, processors, software, and other major components that are used in 5G end products.

This white paper begins with a brief overview of the 5G network slicing architecture and the security mechanisms that protects it, and then takes a deeper dive into strategies for verification and testing of UEs during the development process.