| Network application layer | Communication security | Data communication security | User data communication security |
| Network function layer | Authenticity | Identity authenticity | Terminal access authentication |
| Authentication between network nodes |
| Availability | Network availability | Anti-DDoS attack |
| Anti-UE random access attack |
| Communication security | Network resource sharing | RAN slice isolation |
| Core network slice isolation |
| Data communication security | Network function communication security |
| Network transmission layer | Communication security | Network resource sharing | Bearer network slice isolation |
| Data communication security | Bearer network communication security |
| Availability | Network availability | Anti-DDoS attack |
| Authenticity | Identity authenticity | Authentication between network nodes |
| Infrastructure layer | Availability | Network availability | Anti-wireless communication interference |
| Authenticity | Identity authenticity | Trusted boot of satellite nodes |