Secure network slicing deployment in edge computing

Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao
{"title":"Secure network slicing deployment in edge computing","authors":"Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao","doi":"10.1109/iccc52777.2021.9580199","DOIUrl":null,"url":null,"abstract":"As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccc52777.2021.9580199","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
边缘计算中的安全网络切片部署
网络切片作为5G的一项关键技术,可以满足不同用户的不同需求,实现定制化服务。在一些uRLLC应用场景中,网络切片可以与边缘计算技术相结合,更好地实现低时延服务,保证数据不上传到核心网。它可以实现数据的本地存储和计算,更好地保护用户数据的隐私。因此,将网络切片与边缘计算相结合是很有意义的。为了实现这一点,我们首先提出了边缘计算中的网络切片架构,并实现了用户访问认证,以证明该架构的优势。其次,用信任程度来描述安全约束,以满足安全需求。最后,我们将模型表述为一个混合整数线性规划(MILP),然后根据一个典型解对我们的解进行评估。仿真结果表明,该方案能够提供一种安全、高效的资源分配方案。总之,本文可以在边缘计算中部署安全网络切片时参考。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Group-oriented Handover Authentication Scheme in MEC-Enabled 5G Networks Joint Task Secure Offloading and Resource Allocation for Multi-MEC Server to Improve User QoE Dueling-DDQN Based Virtual Machine Placement Algorithm for Cloud Computing Systems Predictive Beam Tracking with Cooperative Sensing for Vehicle-to-Infrastructure Communications Age-aware Communication Strategy in Federated Learning with Energy Harvesting Devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1