Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization

IF 0.6 Q3 ENGINEERING, MULTIDISCIPLINARY IIUM Engineering Journal Pub Date : 2022-07-04 DOI:10.31436/iiumej.v23i2.1763
Ali Jasim Ramadhan Al-Aameri
{"title":"Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization","authors":"Ali Jasim Ramadhan Al-Aameri","doi":"10.31436/iiumej.v23i2.1763","DOIUrl":null,"url":null,"abstract":"In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and secure slicing over the virtualization of 5G networks enabled by software-defined network/network functions. In the proposed method (called T-S3RA), to authenticate user devices, Boolean logic is used with key derivation based on passwords. Moreover, the traffic arrangement is based on the 5G access points. To implement secure resource allocation and network slicing, deep learning models are used. Renyi entropy computation is employed to predict the DDoS attackers. Through the experimental results, the effectiveness of the presented approach is proved.\nABSTRAK: Melalui komunikasi 5G, kadar data yang tinggi dan latensi yang rendah amat diperlukan kerana kadar trafik yang tinggi. Walaupun pembaziran sumber dapat dielakkan melalui pemotongan selamat, rangkaian yang dipotong sering dieksploitasi oleh penyerang DDoS. Oleh itu, kajian ini menyediakan persekitaran sedar-trafik bagi peruntukan sumber dan pemotongan selamat ke atas rangkaian 5G secara maya melalui fungsi rangkaian takrif-perisian. Melaui pendekatan yang dicadangkan (iaitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan logik Boolean dengan perolehan kunci berdasarkan kata laluan. Di samping itu, susunan trafik adalah berdasarkan titik akses 5G. Bagi melaksanakan peruntukan sumber yang selamat dan pemotongan rangkaian, model pembelajaran mendalam telah digunakan. Pengiraan Entropi Renyi dibuat bagi meramal penyerang DDoS. Dapatan eksperimen mengesahkan keberkesanan pendekatan yang dicadangkan.","PeriodicalId":13439,"journal":{"name":"IIUM Engineering Journal","volume":"3 1","pages":""},"PeriodicalIF":0.6000,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IIUM Engineering Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31436/iiumej.v23i2.1763","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 1

Abstract

In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and secure slicing over the virtualization of 5G networks enabled by software-defined network/network functions. In the proposed method (called T-S3RA), to authenticate user devices, Boolean logic is used with key derivation based on passwords. Moreover, the traffic arrangement is based on the 5G access points. To implement secure resource allocation and network slicing, deep learning models are used. Renyi entropy computation is employed to predict the DDoS attackers. Through the experimental results, the effectiveness of the presented approach is proved. ABSTRAK: Melalui komunikasi 5G, kadar data yang tinggi dan latensi yang rendah amat diperlukan kerana kadar trafik yang tinggi. Walaupun pembaziran sumber dapat dielakkan melalui pemotongan selamat, rangkaian yang dipotong sering dieksploitasi oleh penyerang DDoS. Oleh itu, kajian ini menyediakan persekitaran sedar-trafik bagi peruntukan sumber dan pemotongan selamat ke atas rangkaian 5G secara maya melalui fungsi rangkaian takrif-perisian. Melaui pendekatan yang dicadangkan (iaitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan logik Boolean dengan perolehan kunci berdasarkan kata laluan. Di samping itu, susunan trafik adalah berdasarkan titik akses 5G. Bagi melaksanakan peruntukan sumber yang selamat dan pemotongan rangkaian, model pembelajaran mendalam telah digunakan. Pengiraan Entropi Renyi dibuat bagi meramal penyerang DDoS. Dapatan eksperimen mengesahkan keberkesanan pendekatan yang dicadangkan.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
软件定义网络/网络功能虚拟化中5G网络资源的安全切片与分配
在5G通信中,由于流量大,需要更高的数据速率和更低的延迟。虽然通过安全切片避免了资源浪费,但切片网络容易被DDoS攻击者利用。因此,在本文中,提出了流量感知设置,用于通过软件定义网络/网络功能实现5G网络虚拟化的资源分配和安全切片。在提出的方法(称为T-S3RA)中,为了对用户设备进行身份验证,将布尔逻辑与基于密码的密钥派生一起使用。此外,流量安排是基于5G接入点的。为了实现安全的资源分配和网络切片,使用了深度学习模型。采用Renyi熵计算对DDoS攻击者进行预测。实验结果证明了该方法的有效性。摘要:5G,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据。Walaupun pembaziran number dapat dielakkan melalui peemotongan selamat, rangkaian yang dipoong sering dikspploitasi oleh penyerang DDoS。Oleh itu, kajian ini menyediakan persekitaran sear - traffic - ik bagi peruntukan number, dan peemotongan和selamat ke, as rangkaian 5G secara maya melalui fungsi rangkaian takrif- perisan。Melaui pendekatan yang dicadangkan (iitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan loggik Boolean dengan perolehan kunci berdasarkan kata lalan。在抽样调查中,苏丹的交通数据显示,5G技术是最先进的。巴吉·米拉克萨纳坎,peruntukan sumber yang selamat dan peemotongan rangkaian,模特米拉克萨纳坎,mendalam telah digunakan。Pengiraan Entropi Renyi dibui meramal penyerang DDoS。大巴坦的实验,孟格萨坎keberkesanan pendekatan yang dicadangkan。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IIUM Engineering Journal
IIUM Engineering Journal ENGINEERING, MULTIDISCIPLINARY-
CiteScore
2.10
自引率
20.00%
发文量
57
审稿时长
40 weeks
期刊介绍: The IIUM Engineering Journal, published biannually (June and December), is a peer-reviewed open-access journal of the Faculty of Engineering, International Islamic University Malaysia (IIUM). The IIUM Engineering Journal publishes original research findings as regular papers, review papers (by invitation). The Journal provides a platform for Engineers, Researchers, Academicians, and Practitioners who are highly motivated in contributing to the Engineering disciplines, and Applied Sciences. It also welcomes contributions that address solutions to the specific challenges of the developing world, and address science and technology issues from an Islamic and multidisciplinary perspective. Subject areas suitable for publication are as follows: -Chemical and Biotechnology Engineering -Civil and Environmental Engineering -Computer Science and Information Technology -Electrical, Computer, and Communications Engineering -Engineering Mathematics and Applied Science -Materials and Manufacturing Engineering -Mechanical and Aerospace Engineering -Mechatronics and Automation Engineering
期刊最新文献
PHOTOVOLTAIC MODULE TEMPERATURE ESTIMATION MODEL FOR THE ONE-TIME-POINT DAILY ESTIMATION METHOD BIPHASIC CRUDE PALM OIL DECHLORINATION: EFFECT OF VOLUME RATIO AND CONCENTRATION OF SODIUM SILICATE TO HYDROXIDE ION DISTRIBUTION MIXING SEQUENCE EFFECT OF CEMENT COMPOSITES WITH CARBON FIBRES EFFECTS OF SOIL ERODIBILITY ON RIVERBANK EROSION AND FAILURES KEY SUCCESS FACTORS IN ROAD MAINTENANCE MANAGEMENT PROJECTS (A CASE STUDY OF MAYSAN PROVINCE, IRAQ)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1