George Papathanail, Ioannis Dimolitsas, Ioakeim Fotoglou, Dimitrios Dechouniotis, S. Papavassiliou, Panagiotis Papadimitriou
{"title":"面向安全优化的横片通信建立","authors":"George Papathanail, Ioannis Dimolitsas, Ioakeim Fotoglou, Dimitrios Dechouniotis, S. Papavassiliou, Panagiotis Papadimitriou","doi":"10.1109/NetSoft54395.2022.9844063","DOIUrl":null,"url":null,"abstract":"Network slicing has been at the forefront of 5G network research, with various slicing orchestration architectures seeking to reap the benefits of slicing for the enhanced performance and reliability of 5G (and beyond) network services. In this context, cross-slice communication (CSC) has drawn significant attention, since CSC can foster interactions among services deployed in co-located slices, lowering the barrier for the consumption of services.To capitalize the benefits of CSC (e.g., reduced latency and cost), CSC should be established with the highest degree of co-location and also in a secure and policy-compliant manner. To this end, we present an orchestration framework that fulfills all main technical requirements for CSC instantiation. In this respect, we elaborate on the CSC instantiation workflows and shed light into the cross-layer interactions that span our proposed CSC orchestrator, the Network Function Virtualization Orchestrator (NFVO) and the Virtualized Infrastructure Manager (VIM). Our experimental results indicate that our proposed CSC orchestration framework introduces a negligible performance overhead and also incurs a minimal latency inflation compared to a direct form of inter-slice communication without any provision for security and resource isolation.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Towards Secure and Optimized Cross-Slice Communication Establishment\",\"authors\":\"George Papathanail, Ioannis Dimolitsas, Ioakeim Fotoglou, Dimitrios Dechouniotis, S. Papavassiliou, Panagiotis Papadimitriou\",\"doi\":\"10.1109/NetSoft54395.2022.9844063\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network slicing has been at the forefront of 5G network research, with various slicing orchestration architectures seeking to reap the benefits of slicing for the enhanced performance and reliability of 5G (and beyond) network services. In this context, cross-slice communication (CSC) has drawn significant attention, since CSC can foster interactions among services deployed in co-located slices, lowering the barrier for the consumption of services.To capitalize the benefits of CSC (e.g., reduced latency and cost), CSC should be established with the highest degree of co-location and also in a secure and policy-compliant manner. To this end, we present an orchestration framework that fulfills all main technical requirements for CSC instantiation. In this respect, we elaborate on the CSC instantiation workflows and shed light into the cross-layer interactions that span our proposed CSC orchestrator, the Network Function Virtualization Orchestrator (NFVO) and the Virtualized Infrastructure Manager (VIM). Our experimental results indicate that our proposed CSC orchestration framework introduces a negligible performance overhead and also incurs a minimal latency inflation compared to a direct form of inter-slice communication without any provision for security and resource isolation.\",\"PeriodicalId\":125799,\"journal\":{\"name\":\"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)\",\"volume\":\"94 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NetSoft54395.2022.9844063\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NetSoft54395.2022.9844063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards Secure and Optimized Cross-Slice Communication Establishment
Network slicing has been at the forefront of 5G network research, with various slicing orchestration architectures seeking to reap the benefits of slicing for the enhanced performance and reliability of 5G (and beyond) network services. In this context, cross-slice communication (CSC) has drawn significant attention, since CSC can foster interactions among services deployed in co-located slices, lowering the barrier for the consumption of services.To capitalize the benefits of CSC (e.g., reduced latency and cost), CSC should be established with the highest degree of co-location and also in a secure and policy-compliant manner. To this end, we present an orchestration framework that fulfills all main technical requirements for CSC instantiation. In this respect, we elaborate on the CSC instantiation workflows and shed light into the cross-layer interactions that span our proposed CSC orchestrator, the Network Function Virtualization Orchestrator (NFVO) and the Virtualized Infrastructure Manager (VIM). Our experimental results indicate that our proposed CSC orchestration framework introduces a negligible performance overhead and also incurs a minimal latency inflation compared to a direct form of inter-slice communication without any provision for security and resource isolation.