Software-Defined Mobile Networks Security

被引:95
作者
Chen, Min [1 ]
Qian, Yongfeng [1 ]
Mao, Shiwen [2 ]
Tang, Wan [3 ]
Yang, Ximin [3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Embedded & Pervas Comp Lab, Wuhan 430074, Peoples R China
[2] Auburn Univ, Dept Elect & Comp Engn, 200 Broun Hall, Auburn, AL 36849 USA
[3] South Cent Univ Nationalities, Coll Comp Sci, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Software defined mobile network (SDMN); OpenFlow; Network function virtualization (NFV); Security; CLOUD; FUTURE; OPPORTUNITIES; ARCHITECTURE; CHALLENGES; MANAGEMENT; MECHANISM; SPECTRUM; DEFENSE;
D O I
10.1007/s11036-015-0665-5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The future 5G wireless is triggered by the higher demand on wireless capacity. With Software Defined Network (SDN), the data layer can be separated from the control layer. The development of relevant studies about Network Function Virtualization (NFV) and cloud computing has the potential of offering a quicker and more reliable network access for growing data traffic. Under such circumstances, Software Defined Mobile Network (SDMN) is presented as a promising solution for meeting the wireless data demands. This paper provides a survey of SDMN and its related security problems. As SDMN integrates cloud computing, SDN, and NFV, and works on improving network functions, performance, flexibility, energy efficiency, and scalability, it is an important component of the next generation telecommunication networks. However, the SDMN concept also raises new security concerns. We explore relevant security threats and their corresponding countermeasures with respect to the data layer, control layer, application layer, and communication protocols. We also adopt the STRIDE method to classify various security threats to better reveal them in the context of SDMN. This survey is concluded with a list of open security challenges in SDMN.
引用
收藏
页码:729 / 743
页数:15
相关论文
共 93 条
[1]   Securing Software Defined Networks: Taxonomy, Requirements, and Open Issues [J].
Akhunzada, Adnan ;
Ahmed, Ejaz ;
Gani, Abdullah ;
Khan, Muhammad Khurram ;
Imran, Muhammad ;
Guizani, Sghaier .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) :36-44
[2]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[3]   A Multi-agent System for Smartphone Intrusion Detection Framework [J].
Alzahrani, Abdullah J. ;
Ghorbani, Ali A. .
PROCEEDINGS OF THE 18TH ASIA PACIFIC SYMPOSIUM ON INTELLIGENT AND EVOLUTIONARY SYSTEMS, VOL 1, 2015, :101-113
[4]  
[Anonymous], NDSS
[5]  
[Anonymous], 2013, P 2 ACM SIGCOMM WORK, DOI DOI 10.1145/2491185.2491199
[6]  
[Anonymous], 2006, VIRTUALIZATION TECHN
[7]  
[Anonymous], 2014, SOFTWARE DEFINED NET
[8]  
[Anonymous], P 2015 NETW DISTR SY
[9]  
[Anonymous], 2014, PROCEEDING IEEE INT, DOI DOI 10.1109/WOWMOM.2014.6918981
[10]  
[Anonymous], 2014, INT J SCI ENG RES