Software-Defined Mobile Networks Security

被引:95
作者
Chen, Min [1 ]
Qian, Yongfeng [1 ]
Mao, Shiwen [2 ]
Tang, Wan [3 ]
Yang, Ximin [3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Embedded & Pervas Comp Lab, Wuhan 430074, Peoples R China
[2] Auburn Univ, Dept Elect & Comp Engn, 200 Broun Hall, Auburn, AL 36849 USA
[3] South Cent Univ Nationalities, Coll Comp Sci, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Software defined mobile network (SDMN); OpenFlow; Network function virtualization (NFV); Security; CLOUD; FUTURE; OPPORTUNITIES; ARCHITECTURE; CHALLENGES; MANAGEMENT; MECHANISM; SPECTRUM; DEFENSE;
D O I
10.1007/s11036-015-0665-5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The future 5G wireless is triggered by the higher demand on wireless capacity. With Software Defined Network (SDN), the data layer can be separated from the control layer. The development of relevant studies about Network Function Virtualization (NFV) and cloud computing has the potential of offering a quicker and more reliable network access for growing data traffic. Under such circumstances, Software Defined Mobile Network (SDMN) is presented as a promising solution for meeting the wireless data demands. This paper provides a survey of SDMN and its related security problems. As SDMN integrates cloud computing, SDN, and NFV, and works on improving network functions, performance, flexibility, energy efficiency, and scalability, it is an important component of the next generation telecommunication networks. However, the SDMN concept also raises new security concerns. We explore relevant security threats and their corresponding countermeasures with respect to the data layer, control layer, application layer, and communication protocols. We also adopt the STRIDE method to classify various security threats to better reveal them in the context of SDMN. This survey is concluded with a list of open security challenges in SDMN.
引用
收藏
页码:729 / 743
页数:15
相关论文
共 93 条
[41]   On the Cost-QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2's Pricing Models [J].
He, Jian ;
Wen, Yonggang ;
Huang, Jianwei ;
Wu, Di .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2014, 24 (04) :669-680
[42]   CBM: Online Strategies on Cost-Aware Buffer Management for Mobile Video Streaming [J].
He, Jian ;
Xue, Zheng ;
Wu, Di ;
Wu, Dapeng Oliver ;
Wen, Yonggang .
IEEE TRANSACTIONS ON MULTIMEDIA, 2014, 16 (01) :242-252
[43]   Toward Optimal Deployment of Cloud-Assisted Video Distribution Services [J].
He, Jian ;
Wu, Di ;
Zeng, Yupeng ;
Hei, Xiaojun ;
Wen, Yonggang .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2013, 23 (10) :1717-1728
[44]  
Hernan S., 2006, Uncover Security Design Flaws Using The STRIDE Approach
[45]   A layered approach to cognitive radio network security: A survey [J].
Hlavacek, Deanna ;
Chang, J. Morris .
COMPUTER NETWORKS, 2014, 75 :414-436
[46]   A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation [J].
Hu, Fei ;
Hao, Qi ;
Bao, Ke .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :2181-2206
[47]  
Hu H., 2014, OP NETW SUMM 2014 ON
[48]  
Jermyn J., 2014, J CYBER SECUR MOBIL, V3, P159, DOI [10.13052/jcsm2245-1439.323, DOI 10.13052/JCSM2245-1439.323]
[49]   SoftCell: Scalable and Flexible Cellular Core Network Architecture [J].
Jin, Xin ;
Li, Li Erran ;
Vanbever, Laurent ;
Rexford, Jennifer .
PROCEEDINGS OF THE 2013 ACM INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT '13), 2013, :163-174
[50]  
Kempf J., 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2012), P784, DOI 10.1109/WiMOB.2012.6379165