Loading…
Low Latency Security Function Chain Embedding Across Multiple Domains
5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous w...
Saved in:
Published in: | IEEE access 2018-01, Vol.6, p.14474-14484 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43 |
---|---|
cites | cdi_FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43 |
container_end_page | 14484 |
container_issue | |
container_start_page | 14474 |
container_title | IEEE access |
container_volume | 6 |
creator | Xu, Qi Gao, Deyun Li, Taixin Zhang, Hongke |
description | 5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous work, we proposed a SFC-based framework that chains security functions in different domains to provide security services on demand. However, creating cross-domain service function chains will inevitably result in the additional network latency. In this paper, we study this problem of minimizing the end-to-end latency when deploying cross-domain service function chains for 5G applications. First, an exact approach, consisting of service chain partition and service subchain embedding, is proposed to derive an optimal solution for cross-domain service function chain placement. Second, we improve the Viterbi algorithm and propose an efficient heuristic approach to derive near-optimal solutions for large networks. We also compare the performance of the proposed exact approach, the proposed heuristic approach, and the simple greedy approach in different scales of network infrastructures. Simulation results are presented to demonstrate the effectiveness of the proposed approaches. |
doi_str_mv | 10.1109/ACCESS.2018.2791963 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2455930240</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8254344</ieee_id><doaj_id>oai_doaj_org_article_d27f95f8e22e43ff999dbbde62d4a945</doaj_id><sourcerecordid>2455930240</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43</originalsourceid><addsrcrecordid>eNpNUE1PwkAQbYwmEuQXcGniGdzv7h5JBSWp8YCeN9vdKS6BLm7bGP69hRriXGby8t6bmZckU4zmGCP1tMjz5WYzJwjLOckUVoLeJCOChZpRTsXtv_k-mTTNDvUle4hno2RZhJ-0MC3U9pRuwHbRt6d01dW29aFO8y_j63R5KME5X2_ThY2hadK3bt_64x7S53DoCc1DcleZfQOTvz5OPlfLj_x1Vry_rPNFMbMMyXZmiSsJxUJyikyWWQSYCyUkUEmq0gmOMLacmkwaYoiTVogSKQKKsSpDhtFxsh58XTA7fYz-YOJJB-P1BQhxq01svd2DdiSrFK8kEAKMVpVSypWlA0EcM4rx3utx8DrG8N1B0-pd6GLdn68J41xRRBjqWXRgXR6PUF23YqTP8eshfn2OX__F36umg8oDwFUhCWeUMfoL-Ql_Ng</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455930240</pqid></control><display><type>article</type><title>Low Latency Security Function Chain Embedding Across Multiple Domains</title><source>IEEE Xplore Open Access Journals</source><creator>Xu, Qi ; Gao, Deyun ; Li, Taixin ; Zhang, Hongke</creator><creatorcontrib>Xu, Qi ; Gao, Deyun ; Li, Taixin ; Zhang, Hongke</creatorcontrib><description>5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous work, we proposed a SFC-based framework that chains security functions in different domains to provide security services on demand. However, creating cross-domain service function chains will inevitably result in the additional network latency. In this paper, we study this problem of minimizing the end-to-end latency when deploying cross-domain service function chains for 5G applications. First, an exact approach, consisting of service chain partition and service subchain embedding, is proposed to derive an optimal solution for cross-domain service function chain placement. Second, we improve the Viterbi algorithm and propose an efficient heuristic approach to derive near-optimal solutions for large networks. We also compare the performance of the proposed exact approach, the proposed heuristic approach, and the simple greedy approach in different scales of network infrastructures. Simulation results are presented to demonstrate the effectiveness of the proposed approaches.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2791963</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>5G mobile communication ; Algorithms ; Business ; Chains ; Computational modeling ; Computer architecture ; Domains ; Embedding ; Heuristic methods ; Hidden Markov models ; Internet of Vehicles ; Network latency ; Security ; Security services ; service function chaining ; Smart buildings ; software defined network ; Viterbi algorithm detectors ; Wireless networks</subject><ispartof>IEEE access, 2018-01, Vol.6, p.14474-14484</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43</citedby><cites>FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43</cites><orcidid>0000-0002-8641-4057 ; 0000-0003-2836-2647</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8254344$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,27633,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Xu, Qi</creatorcontrib><creatorcontrib>Gao, Deyun</creatorcontrib><creatorcontrib>Li, Taixin</creatorcontrib><creatorcontrib>Zhang, Hongke</creatorcontrib><title>Low Latency Security Function Chain Embedding Across Multiple Domains</title><title>IEEE access</title><addtitle>Access</addtitle><description>5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous work, we proposed a SFC-based framework that chains security functions in different domains to provide security services on demand. However, creating cross-domain service function chains will inevitably result in the additional network latency. In this paper, we study this problem of minimizing the end-to-end latency when deploying cross-domain service function chains for 5G applications. First, an exact approach, consisting of service chain partition and service subchain embedding, is proposed to derive an optimal solution for cross-domain service function chain placement. Second, we improve the Viterbi algorithm and propose an efficient heuristic approach to derive near-optimal solutions for large networks. We also compare the performance of the proposed exact approach, the proposed heuristic approach, and the simple greedy approach in different scales of network infrastructures. Simulation results are presented to demonstrate the effectiveness of the proposed approaches.</description><subject>5G mobile communication</subject><subject>Algorithms</subject><subject>Business</subject><subject>Chains</subject><subject>Computational modeling</subject><subject>Computer architecture</subject><subject>Domains</subject><subject>Embedding</subject><subject>Heuristic methods</subject><subject>Hidden Markov models</subject><subject>Internet of Vehicles</subject><subject>Network latency</subject><subject>Security</subject><subject>Security services</subject><subject>service function chaining</subject><subject>Smart buildings</subject><subject>software defined network</subject><subject>Viterbi algorithm detectors</subject><subject>Wireless networks</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUE1PwkAQbYwmEuQXcGniGdzv7h5JBSWp8YCeN9vdKS6BLm7bGP69hRriXGby8t6bmZckU4zmGCP1tMjz5WYzJwjLOckUVoLeJCOChZpRTsXtv_k-mTTNDvUle4hno2RZhJ-0MC3U9pRuwHbRt6d01dW29aFO8y_j63R5KME5X2_ThY2hadK3bt_64x7S53DoCc1DcleZfQOTvz5OPlfLj_x1Vry_rPNFMbMMyXZmiSsJxUJyikyWWQSYCyUkUEmq0gmOMLacmkwaYoiTVogSKQKKsSpDhtFxsh58XTA7fYz-YOJJB-P1BQhxq01svd2DdiSrFK8kEAKMVpVSypWlA0EcM4rx3utx8DrG8N1B0-pd6GLdn68J41xRRBjqWXRgXR6PUF23YqTP8eshfn2OX__F36umg8oDwFUhCWeUMfoL-Ql_Ng</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Xu, Qi</creator><creator>Gao, Deyun</creator><creator>Li, Taixin</creator><creator>Zhang, Hongke</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-8641-4057</orcidid><orcidid>https://orcid.org/0000-0003-2836-2647</orcidid></search><sort><creationdate>20180101</creationdate><title>Low Latency Security Function Chain Embedding Across Multiple Domains</title><author>Xu, Qi ; Gao, Deyun ; Li, Taixin ; Zhang, Hongke</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>5G mobile communication</topic><topic>Algorithms</topic><topic>Business</topic><topic>Chains</topic><topic>Computational modeling</topic><topic>Computer architecture</topic><topic>Domains</topic><topic>Embedding</topic><topic>Heuristic methods</topic><topic>Hidden Markov models</topic><topic>Internet of Vehicles</topic><topic>Network latency</topic><topic>Security</topic><topic>Security services</topic><topic>service function chaining</topic><topic>Smart buildings</topic><topic>software defined network</topic><topic>Viterbi algorithm detectors</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Qi</creatorcontrib><creatorcontrib>Gao, Deyun</creatorcontrib><creatorcontrib>Li, Taixin</creatorcontrib><creatorcontrib>Zhang, Hongke</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE/IET Electronic Library</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xu, Qi</au><au>Gao, Deyun</au><au>Li, Taixin</au><au>Zhang, Hongke</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Low Latency Security Function Chain Embedding Across Multiple Domains</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><spage>14474</spage><epage>14484</epage><pages>14474-14484</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous work, we proposed a SFC-based framework that chains security functions in different domains to provide security services on demand. However, creating cross-domain service function chains will inevitably result in the additional network latency. In this paper, we study this problem of minimizing the end-to-end latency when deploying cross-domain service function chains for 5G applications. First, an exact approach, consisting of service chain partition and service subchain embedding, is proposed to derive an optimal solution for cross-domain service function chain placement. Second, we improve the Viterbi algorithm and propose an efficient heuristic approach to derive near-optimal solutions for large networks. We also compare the performance of the proposed exact approach, the proposed heuristic approach, and the simple greedy approach in different scales of network infrastructures. Simulation results are presented to demonstrate the effectiveness of the proposed approaches.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2791963</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-8641-4057</orcidid><orcidid>https://orcid.org/0000-0003-2836-2647</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2018-01, Vol.6, p.14474-14484 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_2455930240 |
source | IEEE Xplore Open Access Journals |
subjects | 5G mobile communication Algorithms Business Chains Computational modeling Computer architecture Domains Embedding Heuristic methods Hidden Markov models Internet of Vehicles Network latency Security Security services service function chaining Smart buildings software defined network Viterbi algorithm detectors Wireless networks |
title | Low Latency Security Function Chain Embedding Across Multiple Domains |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T21%3A18%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Low%20Latency%20Security%20Function%20Chain%20Embedding%20Across%20Multiple%20Domains&rft.jtitle=IEEE%20access&rft.au=Xu,%20Qi&rft.date=2018-01-01&rft.volume=6&rft.spage=14474&rft.epage=14484&rft.pages=14474-14484&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2791963&rft_dat=%3Cproquest_ieee_%3E2455930240%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455930240&rft_id=info:pmid/&rft_ieee_id=8254344&rfr_iscdi=true |