Loading…

Low Latency Security Function Chain Embedding Across Multiple Domains

5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous w...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2018-01, Vol.6, p.14474-14484
Main Authors: Xu, Qi, Gao, Deyun, Li, Taixin, Zhang, Hongke
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43
cites cdi_FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43
container_end_page 14484
container_issue
container_start_page 14474
container_title IEEE access
container_volume 6
creator Xu, Qi
Gao, Deyun
Li, Taixin
Zhang, Hongke
description 5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous work, we proposed a SFC-based framework that chains security functions in different domains to provide security services on demand. However, creating cross-domain service function chains will inevitably result in the additional network latency. In this paper, we study this problem of minimizing the end-to-end latency when deploying cross-domain service function chains for 5G applications. First, an exact approach, consisting of service chain partition and service subchain embedding, is proposed to derive an optimal solution for cross-domain service function chain placement. Second, we improve the Viterbi algorithm and propose an efficient heuristic approach to derive near-optimal solutions for large networks. We also compare the performance of the proposed exact approach, the proposed heuristic approach, and the simple greedy approach in different scales of network infrastructures. Simulation results are presented to demonstrate the effectiveness of the proposed approaches.
doi_str_mv 10.1109/ACCESS.2018.2791963
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2455930240</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8254344</ieee_id><doaj_id>oai_doaj_org_article_d27f95f8e22e43ff999dbbde62d4a945</doaj_id><sourcerecordid>2455930240</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43</originalsourceid><addsrcrecordid>eNpNUE1PwkAQbYwmEuQXcGniGdzv7h5JBSWp8YCeN9vdKS6BLm7bGP69hRriXGby8t6bmZckU4zmGCP1tMjz5WYzJwjLOckUVoLeJCOChZpRTsXtv_k-mTTNDvUle4hno2RZhJ-0MC3U9pRuwHbRt6d01dW29aFO8y_j63R5KME5X2_ThY2hadK3bt_64x7S53DoCc1DcleZfQOTvz5OPlfLj_x1Vry_rPNFMbMMyXZmiSsJxUJyikyWWQSYCyUkUEmq0gmOMLacmkwaYoiTVogSKQKKsSpDhtFxsh58XTA7fYz-YOJJB-P1BQhxq01svd2DdiSrFK8kEAKMVpVSypWlA0EcM4rx3utx8DrG8N1B0-pd6GLdn68J41xRRBjqWXRgXR6PUF23YqTP8eshfn2OX__F36umg8oDwFUhCWeUMfoL-Ql_Ng</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455930240</pqid></control><display><type>article</type><title>Low Latency Security Function Chain Embedding Across Multiple Domains</title><source>IEEE Xplore Open Access Journals</source><creator>Xu, Qi ; Gao, Deyun ; Li, Taixin ; Zhang, Hongke</creator><creatorcontrib>Xu, Qi ; Gao, Deyun ; Li, Taixin ; Zhang, Hongke</creatorcontrib><description>5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous work, we proposed a SFC-based framework that chains security functions in different domains to provide security services on demand. However, creating cross-domain service function chains will inevitably result in the additional network latency. In this paper, we study this problem of minimizing the end-to-end latency when deploying cross-domain service function chains for 5G applications. First, an exact approach, consisting of service chain partition and service subchain embedding, is proposed to derive an optimal solution for cross-domain service function chain placement. Second, we improve the Viterbi algorithm and propose an efficient heuristic approach to derive near-optimal solutions for large networks. We also compare the performance of the proposed exact approach, the proposed heuristic approach, and the simple greedy approach in different scales of network infrastructures. Simulation results are presented to demonstrate the effectiveness of the proposed approaches.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2791963</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>5G mobile communication ; Algorithms ; Business ; Chains ; Computational modeling ; Computer architecture ; Domains ; Embedding ; Heuristic methods ; Hidden Markov models ; Internet of Vehicles ; Network latency ; Security ; Security services ; service function chaining ; Smart buildings ; software defined network ; Viterbi algorithm detectors ; Wireless networks</subject><ispartof>IEEE access, 2018-01, Vol.6, p.14474-14484</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43</citedby><cites>FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43</cites><orcidid>0000-0002-8641-4057 ; 0000-0003-2836-2647</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8254344$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,27633,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Xu, Qi</creatorcontrib><creatorcontrib>Gao, Deyun</creatorcontrib><creatorcontrib>Li, Taixin</creatorcontrib><creatorcontrib>Zhang, Hongke</creatorcontrib><title>Low Latency Security Function Chain Embedding Across Multiple Domains</title><title>IEEE access</title><addtitle>Access</addtitle><description>5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous work, we proposed a SFC-based framework that chains security functions in different domains to provide security services on demand. However, creating cross-domain service function chains will inevitably result in the additional network latency. In this paper, we study this problem of minimizing the end-to-end latency when deploying cross-domain service function chains for 5G applications. First, an exact approach, consisting of service chain partition and service subchain embedding, is proposed to derive an optimal solution for cross-domain service function chain placement. Second, we improve the Viterbi algorithm and propose an efficient heuristic approach to derive near-optimal solutions for large networks. We also compare the performance of the proposed exact approach, the proposed heuristic approach, and the simple greedy approach in different scales of network infrastructures. Simulation results are presented to demonstrate the effectiveness of the proposed approaches.</description><subject>5G mobile communication</subject><subject>Algorithms</subject><subject>Business</subject><subject>Chains</subject><subject>Computational modeling</subject><subject>Computer architecture</subject><subject>Domains</subject><subject>Embedding</subject><subject>Heuristic methods</subject><subject>Hidden Markov models</subject><subject>Internet of Vehicles</subject><subject>Network latency</subject><subject>Security</subject><subject>Security services</subject><subject>service function chaining</subject><subject>Smart buildings</subject><subject>software defined network</subject><subject>Viterbi algorithm detectors</subject><subject>Wireless networks</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUE1PwkAQbYwmEuQXcGniGdzv7h5JBSWp8YCeN9vdKS6BLm7bGP69hRriXGby8t6bmZckU4zmGCP1tMjz5WYzJwjLOckUVoLeJCOChZpRTsXtv_k-mTTNDvUle4hno2RZhJ-0MC3U9pRuwHbRt6d01dW29aFO8y_j63R5KME5X2_ThY2hadK3bt_64x7S53DoCc1DcleZfQOTvz5OPlfLj_x1Vry_rPNFMbMMyXZmiSsJxUJyikyWWQSYCyUkUEmq0gmOMLacmkwaYoiTVogSKQKKsSpDhtFxsh58XTA7fYz-YOJJB-P1BQhxq01svd2DdiSrFK8kEAKMVpVSypWlA0EcM4rx3utx8DrG8N1B0-pd6GLdn68J41xRRBjqWXRgXR6PUF23YqTP8eshfn2OX__F36umg8oDwFUhCWeUMfoL-Ql_Ng</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Xu, Qi</creator><creator>Gao, Deyun</creator><creator>Li, Taixin</creator><creator>Zhang, Hongke</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-8641-4057</orcidid><orcidid>https://orcid.org/0000-0003-2836-2647</orcidid></search><sort><creationdate>20180101</creationdate><title>Low Latency Security Function Chain Embedding Across Multiple Domains</title><author>Xu, Qi ; Gao, Deyun ; Li, Taixin ; Zhang, Hongke</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>5G mobile communication</topic><topic>Algorithms</topic><topic>Business</topic><topic>Chains</topic><topic>Computational modeling</topic><topic>Computer architecture</topic><topic>Domains</topic><topic>Embedding</topic><topic>Heuristic methods</topic><topic>Hidden Markov models</topic><topic>Internet of Vehicles</topic><topic>Network latency</topic><topic>Security</topic><topic>Security services</topic><topic>service function chaining</topic><topic>Smart buildings</topic><topic>software defined network</topic><topic>Viterbi algorithm detectors</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Qi</creatorcontrib><creatorcontrib>Gao, Deyun</creatorcontrib><creatorcontrib>Li, Taixin</creatorcontrib><creatorcontrib>Zhang, Hongke</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE/IET Electronic Library</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xu, Qi</au><au>Gao, Deyun</au><au>Li, Taixin</au><au>Zhang, Hongke</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Low Latency Security Function Chain Embedding Across Multiple Domains</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><spage>14474</spage><epage>14484</epage><pages>14474-14484</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home. The traditional way of providing security services is difficult to support these new 5G applications flexibly and effectively. In our previous work, we proposed a SFC-based framework that chains security functions in different domains to provide security services on demand. However, creating cross-domain service function chains will inevitably result in the additional network latency. In this paper, we study this problem of minimizing the end-to-end latency when deploying cross-domain service function chains for 5G applications. First, an exact approach, consisting of service chain partition and service subchain embedding, is proposed to derive an optimal solution for cross-domain service function chain placement. Second, we improve the Viterbi algorithm and propose an efficient heuristic approach to derive near-optimal solutions for large networks. We also compare the performance of the proposed exact approach, the proposed heuristic approach, and the simple greedy approach in different scales of network infrastructures. Simulation results are presented to demonstrate the effectiveness of the proposed approaches.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2791963</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-8641-4057</orcidid><orcidid>https://orcid.org/0000-0003-2836-2647</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2018-01, Vol.6, p.14474-14484
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_2455930240
source IEEE Xplore Open Access Journals
subjects 5G mobile communication
Algorithms
Business
Chains
Computational modeling
Computer architecture
Domains
Embedding
Heuristic methods
Hidden Markov models
Internet of Vehicles
Network latency
Security
Security services
service function chaining
Smart buildings
software defined network
Viterbi algorithm detectors
Wireless networks
title Low Latency Security Function Chain Embedding Across Multiple Domains
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T21%3A18%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Low%20Latency%20Security%20Function%20Chain%20Embedding%20Across%20Multiple%20Domains&rft.jtitle=IEEE%20access&rft.au=Xu,%20Qi&rft.date=2018-01-01&rft.volume=6&rft.spage=14474&rft.epage=14484&rft.pages=14474-14484&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2791963&rft_dat=%3Cproquest_ieee_%3E2455930240%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c408t-c2db23168530a77c0e156968e382fbd65011c53a78a2a2d8c66b092e944f70a43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455930240&rft_id=info:pmid/&rft_ieee_id=8254344&rfr_iscdi=true