Loading…
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment
In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network,...
Saved in:
Published in: | IEEE transactions on emerging topics in computing 2021-04, Vol.9 (2), p.866-877 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3 |
---|---|
cites | cdi_FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3 |
container_end_page | 877 |
container_issue | 2 |
container_start_page | 866 |
container_title | IEEE transactions on emerging topics in computing |
container_volume | 9 |
creator | Abdulqadder, Ihsan H. Zou, Deqing Aziz, Israa T. Yuan, Bin Dai, Weiqi |
description | In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network, two additional entities are introduced. For mobile users, initial authentication is provided at access points by an inventive Highly Secured Authentication and Handover Mechanism (HS-AOHM) scheme which minimizes handover latency without loss of user privacy. Then the authorized user packets are arrived at dispatcher in which a novel Tree Based Switch Assignment (TBSA) algorithm is incorporated. TBSA mitigates the flow table overloading attack by assigning packets to underloaded switches. In controller, DDoS attack is detected with the assist of entropy analysis. Then the suspicious packets are redirected to scrubbing Virtual Network Function (sVNF) in cloud. In sVNF, suspicious packets are classified into normal packets and malicious packets by using Hybrid Fuzzy with Artificial Neural Network (HF-ANN) classifier based on packet features. Normal packets are allowed to access applications whereas malicious packets are dropped at sVNF. Extensive simulation shows security improvement in 5G network in terms of handover latency, holding time, switch failure rate, detection accuracy, and delay. |
doi_str_mv | 10.1109/TETC.2018.2879714 |
format | article |
fullrecord | <record><control><sourceid>proquest_ESBDL</sourceid><recordid>TN_cdi_proquest_journals_2536866156</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8523804</ieee_id><sourcerecordid>2536866156</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3</originalsourceid><addsrcrecordid>eNpNkNtKw0AQhhdRsNQ-gHiz4HXqTg57uNSeFEoFW71dkt0JpqbZukkqfXsTWsS5mRnmn3-Gj5BbYGMAph42s81kHDKQ41AKJSC-IIMQuAy4SNjlv_qajOp6y7qQwBUXA6KnuC_dcYdVQ11O31zW1g1do2l90Rzp2nziDmlR0fV0RZ_SGi1NFnSFzY_zX9Qd0NPV_IPOqjQru9mkdK3tukPhXdWb3pCrPC1rHJ3zkLzPu2-fg-Xr4mXyuAxMqKImkMKg5Tay1oKJWWKSEK1NlclAgMiUBUglKqlymYccRAypwozxNDYKLM-iIbk_-e69-26xbvTWtb7qTuowibjkHBLeqeCkMt7Vtcdc732xS_1RA9M9St2j1D1KfUbZ7dyddgpE_NPLJIwki6NfiQ9u7A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2536866156</pqid></control><display><type>article</type><title>Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment</title><source>IEEE Open Access Journals</source><creator>Abdulqadder, Ihsan H. ; Zou, Deqing ; Aziz, Israa T. ; Yuan, Bin ; Dai, Weiqi</creator><creatorcontrib>Abdulqadder, Ihsan H. ; Zou, Deqing ; Aziz, Israa T. ; Yuan, Bin ; Dai, Weiqi</creatorcontrib><description>In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network, two additional entities are introduced. For mobile users, initial authentication is provided at access points by an inventive Highly Secured Authentication and Handover Mechanism (HS-AOHM) scheme which minimizes handover latency without loss of user privacy. Then the authorized user packets are arrived at dispatcher in which a novel Tree Based Switch Assignment (TBSA) algorithm is incorporated. TBSA mitigates the flow table overloading attack by assigning packets to underloaded switches. In controller, DDoS attack is detected with the assist of entropy analysis. Then the suspicious packets are redirected to scrubbing Virtual Network Function (sVNF) in cloud. In sVNF, suspicious packets are classified into normal packets and malicious packets by using Hybrid Fuzzy with Artificial Neural Network (HF-ANN) classifier based on packet features. Normal packets are allowed to access applications whereas malicious packets are dropped at sVNF. Extensive simulation shows security improvement in 5G network in terms of handover latency, holding time, switch failure rate, detection accuracy, and delay.</description><identifier>ISSN: 2168-6750</identifier><identifier>EISSN: 2168-6750</identifier><identifier>DOI: 10.1109/TETC.2018.2879714</identifier><identifier>CODEN: ITETBT</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>5G mobile communication ; Algorithms ; Artificial neural networks ; Authentication ; cloud ; Cloud computing ; Cybersecurity ; DDoS ; Failure rates ; flow table ; Fuzzy logic ; Handover ; Network latency ; NFV ; Packet switching ; Privacy ; Robustness ; SDN ; Software-defined networking ; Switches ; Virtual networks ; Washing ; Wireless networks</subject><ispartof>IEEE transactions on emerging topics in computing, 2021-04, Vol.9 (2), p.866-877</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3</citedby><cites>FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3</cites><orcidid>0000-0001-8534-5048 ; 0000-0003-3629-0444 ; 0000-0002-5365-904X ; 0000-0003-0666-8231 ; 0000-0003-0727-0487</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8523804$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27610,27901,27902,54771,54908</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8523804$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Abdulqadder, Ihsan H.</creatorcontrib><creatorcontrib>Zou, Deqing</creatorcontrib><creatorcontrib>Aziz, Israa T.</creatorcontrib><creatorcontrib>Yuan, Bin</creatorcontrib><creatorcontrib>Dai, Weiqi</creatorcontrib><title>Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment</title><title>IEEE transactions on emerging topics in computing</title><addtitle>TETC</addtitle><description>In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network, two additional entities are introduced. For mobile users, initial authentication is provided at access points by an inventive Highly Secured Authentication and Handover Mechanism (HS-AOHM) scheme which minimizes handover latency without loss of user privacy. Then the authorized user packets are arrived at dispatcher in which a novel Tree Based Switch Assignment (TBSA) algorithm is incorporated. TBSA mitigates the flow table overloading attack by assigning packets to underloaded switches. In controller, DDoS attack is detected with the assist of entropy analysis. Then the suspicious packets are redirected to scrubbing Virtual Network Function (sVNF) in cloud. In sVNF, suspicious packets are classified into normal packets and malicious packets by using Hybrid Fuzzy with Artificial Neural Network (HF-ANN) classifier based on packet features. Normal packets are allowed to access applications whereas malicious packets are dropped at sVNF. Extensive simulation shows security improvement in 5G network in terms of handover latency, holding time, switch failure rate, detection accuracy, and delay.</description><subject>5G mobile communication</subject><subject>Algorithms</subject><subject>Artificial neural networks</subject><subject>Authentication</subject><subject>cloud</subject><subject>Cloud computing</subject><subject>Cybersecurity</subject><subject>DDoS</subject><subject>Failure rates</subject><subject>flow table</subject><subject>Fuzzy logic</subject><subject>Handover</subject><subject>Network latency</subject><subject>NFV</subject><subject>Packet switching</subject><subject>Privacy</subject><subject>Robustness</subject><subject>SDN</subject><subject>Software-defined networking</subject><subject>Switches</subject><subject>Virtual networks</subject><subject>Washing</subject><subject>Wireless networks</subject><issn>2168-6750</issn><issn>2168-6750</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNpNkNtKw0AQhhdRsNQ-gHiz4HXqTg57uNSeFEoFW71dkt0JpqbZukkqfXsTWsS5mRnmn3-Gj5BbYGMAph42s81kHDKQ41AKJSC-IIMQuAy4SNjlv_qajOp6y7qQwBUXA6KnuC_dcYdVQ11O31zW1g1do2l90Rzp2nziDmlR0fV0RZ_SGi1NFnSFzY_zX9Qd0NPV_IPOqjQru9mkdK3tukPhXdWb3pCrPC1rHJ3zkLzPu2-fg-Xr4mXyuAxMqKImkMKg5Tay1oKJWWKSEK1NlclAgMiUBUglKqlymYccRAypwozxNDYKLM-iIbk_-e69-26xbvTWtb7qTuowibjkHBLeqeCkMt7Vtcdc732xS_1RA9M9St2j1D1KfUbZ7dyddgpE_NPLJIwki6NfiQ9u7A</recordid><startdate>20210401</startdate><enddate>20210401</enddate><creator>Abdulqadder, Ihsan H.</creator><creator>Zou, Deqing</creator><creator>Aziz, Israa T.</creator><creator>Yuan, Bin</creator><creator>Dai, Weiqi</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-8534-5048</orcidid><orcidid>https://orcid.org/0000-0003-3629-0444</orcidid><orcidid>https://orcid.org/0000-0002-5365-904X</orcidid><orcidid>https://orcid.org/0000-0003-0666-8231</orcidid><orcidid>https://orcid.org/0000-0003-0727-0487</orcidid></search><sort><creationdate>20210401</creationdate><title>Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment</title><author>Abdulqadder, Ihsan H. ; Zou, Deqing ; Aziz, Israa T. ; Yuan, Bin ; Dai, Weiqi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>5G mobile communication</topic><topic>Algorithms</topic><topic>Artificial neural networks</topic><topic>Authentication</topic><topic>cloud</topic><topic>Cloud computing</topic><topic>Cybersecurity</topic><topic>DDoS</topic><topic>Failure rates</topic><topic>flow table</topic><topic>Fuzzy logic</topic><topic>Handover</topic><topic>Network latency</topic><topic>NFV</topic><topic>Packet switching</topic><topic>Privacy</topic><topic>Robustness</topic><topic>SDN</topic><topic>Software-defined networking</topic><topic>Switches</topic><topic>Virtual networks</topic><topic>Washing</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Abdulqadder, Ihsan H.</creatorcontrib><creatorcontrib>Zou, Deqing</creatorcontrib><creatorcontrib>Aziz, Israa T.</creatorcontrib><creatorcontrib>Yuan, Bin</creatorcontrib><creatorcontrib>Dai, Weiqi</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on emerging topics in computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Abdulqadder, Ihsan H.</au><au>Zou, Deqing</au><au>Aziz, Israa T.</au><au>Yuan, Bin</au><au>Dai, Weiqi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment</atitle><jtitle>IEEE transactions on emerging topics in computing</jtitle><stitle>TETC</stitle><date>2021-04-01</date><risdate>2021</risdate><volume>9</volume><issue>2</issue><spage>866</spage><epage>877</epage><pages>866-877</pages><issn>2168-6750</issn><eissn>2168-6750</eissn><coden>ITETBT</coden><abstract>In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network, two additional entities are introduced. For mobile users, initial authentication is provided at access points by an inventive Highly Secured Authentication and Handover Mechanism (HS-AOHM) scheme which minimizes handover latency without loss of user privacy. Then the authorized user packets are arrived at dispatcher in which a novel Tree Based Switch Assignment (TBSA) algorithm is incorporated. TBSA mitigates the flow table overloading attack by assigning packets to underloaded switches. In controller, DDoS attack is detected with the assist of entropy analysis. Then the suspicious packets are redirected to scrubbing Virtual Network Function (sVNF) in cloud. In sVNF, suspicious packets are classified into normal packets and malicious packets by using Hybrid Fuzzy with Artificial Neural Network (HF-ANN) classifier based on packet features. Normal packets are allowed to access applications whereas malicious packets are dropped at sVNF. Extensive simulation shows security improvement in 5G network in terms of handover latency, holding time, switch failure rate, detection accuracy, and delay.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TETC.2018.2879714</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-8534-5048</orcidid><orcidid>https://orcid.org/0000-0003-3629-0444</orcidid><orcidid>https://orcid.org/0000-0002-5365-904X</orcidid><orcidid>https://orcid.org/0000-0003-0666-8231</orcidid><orcidid>https://orcid.org/0000-0003-0727-0487</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2168-6750 |
ispartof | IEEE transactions on emerging topics in computing, 2021-04, Vol.9 (2), p.866-877 |
issn | 2168-6750 2168-6750 |
language | eng |
recordid | cdi_proquest_journals_2536866156 |
source | IEEE Open Access Journals |
subjects | 5G mobile communication Algorithms Artificial neural networks Authentication cloud Cloud computing Cybersecurity DDoS Failure rates flow table Fuzzy logic Handover Network latency NFV Packet switching Privacy Robustness SDN Software-defined networking Switches Virtual networks Washing Wireless networks |
title | Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T19%3A36%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ESBDL&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Deployment%20of%20Robust%20Security%20Scheme%20in%20SDN%20Based%205G%20Network%20over%20NFV%20Enabled%20Cloud%20Environment&rft.jtitle=IEEE%20transactions%20on%20emerging%20topics%20in%20computing&rft.au=Abdulqadder,%20Ihsan%20H.&rft.date=2021-04-01&rft.volume=9&rft.issue=2&rft.spage=866&rft.epage=877&rft.pages=866-877&rft.issn=2168-6750&rft.eissn=2168-6750&rft.coden=ITETBT&rft_id=info:doi/10.1109/TETC.2018.2879714&rft_dat=%3Cproquest_ESBDL%3E2536866156%3C/proquest_ESBDL%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2536866156&rft_id=info:pmid/&rft_ieee_id=8523804&rfr_iscdi=true |