Loading…

Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment

In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network,...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on emerging topics in computing 2021-04, Vol.9 (2), p.866-877
Main Authors: Abdulqadder, Ihsan H., Zou, Deqing, Aziz, Israa T., Yuan, Bin, Dai, Weiqi
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3
cites cdi_FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3
container_end_page 877
container_issue 2
container_start_page 866
container_title IEEE transactions on emerging topics in computing
container_volume 9
creator Abdulqadder, Ihsan H.
Zou, Deqing
Aziz, Israa T.
Yuan, Bin
Dai, Weiqi
description In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network, two additional entities are introduced. For mobile users, initial authentication is provided at access points by an inventive Highly Secured Authentication and Handover Mechanism (HS-AOHM) scheme which minimizes handover latency without loss of user privacy. Then the authorized user packets are arrived at dispatcher in which a novel Tree Based Switch Assignment (TBSA) algorithm is incorporated. TBSA mitigates the flow table overloading attack by assigning packets to underloaded switches. In controller, DDoS attack is detected with the assist of entropy analysis. Then the suspicious packets are redirected to scrubbing Virtual Network Function (sVNF) in cloud. In sVNF, suspicious packets are classified into normal packets and malicious packets by using Hybrid Fuzzy with Artificial Neural Network (HF-ANN) classifier based on packet features. Normal packets are allowed to access applications whereas malicious packets are dropped at sVNF. Extensive simulation shows security improvement in 5G network in terms of handover latency, holding time, switch failure rate, detection accuracy, and delay.
doi_str_mv 10.1109/TETC.2018.2879714
format article
fullrecord <record><control><sourceid>proquest_ESBDL</sourceid><recordid>TN_cdi_proquest_journals_2536866156</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8523804</ieee_id><sourcerecordid>2536866156</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3</originalsourceid><addsrcrecordid>eNpNkNtKw0AQhhdRsNQ-gHiz4HXqTg57uNSeFEoFW71dkt0JpqbZukkqfXsTWsS5mRnmn3-Gj5BbYGMAph42s81kHDKQ41AKJSC-IIMQuAy4SNjlv_qajOp6y7qQwBUXA6KnuC_dcYdVQ11O31zW1g1do2l90Rzp2nziDmlR0fV0RZ_SGi1NFnSFzY_zX9Qd0NPV_IPOqjQru9mkdK3tukPhXdWb3pCrPC1rHJ3zkLzPu2-fg-Xr4mXyuAxMqKImkMKg5Tay1oKJWWKSEK1NlclAgMiUBUglKqlymYccRAypwozxNDYKLM-iIbk_-e69-26xbvTWtb7qTuowibjkHBLeqeCkMt7Vtcdc732xS_1RA9M9St2j1D1KfUbZ7dyddgpE_NPLJIwki6NfiQ9u7A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2536866156</pqid></control><display><type>article</type><title>Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment</title><source>IEEE Open Access Journals</source><creator>Abdulqadder, Ihsan H. ; Zou, Deqing ; Aziz, Israa T. ; Yuan, Bin ; Dai, Weiqi</creator><creatorcontrib>Abdulqadder, Ihsan H. ; Zou, Deqing ; Aziz, Israa T. ; Yuan, Bin ; Dai, Weiqi</creatorcontrib><description>In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network, two additional entities are introduced. For mobile users, initial authentication is provided at access points by an inventive Highly Secured Authentication and Handover Mechanism (HS-AOHM) scheme which minimizes handover latency without loss of user privacy. Then the authorized user packets are arrived at dispatcher in which a novel Tree Based Switch Assignment (TBSA) algorithm is incorporated. TBSA mitigates the flow table overloading attack by assigning packets to underloaded switches. In controller, DDoS attack is detected with the assist of entropy analysis. Then the suspicious packets are redirected to scrubbing Virtual Network Function (sVNF) in cloud. In sVNF, suspicious packets are classified into normal packets and malicious packets by using Hybrid Fuzzy with Artificial Neural Network (HF-ANN) classifier based on packet features. Normal packets are allowed to access applications whereas malicious packets are dropped at sVNF. Extensive simulation shows security improvement in 5G network in terms of handover latency, holding time, switch failure rate, detection accuracy, and delay.</description><identifier>ISSN: 2168-6750</identifier><identifier>EISSN: 2168-6750</identifier><identifier>DOI: 10.1109/TETC.2018.2879714</identifier><identifier>CODEN: ITETBT</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>5G mobile communication ; Algorithms ; Artificial neural networks ; Authentication ; cloud ; Cloud computing ; Cybersecurity ; DDoS ; Failure rates ; flow table ; Fuzzy logic ; Handover ; Network latency ; NFV ; Packet switching ; Privacy ; Robustness ; SDN ; Software-defined networking ; Switches ; Virtual networks ; Washing ; Wireless networks</subject><ispartof>IEEE transactions on emerging topics in computing, 2021-04, Vol.9 (2), p.866-877</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3</citedby><cites>FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3</cites><orcidid>0000-0001-8534-5048 ; 0000-0003-3629-0444 ; 0000-0002-5365-904X ; 0000-0003-0666-8231 ; 0000-0003-0727-0487</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8523804$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27610,27901,27902,54771,54908</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8523804$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Abdulqadder, Ihsan H.</creatorcontrib><creatorcontrib>Zou, Deqing</creatorcontrib><creatorcontrib>Aziz, Israa T.</creatorcontrib><creatorcontrib>Yuan, Bin</creatorcontrib><creatorcontrib>Dai, Weiqi</creatorcontrib><title>Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment</title><title>IEEE transactions on emerging topics in computing</title><addtitle>TETC</addtitle><description>In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network, two additional entities are introduced. For mobile users, initial authentication is provided at access points by an inventive Highly Secured Authentication and Handover Mechanism (HS-AOHM) scheme which minimizes handover latency without loss of user privacy. Then the authorized user packets are arrived at dispatcher in which a novel Tree Based Switch Assignment (TBSA) algorithm is incorporated. TBSA mitigates the flow table overloading attack by assigning packets to underloaded switches. In controller, DDoS attack is detected with the assist of entropy analysis. Then the suspicious packets are redirected to scrubbing Virtual Network Function (sVNF) in cloud. In sVNF, suspicious packets are classified into normal packets and malicious packets by using Hybrid Fuzzy with Artificial Neural Network (HF-ANN) classifier based on packet features. Normal packets are allowed to access applications whereas malicious packets are dropped at sVNF. Extensive simulation shows security improvement in 5G network in terms of handover latency, holding time, switch failure rate, detection accuracy, and delay.</description><subject>5G mobile communication</subject><subject>Algorithms</subject><subject>Artificial neural networks</subject><subject>Authentication</subject><subject>cloud</subject><subject>Cloud computing</subject><subject>Cybersecurity</subject><subject>DDoS</subject><subject>Failure rates</subject><subject>flow table</subject><subject>Fuzzy logic</subject><subject>Handover</subject><subject>Network latency</subject><subject>NFV</subject><subject>Packet switching</subject><subject>Privacy</subject><subject>Robustness</subject><subject>SDN</subject><subject>Software-defined networking</subject><subject>Switches</subject><subject>Virtual networks</subject><subject>Washing</subject><subject>Wireless networks</subject><issn>2168-6750</issn><issn>2168-6750</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNpNkNtKw0AQhhdRsNQ-gHiz4HXqTg57uNSeFEoFW71dkt0JpqbZukkqfXsTWsS5mRnmn3-Gj5BbYGMAph42s81kHDKQ41AKJSC-IIMQuAy4SNjlv_qajOp6y7qQwBUXA6KnuC_dcYdVQ11O31zW1g1do2l90Rzp2nziDmlR0fV0RZ_SGi1NFnSFzY_zX9Qd0NPV_IPOqjQru9mkdK3tukPhXdWb3pCrPC1rHJ3zkLzPu2-fg-Xr4mXyuAxMqKImkMKg5Tay1oKJWWKSEK1NlclAgMiUBUglKqlymYccRAypwozxNDYKLM-iIbk_-e69-26xbvTWtb7qTuowibjkHBLeqeCkMt7Vtcdc732xS_1RA9M9St2j1D1KfUbZ7dyddgpE_NPLJIwki6NfiQ9u7A</recordid><startdate>20210401</startdate><enddate>20210401</enddate><creator>Abdulqadder, Ihsan H.</creator><creator>Zou, Deqing</creator><creator>Aziz, Israa T.</creator><creator>Yuan, Bin</creator><creator>Dai, Weiqi</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-8534-5048</orcidid><orcidid>https://orcid.org/0000-0003-3629-0444</orcidid><orcidid>https://orcid.org/0000-0002-5365-904X</orcidid><orcidid>https://orcid.org/0000-0003-0666-8231</orcidid><orcidid>https://orcid.org/0000-0003-0727-0487</orcidid></search><sort><creationdate>20210401</creationdate><title>Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment</title><author>Abdulqadder, Ihsan H. ; Zou, Deqing ; Aziz, Israa T. ; Yuan, Bin ; Dai, Weiqi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>5G mobile communication</topic><topic>Algorithms</topic><topic>Artificial neural networks</topic><topic>Authentication</topic><topic>cloud</topic><topic>Cloud computing</topic><topic>Cybersecurity</topic><topic>DDoS</topic><topic>Failure rates</topic><topic>flow table</topic><topic>Fuzzy logic</topic><topic>Handover</topic><topic>Network latency</topic><topic>NFV</topic><topic>Packet switching</topic><topic>Privacy</topic><topic>Robustness</topic><topic>SDN</topic><topic>Software-defined networking</topic><topic>Switches</topic><topic>Virtual networks</topic><topic>Washing</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Abdulqadder, Ihsan H.</creatorcontrib><creatorcontrib>Zou, Deqing</creatorcontrib><creatorcontrib>Aziz, Israa T.</creatorcontrib><creatorcontrib>Yuan, Bin</creatorcontrib><creatorcontrib>Dai, Weiqi</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on emerging topics in computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Abdulqadder, Ihsan H.</au><au>Zou, Deqing</au><au>Aziz, Israa T.</au><au>Yuan, Bin</au><au>Dai, Weiqi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment</atitle><jtitle>IEEE transactions on emerging topics in computing</jtitle><stitle>TETC</stitle><date>2021-04-01</date><risdate>2021</risdate><volume>9</volume><issue>2</issue><spage>866</spage><epage>877</epage><pages>866-877</pages><issn>2168-6750</issn><eissn>2168-6750</eissn><coden>ITETBT</coden><abstract>In this Modern era, Software Defined Network (SDN), Network Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network, two additional entities are introduced. For mobile users, initial authentication is provided at access points by an inventive Highly Secured Authentication and Handover Mechanism (HS-AOHM) scheme which minimizes handover latency without loss of user privacy. Then the authorized user packets are arrived at dispatcher in which a novel Tree Based Switch Assignment (TBSA) algorithm is incorporated. TBSA mitigates the flow table overloading attack by assigning packets to underloaded switches. In controller, DDoS attack is detected with the assist of entropy analysis. Then the suspicious packets are redirected to scrubbing Virtual Network Function (sVNF) in cloud. In sVNF, suspicious packets are classified into normal packets and malicious packets by using Hybrid Fuzzy with Artificial Neural Network (HF-ANN) classifier based on packet features. Normal packets are allowed to access applications whereas malicious packets are dropped at sVNF. Extensive simulation shows security improvement in 5G network in terms of handover latency, holding time, switch failure rate, detection accuracy, and delay.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TETC.2018.2879714</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-8534-5048</orcidid><orcidid>https://orcid.org/0000-0003-3629-0444</orcidid><orcidid>https://orcid.org/0000-0002-5365-904X</orcidid><orcidid>https://orcid.org/0000-0003-0666-8231</orcidid><orcidid>https://orcid.org/0000-0003-0727-0487</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2168-6750
ispartof IEEE transactions on emerging topics in computing, 2021-04, Vol.9 (2), p.866-877
issn 2168-6750
2168-6750
language eng
recordid cdi_proquest_journals_2536866156
source IEEE Open Access Journals
subjects 5G mobile communication
Algorithms
Artificial neural networks
Authentication
cloud
Cloud computing
Cybersecurity
DDoS
Failure rates
flow table
Fuzzy logic
Handover
Network latency
NFV
Packet switching
Privacy
Robustness
SDN
Software-defined networking
Switches
Virtual networks
Washing
Wireless networks
title Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T19%3A36%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ESBDL&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Deployment%20of%20Robust%20Security%20Scheme%20in%20SDN%20Based%205G%20Network%20over%20NFV%20Enabled%20Cloud%20Environment&rft.jtitle=IEEE%20transactions%20on%20emerging%20topics%20in%20computing&rft.au=Abdulqadder,%20Ihsan%20H.&rft.date=2021-04-01&rft.volume=9&rft.issue=2&rft.spage=866&rft.epage=877&rft.pages=866-877&rft.issn=2168-6750&rft.eissn=2168-6750&rft.coden=ITETBT&rft_id=info:doi/10.1109/TETC.2018.2879714&rft_dat=%3Cproquest_ESBDL%3E2536866156%3C/proquest_ESBDL%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-87ced6d3ddd1c405c52edda9cb1717b9d11a8e989f8f261741a9eb06a4c91d6b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2536866156&rft_id=info:pmid/&rft_ieee_id=8523804&rfr_iscdi=true