基于安全信任的网络切片部署策略研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on network slicing deployment strategy based on security trust
  • 作者:牛犇 ; 游伟 ; 汤红波
  • 英文作者:Niu Ben;You Wei;Tang Hongbo;National Digital Switching System Engineering & Technological R&D Center;
  • 关键词:第五代移动通信 ; 网络切片 ; 安全信任 ; 部署
  • 英文关键词:5G;;network slicing;;security trust;;deployment
  • 中文刊名:JSYJ
  • 英文刊名:Application Research of Computers
  • 机构:国家数字交换系统工程技术研究中心;
  • 出版日期:2018-02-08 17:55
  • 出版单位:计算机应用研究
  • 年:2019
  • 期:v.36;No.328
  • 基金:国家重点研发计划项目(2016YFB0801605)
  • 语种:中文;
  • 页:JSYJ201902057
  • 页数:6
  • CN:02
  • ISSN:51-1196/TP
  • 分类号:260-265
摘要
5G移动通信网虚拟化场景下,如何安全部署网络切片是未来5G大规模商用的前提。针对5G网络切片部署的安全性,提出一种基于安全信任的网络切片部署策略。该部署策略通过提出安全信任值概念来有效量化分析VNF和网络资源的安全性,并以此为基础,利用0-1整数线性规划方法构建网络切片部署的数学模型,利用启发式算法进行求解,找到网络切片部署成本最小的部署方案。仿真实验表明,该部署策略在保证部署安全的前提下,减少了部署成本,同时获得了较好的安全收益和部署收益率。
        In the 5G mobile communication network virtualization scenario,how to deploy network slices safely is a prerequisite for future large-scale commercial use. Aiming at the security of 5G network slice deployment,this paper proposed a strategy for network slicing deployment based on security trust. The deployment strategy could effectively quantify and analyze the security of VNF and network resources by proposing the concept of security trust value,and on this basis,it constructed the mathematical model of network slice deployment using 0-1 integer linear programming method. The strategy used heuristic algorithm to find the minimum cost of network slice deployment. Simulation results show that the deployment strategy reduces the deployment cost and achieves better security revenue and deployment rate of return under the premise of ensuring the deployment security.
引文
[1] China Mobile Communications Corporation. 5G service-guaranteed network slicing new white paper[S]. 2017.
    [2]陈山枝.发展5G的分析与建议[J].电信科学,2016,32(7):1-10.(Chen Shanzhi. Analysis and suggestion of future 5G directions[J]. Telecommunications Science,2016,32(7):1-10.)
    [3] Fischer A,De Meer H. Position paper:secure virtual network embedding[J]. Praxis der Informationsverarbeitung und Kommunikation,2011,34(4):190-193.
    [4] Aljuhani A,Alharbi T. Virtualized network functions security attacks and vulnerabilities[C]//Proc of the 7th IEEE Annual Computing and Communication Workshop and Conference. Piscataway,NJ:IEEE Press,2017:1-4.
    [5]汤红波,袁泉,卢干强,等.一种支持节点分割的v EPC虚拟网络功能部署模型[J].电子与信息学报,2017,39(3):546-553.(Tang Hongbo,Yuan Quan,Lu Ganqiang,et al. A model for virtualized network function deployment based on node-plitting in v EPC[J]. Journal of Electronics&Information Technology,2017,39(3):546-553.)
    [6] Baumgartner A,Reddy V S,Bauschert T. Mobile core network virtualization:a model for combined virtual core network function placement and topology optimization[C]//Proc of the 1st IEEE Conference on Network Softwarization. Piscataway,NJ:IEEE Press,2015:1-9.
    [7] Otokura M,Leibnitz K,Koizumi Y,et al. Application of evolutionary mechanism to dynamic virtual network function placement[C]//Proc of the 24th IEEE ICNP Workshop on CoolSDN. Piscataway,NJ:IEEE Press,2016:1-6.
    [8] Cao Jinyue,Zhang Yan,Wei An,et al. VNF-FG design and VNF placement for 5G mobile networks[J]. Science China Information Sciences,2017,60(4):17-31.
    [9] Cohen R,Lewin-Eytan L,Naor J S,et al. Near optimal placement of virtual network functions[C]//Proc of IEEE Conference on Computer Communications. Piscataway,NJ:IEEE Press,2015:1346-1354.
    [10]Luizelli M C,Bays L R,Buriol L S,et al. Piecing together the NFV provisioning puzzle:efficient placement and chaining of virtual network functions[C]//Proc of IFIP/IEEE International Symposium on Integrated Network Management. Piscataway,NJ:IEEE Press,2015:98-106.
    [11]Moens H,Turck F D. VNF-P:a model for efficient placement of virtualized network functions[C]//Proc of International Conference on Network and Service Management. Piscataway,NJ:IEEE Press,2014:418-423.
    [12]Luizelli M C,Cordeiro W L D C,Buriol L S,et al. A fix-and-optimize approach for efficient and large scale virtual network function placement and chaining[J]. Computer Communications,2016,10(2):67-77.
    [13]Ghaznavi M,Khan A,Shahriar N,et al. Elastic virtual network function placement[C]//Proc of the 4th International Conference on Cloud Networking. Piscataway,NJ:IEEE Press,2015:255-260.
    [14]Ravindran R,Chakraborti A,Amin S O,et al. 5G-ICN:delivering ICN services over 5G using network slicing[J]. IEEE Communications Magazine,2017,55(5):101-107.
    [15]Zhou Xuan,Li Rongpeng,Chen Tao,et al. Network slicing as a service:enabling enterprises’own software-defined cellular networks[J].IEEE Communications Magazine,2016,54(7):146-153.
    [16]Nikaein N,Schiller E,Favraud R,et al. Network store:exploring slicing in future 5G networks[C]//Proc of International Workshop on Mobility in the Evolving Internet Architecture. New York:ACM Press,2015:8-13.
    [17]汪京培,孙斌,钮心忻,等.基于可信建模过程的信任模型评估算法[J].清华大学学报:自然科学版,2013,53(12):1699-1707.(Wang Jingpei,Sun Bin,Niu Xinxin,et al. A trust model evaluation algorithm based on trusted modeling process[J]. Journal of Tsinghua University:Science and Technology,2013,53(12):1699-1707.)
    [18]孟顺梅.云计算环境下可信服务组合及其关键技术研究[D].南京:南京大学,2016.(Meng Shunmei. Trusted service composition and its key technologies in cloud environment[D]. Nanjing:Nanjing University,2016.)
    [19]Wasserman S,Faust K. Social network analysis:methods and applications[M]. Beijing:China People’s University Press,2012:42-64.
    [20] Shao Wenwu,Hu Wangbin,Huang Xunjia. A new implicit enumeration method for linear 0-1 programming[C]//Proc of International Workshop on Modelling,Simulation and Optimization. Piscataway,NJ:IEEE Press,2008:298-301.
    [21]Geoffrion A M. An improved implicit enumeration approach for integer programming[J]. Operations Research,1969,17(3):437-454.
    [22]Wang Jun,Li Duan. A new implicit enumeration method for polynomial 0-1 programming and applications[J]. System Engineering Theory and Practice,2007,27(3):21-27,35.
    [23]Harrington P. Machine learning in action[M]. Beijing:The People’s Posts and Telecommunications Press,2013:15-31.
    [24]3GPP. 3rd generation partnership project; technical specification group services and system aspects; procedures for the 5G system;Rel. 15,TR23. 501[R]. 2017.
    [25]Yu Minlan,Yi Y,Rexford J,et al. Rethinking virtual network embedding:substrate support for path splitting and migration[J]. ACM SIGCOMM Computer Communication Review,2008,38(2):17-29.
    [26]彭利民.基于最小代价的跨域虚拟网络映射算法[J].华南理工大学学报:自然科学版,2015,43(9):67-73.(Peng Limin. Analysis of critical load and width of plate-shaped buckling under tension[J].Journal of South China University of Technology:Natural Science Edition,2015,43(9):67-73.)

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700