2015
DOI: 10.1002/sec.1243
|View full text |Cite
|
Sign up to set email alerts
|

A security and trust framework for virtualized networks and software-defined networking

Abstract: With the great success of the second‐generation wireless telephone technology and the third‐generation mobile telecommunications technology, and the fast development of the fourth‐generation mobile telecommunications technology, the phase of fifth‐generation mobile networks or fifth‐generation wireless systems (5G) is coming. In this article, we indicate the open research issues of 5G security and trust in the context of virtualized networking and software‐defined networking. We further propose a framework of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0
2

Year Published

2016
2016
2020
2020

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 125 publications
(71 citation statements)
references
References 34 publications
(45 reference statements)
0
69
0
2
Order By: Relevance
“…Flow correlation information is utilized by Zhang et al [10][11][12] to further improve the classification accuracy considering only a small number of training instances based on K-Nearest-Neighbor and Naive Bayes classifiers that are used to detect anomalies in the network. Yan et al [13] propose a framework of security and trust for 5G based on the perspective that the next generation network functions will be highly virtualized and software defined networking is applied for traffic control. The proposed approach by the researchers utilizes adaptive trust evaluation and management technologies as well as sustainable trusted computing technologies to achieve computing platform trust and software defined networking security.…”
Section: Anomaly Detection Techniquesmentioning
confidence: 99%
“…Flow correlation information is utilized by Zhang et al [10][11][12] to further improve the classification accuracy considering only a small number of training instances based on K-Nearest-Neighbor and Naive Bayes classifiers that are used to detect anomalies in the network. Yan et al [13] propose a framework of security and trust for 5G based on the perspective that the next generation network functions will be highly virtualized and software defined networking is applied for traffic control. The proposed approach by the researchers utilizes adaptive trust evaluation and management technologies as well as sustainable trusted computing technologies to achieve computing platform trust and software defined networking security.…”
Section: Anomaly Detection Techniquesmentioning
confidence: 99%
“…All forms of network configuration requests emanating from the controllers are subject to comparison and only sent to the network if found sufficiently consistent and trustable. Accordingly, Yan et al [28] also proposed a framework for 5G security and trust in a virtualized networking setting. Trust in computing platform and SDN security is ensured by applying adaptive trust evaluation, management and viable trusted computing technologies.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, while [26] enforces application authorization to protect the network, [27] and [16] protect the network against the threats from compromised/malicious applications. In addition, [18] and [28] deals with the use of trust between SDN entities to protect the SDN. Though the approach in [15] is not related to SDN, this paper is going to adopt the trust establishment system as a guide to the design of our trust model for SDN controllerapplications.…”
Section: Related Workmentioning
confidence: 99%
“…In [32], a resource allocation mechanism was proposed in selforganizing LTE, which might be useful when LTE is adopted for inter-vehicle communications. Many researchers have attempted to enhance security of vehicular networks [31,37,38,41,43,44,46]. In [31], the authors focused on security problems in Internet of Things (IoT), in which vehicles are one of main elements.…”
Section: Mechanisms For Improving Vehicular Networkmentioning
confidence: 99%