2022
DOI: 10.1038/s41598-022-14494-2
|View full text |Cite
|
Sign up to set email alerts
|

A security-aware service function chain deployment method for load balance and delay optimization

Abstract: Network function virtualization (NFV) decouples network functions from hardware devices. However, it introduces security challenges due to its reliance on software, which facilitates attacks. This security problem has a significant negative impact on the interests of users. Existing deployment methods are not suitable for SFC requests with a security demand, causing the use of substrate resources unreasonable and lower acceptance ratio. Moreover, a strict delay requirement is another challenge for NFV. To make… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…Equation (19) ensures that a VNF in the SFC can only be mapped to one underlying node, preventing VNF segmentation. Equation (20) ensures that the virtual link can be mapped on one or more physical links.…”
Section: Target Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Equation (19) ensures that a VNF in the SFC can only be mapped to one underlying node, preventing VNF segmentation. Equation (20) ensures that the virtual link can be mapped on one or more physical links.…”
Section: Target Optimizationmentioning
confidence: 99%
“…Equation ( 23) is the computational resource constraint. To achieve load balancing, it is ensured that the computing resource consumption of each node does not exceed 90% of its computing resource capacity [19]. Because the software-based VNF occupies fewer storage resources [20], this paper does not consider it, but only considers the computing resources.…”
Section: Target Optimizationmentioning
confidence: 99%
“…Based on Dijkstra's algorithm for finding the shortest path, it removes each link in the shortest path, in turn, recalculates the shortest path from the source point to the target point, and repeats until k paths are found. This method is widely used in the routing of the Service Function Chain (SFC) [5][6][7] . This strategy can avoid a large number of unnecessary search paths, improve the algorithm efficiency, and thus improve link utilization.…”
Section: Introductionmentioning
confidence: 99%