Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization

In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and sec...

Full description

Bibliographic Details
Main Author: Ali Jasim Ramadhan Al-Aameri
Format: Article
Language:English
Published: IIUM Press, International Islamic University Malaysia 2022-07-01
Series:International Islamic University Malaysia Engineering Journal
Subjects:
Online Access:https://journals.iium.edu.my/ejournal/index.php/iiumej/article/view/1763
_version_ 1818116839272611840
author Ali Jasim Ramadhan Al-Aameri
author_facet Ali Jasim Ramadhan Al-Aameri
author_sort Ali Jasim Ramadhan Al-Aameri
collection DOAJ
description In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and secure slicing over the virtualization of 5G networks enabled by software-defined network/network functions. In the proposed method (called T-S3RA), to authenticate user devices, Boolean logic is used with key derivation based on passwords. Moreover, the traffic arrangement is based on the 5G access points. To implement secure resource allocation and network slicing, deep learning models are used. Renyi entropy computation is employed to predict the DDoS attackers. Through the experimental results, the effectiveness of the presented approach is proved. ABSTRAK: Melalui komunikasi 5G, kadar data yang tinggi dan latensi yang rendah amat diperlukan kerana kadar trafik yang tinggi. Walaupun pembaziran sumber dapat dielakkan melalui pemotongan selamat, rangkaian yang dipotong sering dieksploitasi oleh penyerang DDoS. Oleh itu, kajian ini menyediakan persekitaran sedar-trafik bagi peruntukan sumber dan pemotongan selamat ke atas rangkaian 5G secara maya melalui fungsi rangkaian takrif-perisian. Melaui pendekatan yang dicadangkan (iaitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan logik Boolean dengan perolehan kunci berdasarkan kata laluan. Di samping itu, susunan trafik adalah berdasarkan titik akses 5G. Bagi melaksanakan peruntukan sumber yang selamat dan pemotongan rangkaian, model pembelajaran mendalam telah digunakan. Pengiraan Entropi Renyi dibuat bagi meramal penyerang DDoS. Dapatan eksperimen mengesahkan keberkesanan pendekatan yang dicadangkan.
first_indexed 2024-12-11T04:28:53Z
format Article
id doaj.art-384dfdf13e07419e84d576bf1092862b
institution Directory Open Access Journal
issn 1511-788X
2289-7860
language English
last_indexed 2024-12-11T04:28:53Z
publishDate 2022-07-01
publisher IIUM Press, International Islamic University Malaysia
record_format Article
series International Islamic University Malaysia Engineering Journal
spelling doaj.art-384dfdf13e07419e84d576bf1092862b2022-12-22T01:20:55ZengIIUM Press, International Islamic University MalaysiaInternational Islamic University Malaysia Engineering Journal1511-788X2289-78602022-07-0123210.31436/iiumej.v23i2.1763Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions VirtualizationAli Jasim Ramadhan Al-Aameri0University of Alkafeel In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and secure slicing over the virtualization of 5G networks enabled by software-defined network/network functions. In the proposed method (called T-S3RA), to authenticate user devices, Boolean logic is used with key derivation based on passwords. Moreover, the traffic arrangement is based on the 5G access points. To implement secure resource allocation and network slicing, deep learning models are used. Renyi entropy computation is employed to predict the DDoS attackers. Through the experimental results, the effectiveness of the presented approach is proved. ABSTRAK: Melalui komunikasi 5G, kadar data yang tinggi dan latensi yang rendah amat diperlukan kerana kadar trafik yang tinggi. Walaupun pembaziran sumber dapat dielakkan melalui pemotongan selamat, rangkaian yang dipotong sering dieksploitasi oleh penyerang DDoS. Oleh itu, kajian ini menyediakan persekitaran sedar-trafik bagi peruntukan sumber dan pemotongan selamat ke atas rangkaian 5G secara maya melalui fungsi rangkaian takrif-perisian. Melaui pendekatan yang dicadangkan (iaitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan logik Boolean dengan perolehan kunci berdasarkan kata laluan. Di samping itu, susunan trafik adalah berdasarkan titik akses 5G. Bagi melaksanakan peruntukan sumber yang selamat dan pemotongan rangkaian, model pembelajaran mendalam telah digunakan. Pengiraan Entropi Renyi dibuat bagi meramal penyerang DDoS. Dapatan eksperimen mengesahkan keberkesanan pendekatan yang dicadangkan. https://journals.iium.edu.my/ejournal/index.php/iiumej/article/view/1763Deep learningdynamic offloadingnetwork slicingresource allocationtraffic scheduling
spellingShingle Ali Jasim Ramadhan Al-Aameri
Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization
International Islamic University Malaysia Engineering Journal
Deep learning
dynamic offloading
network slicing
resource allocation
traffic scheduling
title Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization
title_full Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization
title_fullStr Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization
title_full_unstemmed Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization
title_short Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization
title_sort secure slicing and allocation of resources of 5g networks in software defined networking network functions virtualization
topic Deep learning
dynamic offloading
network slicing
resource allocation
traffic scheduling
url https://journals.iium.edu.my/ejournal/index.php/iiumej/article/view/1763
work_keys_str_mv AT alijasimramadhanalaameri secureslicingandallocationofresourcesof5gnetworksinsoftwaredefinednetworkingnetworkfunctionsvirtualization