Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization
In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and sec...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
IIUM Press, International Islamic University Malaysia
2022-07-01
|
Series: | International Islamic University Malaysia Engineering Journal |
Subjects: | |
Online Access: | https://journals.iium.edu.my/ejournal/index.php/iiumej/article/view/1763 |
_version_ | 1818116839272611840 |
---|---|
author | Ali Jasim Ramadhan Al-Aameri |
author_facet | Ali Jasim Ramadhan Al-Aameri |
author_sort | Ali Jasim Ramadhan Al-Aameri |
collection | DOAJ |
description |
In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and secure slicing over the virtualization of 5G networks enabled by software-defined network/network functions. In the proposed method (called T-S3RA), to authenticate user devices, Boolean logic is used with key derivation based on passwords. Moreover, the traffic arrangement is based on the 5G access points. To implement secure resource allocation and network slicing, deep learning models are used. Renyi entropy computation is employed to predict the DDoS attackers. Through the experimental results, the effectiveness of the presented approach is proved.
ABSTRAK: Melalui komunikasi 5G, kadar data yang tinggi dan latensi yang rendah amat diperlukan kerana kadar trafik yang tinggi. Walaupun pembaziran sumber dapat dielakkan melalui pemotongan selamat, rangkaian yang dipotong sering dieksploitasi oleh penyerang DDoS. Oleh itu, kajian ini menyediakan persekitaran sedar-trafik bagi peruntukan sumber dan pemotongan selamat ke atas rangkaian 5G secara maya melalui fungsi rangkaian takrif-perisian. Melaui pendekatan yang dicadangkan (iaitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan logik Boolean dengan perolehan kunci berdasarkan kata laluan. Di samping itu, susunan trafik adalah berdasarkan titik akses 5G. Bagi melaksanakan peruntukan sumber yang selamat dan pemotongan rangkaian, model pembelajaran mendalam telah digunakan. Pengiraan Entropi Renyi dibuat bagi meramal penyerang DDoS. Dapatan eksperimen mengesahkan keberkesanan pendekatan yang dicadangkan.
|
first_indexed | 2024-12-11T04:28:53Z |
format | Article |
id | doaj.art-384dfdf13e07419e84d576bf1092862b |
institution | Directory Open Access Journal |
issn | 1511-788X 2289-7860 |
language | English |
last_indexed | 2024-12-11T04:28:53Z |
publishDate | 2022-07-01 |
publisher | IIUM Press, International Islamic University Malaysia |
record_format | Article |
series | International Islamic University Malaysia Engineering Journal |
spelling | doaj.art-384dfdf13e07419e84d576bf1092862b2022-12-22T01:20:55ZengIIUM Press, International Islamic University MalaysiaInternational Islamic University Malaysia Engineering Journal1511-788X2289-78602022-07-0123210.31436/iiumej.v23i2.1763Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions VirtualizationAli Jasim Ramadhan Al-Aameri0University of Alkafeel In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and secure slicing over the virtualization of 5G networks enabled by software-defined network/network functions. In the proposed method (called T-S3RA), to authenticate user devices, Boolean logic is used with key derivation based on passwords. Moreover, the traffic arrangement is based on the 5G access points. To implement secure resource allocation and network slicing, deep learning models are used. Renyi entropy computation is employed to predict the DDoS attackers. Through the experimental results, the effectiveness of the presented approach is proved. ABSTRAK: Melalui komunikasi 5G, kadar data yang tinggi dan latensi yang rendah amat diperlukan kerana kadar trafik yang tinggi. Walaupun pembaziran sumber dapat dielakkan melalui pemotongan selamat, rangkaian yang dipotong sering dieksploitasi oleh penyerang DDoS. Oleh itu, kajian ini menyediakan persekitaran sedar-trafik bagi peruntukan sumber dan pemotongan selamat ke atas rangkaian 5G secara maya melalui fungsi rangkaian takrif-perisian. Melaui pendekatan yang dicadangkan (iaitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan logik Boolean dengan perolehan kunci berdasarkan kata laluan. Di samping itu, susunan trafik adalah berdasarkan titik akses 5G. Bagi melaksanakan peruntukan sumber yang selamat dan pemotongan rangkaian, model pembelajaran mendalam telah digunakan. Pengiraan Entropi Renyi dibuat bagi meramal penyerang DDoS. Dapatan eksperimen mengesahkan keberkesanan pendekatan yang dicadangkan. https://journals.iium.edu.my/ejournal/index.php/iiumej/article/view/1763Deep learningdynamic offloadingnetwork slicingresource allocationtraffic scheduling |
spellingShingle | Ali Jasim Ramadhan Al-Aameri Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization International Islamic University Malaysia Engineering Journal Deep learning dynamic offloading network slicing resource allocation traffic scheduling |
title | Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization |
title_full | Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization |
title_fullStr | Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization |
title_full_unstemmed | Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization |
title_short | Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization |
title_sort | secure slicing and allocation of resources of 5g networks in software defined networking network functions virtualization |
topic | Deep learning dynamic offloading network slicing resource allocation traffic scheduling |
url | https://journals.iium.edu.my/ejournal/index.php/iiumej/article/view/1763 |
work_keys_str_mv | AT alijasimramadhanalaameri secureslicingandallocationofresourcesof5gnetworksinsoftwaredefinednetworkingnetworkfunctionsvirtualization |