Efficient and Secure 5G Core Network Slice Provisioning Based on VIKOR Approach
Network slicing in 5G is expected to essentially change the way in which network operators deploy and manage vertical services with different performance requirements. Efficient and secure slice provisioning algorithms are important since network slices share the limited resources of the physical ne...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8869775/ |
_version_ | 1819179177180397568 |
---|---|
author | Xin Li Chengcheng Guo Lav Gupta Raj Jain |
author_facet | Xin Li Chengcheng Guo Lav Gupta Raj Jain |
author_sort | Xin Li |
collection | DOAJ |
description | Network slicing in 5G is expected to essentially change the way in which network operators deploy and manage vertical services with different performance requirements. Efficient and secure slice provisioning algorithms are important since network slices share the limited resources of the physical network. In this article, we first analyze the security issues in network slicing and formulate an Integer Linear Programming (ILP) model for secure 5G core network slice provisioning. Then, we propose a heuristic 5G core network slice provisioning algorithm called VIKOR-CNSP based on VIKOR, which is a multi-criteria decision making (MCDM) method. In the slice node provisioning stage, the node importance is ranked with the VIKOR approach by considering the node resource and topology attributes. The slice nodes are then provisioned according to the ranking results. In the slice link provisioning stage, the k shortest path algorithm is implemented to obtain the candidate physical paths for the slice link, and a strategy for selecting a candidate physical path is proposed to increase the slice acceptance ratio. The strategy first calculates the path factor P<sub>f</sub> which is the product of the maximum link bandwidth utilization of the candidate physical path and its hop-count, and then chooses the candidate physical path with the smallest P<sub>f</sub> to host the slice link. Extensive simulations show that the proposed algorithm can achieve the highest slice acceptance ratio and the largest provisioning revenue-to-cost ratio, satisfying the security constraints of 5G core network slice requests. |
first_indexed | 2024-12-22T21:54:18Z |
format | Article |
id | doaj.art-43c9614fcae8415cb2f0a761a72d3560 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-22T21:54:18Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-43c9614fcae8415cb2f0a761a72d35602022-12-21T18:11:16ZengIEEEIEEE Access2169-35362019-01-01715051715052910.1109/ACCESS.2019.29474548869775Efficient and Secure 5G Core Network Slice Provisioning Based on VIKOR ApproachXin Li0https://orcid.org/0000-0001-6127-8303Chengcheng Guo1Lav Gupta2Raj Jain3School of Electronic Information, Wuhan University, Wuhan, ChinaSchool of Electronic Information, Wuhan University, Wuhan, ChinaDepartment of Computer Science and Engineering, Washington University in St. Louis, St. Louis, MO, USADepartment of Computer Science and Engineering, Washington University in St. Louis, St. Louis, MO, USANetwork slicing in 5G is expected to essentially change the way in which network operators deploy and manage vertical services with different performance requirements. Efficient and secure slice provisioning algorithms are important since network slices share the limited resources of the physical network. In this article, we first analyze the security issues in network slicing and formulate an Integer Linear Programming (ILP) model for secure 5G core network slice provisioning. Then, we propose a heuristic 5G core network slice provisioning algorithm called VIKOR-CNSP based on VIKOR, which is a multi-criteria decision making (MCDM) method. In the slice node provisioning stage, the node importance is ranked with the VIKOR approach by considering the node resource and topology attributes. The slice nodes are then provisioned according to the ranking results. In the slice link provisioning stage, the k shortest path algorithm is implemented to obtain the candidate physical paths for the slice link, and a strategy for selecting a candidate physical path is proposed to increase the slice acceptance ratio. The strategy first calculates the path factor P<sub>f</sub> which is the product of the maximum link bandwidth utilization of the candidate physical path and its hop-count, and then chooses the candidate physical path with the smallest P<sub>f</sub> to host the slice link. Extensive simulations show that the proposed algorithm can achieve the highest slice acceptance ratio and the largest provisioning revenue-to-cost ratio, satisfying the security constraints of 5G core network slice requests.https://ieeexplore.ieee.org/document/8869775/5G core network slicenetwork slicingslice provisioningslice securityVIKOR approach |
spellingShingle | Xin Li Chengcheng Guo Lav Gupta Raj Jain Efficient and Secure 5G Core Network Slice Provisioning Based on VIKOR Approach IEEE Access 5G core network slice network slicing slice provisioning slice security VIKOR approach |
title | Efficient and Secure 5G Core Network Slice Provisioning Based on VIKOR Approach |
title_full | Efficient and Secure 5G Core Network Slice Provisioning Based on VIKOR Approach |
title_fullStr | Efficient and Secure 5G Core Network Slice Provisioning Based on VIKOR Approach |
title_full_unstemmed | Efficient and Secure 5G Core Network Slice Provisioning Based on VIKOR Approach |
title_short | Efficient and Secure 5G Core Network Slice Provisioning Based on VIKOR Approach |
title_sort | efficient and secure 5g core network slice provisioning based on vikor approach |
topic | 5G core network slice network slicing slice provisioning slice security VIKOR approach |
url | https://ieeexplore.ieee.org/document/8869775/ |
work_keys_str_mv | AT xinli efficientandsecure5gcorenetworksliceprovisioningbasedonvikorapproach AT chengchengguo efficientandsecure5gcorenetworksliceprovisioningbasedonvikorapproach AT lavgupta efficientandsecure5gcorenetworksliceprovisioningbasedonvikorapproach AT rajjain efficientandsecure5gcorenetworksliceprovisioningbasedonvikorapproach |