Solving security constraints for 5G slice embedding: A proof-of-concept

Research output: Contribution to journalArticlepeer-review

Abstract

Network slicing is a prominent feature of 5G, which allow tenants to rent network and computing virtual resources from one or more Infrastructure Providers (InPs). Those resources are allocated according to tenants requirements, not only in terms of QoS but also in terms of security. In this paper, we build on our previous work to propose and evaluate a security-aware slice embedding implementation which enables tenants to declare security-oriented requirements, while limiting InP network information disclosure. To do so we improve our requirement model so that it becomes compatible with an Satisfiability Modulo Theories (SMT) formulation. Our implementation distinguishes two sub-problems, one for the intra-domain level (inside each InP) and one for the inter-domain level (in between the InPs). We leverage those sub-problems in a multi-level resolution algorithm to generate all multi-domain slice embeddings.

Original languageEnglish
Article number101662
JournalComputers and Security
Volume89
DOIs
Publication statusPublished - 1 Feb 2020

Keywords

  • 5G Security
  • Network slicing
  • Network virtualization
  • Satisfiability modulo theories
  • Virtual network embedding

Fingerprint

Dive into the research topics of 'Solving security constraints for 5G slice embedding: A proof-of-concept'. Together they form a unique fingerprint.

Cite this