Professional Documents
Culture Documents
Semester : 6th
Marks : 60
Networks (SDMN)
2
Title
Security issues in software define Mobile networks (SDMN)
Min Chen
& Yongfeng Qian
Department of Electrical & Computer Engineering, Auburn University, 200 Broun Hall, Auburn,
AL, 36849-5201, USA
Shiwen Mao
College of Computer Science, South-Central University for Nationalities, Wuhan, 430074, China
Wan Tang
& Ximin Yang
Abstract
Introduction
SDMN could be a programmable, versatile and flow-centric mobile
network created by employing a combination of SDN, NFV, and cloud computing.
SDMN is that the design of embodiment and application extension of the thought that
the management layer in an exceedinglyn SDN is separated from the forwarding layer in
4
a wireless network.
the normal mobile network has distinctive variations from AN SDMN.
The core of the software-defined mobile packet forwarding involves the issues of
matching the sending/control layer and mobile surroundings, the service logic of mobile
communication, that is transmitted to the cloud to ensure the programmability of
LTC/EPC structure within, and therefore the combination of SDN and NFV.
SDMN has several benefits, like centralized management, high flexibility, effective
division, automatic network management, and reduction of the backhaul
device disbursement.
With the expected powerful increase in mobile traffic demand, and therefore
the compelling wants for provisioning of elastic service, shared operating capability,
transmission speed, and quality of service (QoS), as well as, the
necessity for expensive network upgrades, package outlined Mobile Network (SDMN)
has been recognized as an answer to fulfill these challenges.
SDMN is AN integration of cloud computing, Network operate Virtualization (NFV),
and package outlined Network (SDN). In SDMN, rising network technologies like SDN
and NFV area unit integrated into the mobile specification so as to
fulfill its dynamical demand.
To be a lot of specific, at the core of SDMN, the package management aims
to change dynamic traffic management and useful reconfiguration. rather
than typical static informatics based mostly networking structure, the backbone network
is abstracted through traffic-based NFV in SDMN.
In a front haul affiliation, the network capability and QoS area unit improved through
centralized management of wireless spectrum resources and therefore the implementation
of Software-Defined Radio (SDR), psychological feature Radio (CR) for reconfigurable
networks.
Experimental method
5
Result
6
Discussion
Introducing SDN and NFV to networking are a significant game changer to the wireless
networking arena.
The prices, potency and network performance are the most drivers of the amendment.
There are 2 notable theories once it involves network security. 1st is that
the plan of centralizing network management to reduce the fragmentation of security
mechanisms.
However, this unwittingly ends up in higher risk of security lapses at one purpose of failure,
and this provides rise to the second theory that is exploitation SDN to reinforce network security
by investing on its international network visibility feature moreover because
the centralized management functions.
The security may be any improved by moving to a additional cooperative
approach inside massive trust alliances wherever trust proof or the results of
trust process ar shared over the cloud.
Naturally, such technological advancements sometimes go along with revived threat landscape,
this paper has highlighted such potential threats for SDMN,
It conjointly conferred corresponding mitigation techniques in conjunction
with initial check results.
This paper proposes the utilization of HIP-based IPSec tunneling design to secure
the channel between separated planes. The planned security gateways during
this design conceal the particular controller from potential adversaries, thereby, mitigating
against potential DoS and DDoS attacks.
The network is accessed through policy-based communication that's implemented at the network
edges exploitation CES. The CES helps to guard the network against
inherent net vulnerabilities like address spoofing and DoS attacks.
It is additionally capable of limiting the communication to solely non-spoofed flows or
simply the approved hosts employing a tool that's capable of implementing Anything-as-a
Service delegations supported the given policy management techniques. CES
8
Conclusion
This topic introduced the structure of SDMN, and its special security problems. The
safety measures of SDMN involve 3 layers.
First, there's the info layer, that is related to the safety threats of Open Flow switch and
terminal, and also the corresponding countermeasures.
Second, there's the management layer, as well as the safety of all databases. Specific
security issues of SDMN within the management layer and also the corresponding
measures were reviewed and mentioned.
In addition, the STRIDE methodology was accustomed succeed a classification of
SDMN attacks, because the knowledge layer, management layer, application layer, and
communication protocol attacks. Finally, a listing of security challenges of SDMN
was given that decision for important analysis efforts.
This topic investigated the safety vulnerabilities in SDMN (Software outlined Mobile
Networks) and projected novel security architectures to mitigate them. On the up aspect,
SDMN ideas can improve network security investing thereon world visibility of the
network state additionally to its centralized management and
network perform softwarization.
On the down aspect, these same attributes conjointly introduce new vulnerabilities
that square measure inherent to code applications net based mostly systems, and new
technologies.
This paper given a comprehensive assortment of the professionals and cons associated
with SDMN likewise because the state of the art for implementing security architectures
in SDMN.
9
We can extend this analysis to any analyze
these needs and outline specific pointers for the mixing of
the projected security elements into the SDMN design.
Summary
This topic presents the protection problems introduced by code outlined networking (SDN),
network perform virtualization, and future mobile networks that integrate these technologies to
become code outlined mobile networks (SDMN).
Acknowledgement
This work was supported by the Program of International S&T Cooperation of MOST
(No.2013DFA11140, No. 2013CFA051), the National Natural Science Foundation of China
(grant No.61210010, No.61300231, 61572220). Mao’s work is supported in part by the US NSF
(Grant CNS-0953513) and by the Wireless Engineering Research and Education Center at
Auburn University.
Reference
Sama MR, Contreras LM, Kaippallimalil J, Akiyoshi I, Qian H, Ni H (2015) Software-defined
control of the virtualized mobile packet core. IEEE Commun Mag 53(2):107–115
Ge X, Yang B, Ye J, Mao G, Wang C-X, Han T (2015) Spatial Spectrum and Energy Efficiency
of Random Cellular Networks. IEEE Trans Commun 63(3):1019–1030
11
Ge X, Huang K, Wang C-X, Hong X, Yang X (2011) Capacity Analysis of a Multi-Cell Multi-
Antenna Cooperative Cellular Network with Co-Channel Interference. IEEE Trans Wirel
Commun 10(10):3298–3309