You are on page 1of 7

5G IoT Security Challenges: Mobile Cloud and Privacy

Prof Dr. Mohammed Al-Haddad


5G IoT Security Challenges in Mobile Cloud, Privacy, And
SDN/ NFV
Your Name
Department Name
University Name
City, Country
Your Gmail Account

Abstract: 5G is a modern technology that allows all end-user achieve the services that 5G promises, new networking, service
devices and network modules to provide new interfaces. 5G can deployment, storage, and processing technologies will be required
link higher user numbers concurrently using wireless envisions. Using cloud computing, operators can efficiently
technology to communicate with devices and have smarter, maintain data, services, and applications without having to buy the
quicker predecessors. 5G Network Infrastructure is planned to required infrastructure. Mobile clouds, which use the same concepts,
actively expand around the globe with varying latency, allow for the launch of several services on a single domain,
reliability, coverage, and bandwidth requirements. But 5G isn't increasing flexibility and availability while lowering capital
just a higher mobile broadband bandwidth that works on a expenditures (CapEx) and operational costs (OpEx). Wireless
different portion of the radio spectrum. The definition of 5G communication systems have been vulnerable to security issues
technology in the sense of many wireless technologies allows the since their inception. In first-generation (1G) wireless networks,
technological solution to be reworked to allow use cases outside mobile phones and wireless channels were targeted for unauthorized
conventional mobile connectivity, enabling new applications to cloning and masquerading. In wireless networks of the second
be used in several enterprise sectors. generation (2G), message spamming became commonplace for
5G will provide broadband access everywhere, entertain higher extensive attacks as well as for introducing false information or
user mobility, and enable connectivity of a massive number of propagating unwanted marketing materials. Third-generation (3G)
devices (e.g. Internet of Things (IoT) ultra-reliable reliable, and wireless networks' IP-based communication enabled Internet
affordable way. The main technological enablers such as cloud security faults and problems to spread to wireless environments.
computing, Software Defined Networking (SDN), and Network Due to the increasing need for IP-based communication, fourth-
Function Virtualization (NFV) are maturing towards their use generation (4G) mobile networks allowed the growth of smart
in 5G. However, there are pressing security challenges in these devices, multimedia traffic, and new services into the mobile space
technologies besides the growing concerns for user privacy. In [3]. This changed the threat landscape, making it more complicated
this paper, we provide an overview of the security challenges in and dynamic. This changed the threat landscape, making it more
these technologies and the issues of privacy in 5G. Furthermore, complicated and dynamic. Fifth-generation (5G) wireless networks
we present security solutions to these challenges and future will be deployed, raising greater security issues and privacy
directions for secure 5G systems. concerns than ever before. Because mobile networks are wireless, it
is crucial to call attention to the security concerns that provide a risk.
I. INTRODUCTION These issues are also raised by prospective 5G technological
requirements. In this essay, we focus on the critical 5G security
In order to deliver a more accurate, needs-adjusted connectivity, concerns that demand immediate security solutions. We also discuss
IoT devices must employ lower latency interaction devices, which security precautions against the threats listed on this page.
5G creates the foundation for understanding. Applications today
use the Internet to connect to one another, resulting in considerably
faster speeds and a more dependable connection. Mobile devices
may swiftly access the internet from anywhere in the world using
5G. Although 5G is still in its early phases, it will have a big impact
on both consumers and businesses. The IoT application's creator
uses the Internet to offer unrestricted, entirely wireless
connectivity. The commitment of wireless communication systems
to connecting to and exchanging messages with other wireless
devices and the internet raises the application's requirement for data
rate. Now, wireless communication networks allow us to link our
computers and other devices to the network. Additionally, wireless
communication has significantly changed the world in many ways,
including economics, the development of smart homes, the
transmission of massive amounts of data to mobile devices, and
many other applications. Current wireless technologies are unable
to meet the needs of 5G wireless requirements. Low-power wide Figure 1: Number of 5G-IoT Journal Articles by
area (LPWA) technology cannot be used for protracted year in IEEE and Science Direct
communications [1]. By deploying more base stations with
increased capacity, significantly improved Quality of Service
(QoS), and extremely low latency, 5G wireless networks aim to
provide incredibly high data rates and higher coverage [2]. To
contributions to the IoT in the future by bringing together a number
of smart applications and delivering continuous connection,
greater capacity to connect everyone and everything globally,
including different applications like machines, objects, and devices
to create actual massive IoT applications that provide LPWAN
(Low Power Wide Area Network), in which smart 5G Network
operate at the highest bandwidth (mm-Wave) between 24 and 48
GHz. In order to improve your working and playing experiences,
5G wireless technology offers higher data rates, extremely low
latency, reliability, huge network capabilities, and increasing
Figure 2: Timeline toward 5G availability. The Internet of Things (IoT) connects various
computing equipment and offers the capability of data interchange
or network data transfer without the need for human-to-computer
The article's remaining sections are organized as follows: Part II interaction. The upcoming launch of the new network, 5G (i.e.
fifth generation) of cellular mobile communication (5G Network),
includes an overview of 5G and IoT security solutions for the
needs the ability to support massive IoT and mobile IoT devices,
problems highlighted in Section III after an overview of the main
which have the ability to provide greater flexibility, a wider range
security challenges. The essay's conclusion is presented in Part IV. of speed, fast data rate, bandwidth and quality of service
requirements.
II. OVERVIEW OF 5G AND IOT
The 5G mobile wireless technology is intended to deliver high
speed and bring new capabilities that will increase the potential of
people, businesses, and society. The transition to 5G, or the next
generation of mobile networks and cellular technology, requires a
change in the way people live and work. The 5G Network will take
a sizable chunk of the IoT market by offering low-power
applications, affordable solutions, and a faster processing
communication network structure. Future 5G networks will focus
on the Internet of Things and promise that cutting-edge 5G
services, including smartphones, laptops, and IoT, will increase
income production in the future. When connected to the internet,
the strength of the 1G, 2G, 3 G, 4G, and 5G signals affect the link's
speed. The term "generation" refers to a collection of networks that
explain the technical implementation of a specific mobile phone
system. buses. The ability of 5G to serve as a global entry point for
the Internet of Things will likely be its major competitive
advantage over 4G and other technologies. Because of the
anticipated substantial change in how our world network will Figure 3: Architecture
function with 5G IoT high-density implementation, 5G networking
captions are predicted to be more suitable than 4G. The primary
competitive benefit of 5G over 4G and other technologies will
likely be its capacity to act as a global entry point for the Internet
of Things. Because of the anticipated significant shift in how our
global network will operate with the adoption of 5G IoT high-
density, 5G networking captions are projected to be more
appropriate than 4G. 5G networking captions are projected to be
more appropriate than 4G due to the anticipated significant change
in how our global network will operate with the adoption of 5G
IoT high-density. The 1G, 2G, 3G, 4G, and 5G signal strength
when connected to the internet affects the speed of the link. An
explanation of the technical implementation of a certain mobile
phone system is provided by a group of networks collectively
referred to as a "generation." bus. The strength of the 1G, 2G, 3
G, 4G, and 5G signals when linked to the internet affects the link's
speed. A group of networks that describe the technical
implementation of a certain mobile phone system is referred to as
a "generation." bus. Generally speaking, 5G facilitates widespread
communication in the digital sphere. The new technology,
spectrum, and frequencies of 5G make it superior to 4G in a
number of ways. The 5G network will be built in such a way that
IoT devices may connect to it, bringing with it the performance Figure 4: Technologies associated with 5G-IoT
required for huge IoT as well as a variety of advantages, including
support for online gaming and AR/VR gadgets. The performance
of the 5G network will improve in terms of network properties
including mobility, energy, speed, range of services, improved
dependability, lower latency, and faster throughput (higher
bandwidth). Elevate the mobile network to connect new sectors
and connect not only networked individuals but also
interconnected objects and gadgets.
The 5G mobile network will increase network capacity and make
III. SECURITY CHALLENGES IN 5G
Critical infrastructure that will be connected by 5G will need In this work, we divide MCC risks into front-end, back-end, and
stronger security to secure both its own safety and the safety of network-based mobile security threats depending on the targeted
society as a whole. For all the electrical and electronic equipment cloud components. The client platform, which comprises of the
on which society depends, a security compromise in the online mobile terminal on which applications and interfaces are needed to
power supply systems can be disastrous. In a similar vein, we are access cloud resources, is the front end of the MCC architecture.
aware of the importance of data in decision-making, but what if the The threat environment for this market segment can range from
crucial data is distorted during transmission through 5G networks? application-based threats, where adversaries use malware,
Investigating and highlighting the key security issues in 5G spyware, and other harmful software to obstruct user applications
networks as well as providing a general overview of any or gather sensitive user data, to physical threats, where the actual
prospective solutions that can result in safe 5G systems are mobile device and other integrated hardware components are
therefore of utmost importance. The following are the fundamental primary targets [17], [18]. Along with virtual machines,
difficulties with 5G that Next Generation Mobile Networks hypervisors, cloud servers, and data storage systems, the back-end
(NGMN) [6] noted and were extensively debated in the literature: platform also includes the protocols required to deliver cloud
services. On this platform, mobile cloud servers are primarily the
• A High number of end-user devices and novelties in flash
target of security worries. These risks may include data replication
network traffic (IoT).
and HTTP and XML DoS (HX-DoS) assaults [8], [9].
• Radio interface security: Keys for radio interface encryption
Radio Access Technologies (RATs), which connect mobile devices
delivered across unsecured routes.
to the cloud, are the focus of network-based mobile security
• The cryptographic integrity of the user data plane is not
concerns. This could be conventional Wi-Fi, 4G Long Term
protected. Network security that is mandated: Service-driven Evolution, or other cutting-edge RATs that will accompany 5G.
constraints on the security architecture that make the adoption Wi-Fi snooping, DoS attacks, address impersonation, and session
of security measures optional. hijacking are examples of attacks in this area [6], [8]. Another
• Security risks with roaming arise from the fact that user- important topic for consideration while examining the security
security parameters are not updated while moving between issues in 5G mobile clouds is Cloud Radio Access Network (C-
operator networks. RAN). The industry's capacity expansion requirements for greater
• Attacks that cause a denial of service (DoS) to the infrastructure mobility in 5G mobile communication systems may be met by C-
Unencrypted control channels and the visibility of network RAN [10]. However, due to the centralized architecture of C-RAN
control elements. and the risk of a single point of failure, it is vulnerable to inherent
• Signaling storms: Distributed control systems that demand security issues with virtual systems and cloud computing
coordination, such as the Third Generation Partnership Project technology. Significant threats to the system also come from other
(3GPP) protocols' Non-Access Stratum (NAS) layer. dangers like intrusion attacks, in which enemies breach the virtual
• Operating systems, programs, and configuration data on user environment to watch, alter, or use software routines on the
devices are not secured against DoS attacks. platform covertly [10].

A. Mobile Clouds- Security Challenges B. 5G- Security Challenges


Data, location, and identity could present serious privacy issues
Since users share a variety of resources in cloud computing
from the user's standpoint [11]. Before being installed, the majority
systems, it is possible for one user to distribute malicious traffic in
of smartphone applications demand specifics of the subscriber's
an effort to degrade system performance, consume additional
personal information. Or firms hardly ever explain how the data is
resources, or covertly access the resources of other users. Similar
stored and how it will be utilized. The location privacy of
to this, interactions can result in disputes in network configurations
subscribers is primarily the target of threats such as semantic
in multi-tenant cloud networks where tenants execute their own
information assaults, timing attacks, and boundary attacks [12].
control logic. Cloud computing ideas are transferred into 5G
Access point selection algorithms in 5G mobile networks have the
ecosystems via mobile cloud computing (MCC). This results in a
potential to reveal location privacy at the physical layer level [13].
wide range of security issues, the majority of which are brought on
By capturing the IMSI of the subscriber's user equipment,
by the planning and building of the infrastructure. adjustments to
international mobile subscriber identity (IMSI) catching attacks can
5G. As a result, the MCC's open design and the adaptability of
be used to discover the identity of a subscriber (UE). Such attacks
mobile terminals produce security holes through which attackers
may also result from the installation of a phony base station that the
could launch attacks and compromise mobile clouds' privacy [5].
user equipment (UE) perceives as the preferred base station,
prompting users to react with their IMSI.

Additionally, there are several actors involved in 5G networks,


including network infrastructure suppliers, Virtual MNOs, and
Communication Service Providers. Security and privacy are not
equally important to any of these entities. A hurdle in the 5G
network will be coordinating the disparate privacy policies of
different entities [14]. In prior generations, mobile operators had
complete access to and command overall system elements.
However, because they will rely on new actors like CSPs, 5G
mobile carriers are losing complete control of the systems. As a
result, 5G operators will no longer have complete control over
security and privacy [15]. In shared environments, where the same
infrastructure is shared by many entities, such as VMNOs and other
rivals, user and data privacy is gravely threatened. The 5G network
also has no physical limits because it uses NFV and cloud-based
data storage. As a result, the data storage location in cloud
environments is not directly under the control of 5G operators.
Privacy is compromised if user data is kept in a cloud in a foreign
Figure 5: 5G network and the threat landscape. nation since different countries have varying levels of data privacy
safeguards depending on their chosen context [16]. dynamically improve the end-to-end performance of MCC
services in the following wireless network generations.
C. SDN and NFV- Security Challenges Nevertheless, in order for C-RAN to satisfy this demand, it must
Network control platforms are centralized and made programmable offer a high level of reliability in comparison to conventional
in communication networks thanks to SDN. These two disruptive optical networks like Synchronous Digital Hierarchy (SDH). One
characteristics, however, make the network vulnerable to intrusion way to accomplish this is through the widespread adoption of
and hacking. DoS assaults, for example, will favor centralized mechanisms like fiber ring network protection, which are
control, and exposing the crucial Application Programming presently primarily found in the industrial and energy sectors [37],
Interfaces (APIs) to malicious software can bring the entire network [38].
to a standstill [19]. The SDN controller alters the data path's flow
rules, making it simple to identify the controller traffic. Due to its B. Privacy in 5G- Security-Based Solutions
visibility in the network, the controller becomes a popular target for
DoS assaults. Due to saturation attacks, as described in [20], [21], 5G must implement privacy-by-design methodologies, which
the centralization of network control can also turn the controller take into account privacy from the system's very beginning.
into a bottleneck for the entire network. Since the majority of Mobile operators must be able to store and process highly
network functions can be implemented as SDN applications, if sensitive data locally and less sensitive data in public clouds as
given access, rogue applications can cause havoc throughout a part of a hybrid cloud-based strategy. Operators will have greater
network [22]. access to and control over data in this fashion, and they will be
Future communication networks will benefit greatly from NFV, but able to choose where to distribute it. Similar to this, service-
it also presents some fundamental security challenges, including oriented privacy in 5G will result in a more workable privacy
those related to confidentiality, integrity, authenticity, and non- preservation approach [39].
repudiation [23], [24]. According to [25], [26], the current NFV
systems do not adequately provide security and isolation to Better systems for access control, data minimization,
virtualized telecommunication services from the perspective of accountability, transparency, and openness will be needed with
their application in mobile networks. The dynamic nature of Virtual 5G. Strong privacy laws and regulations should therefore be
Network Functions (VNFs), which can result in configuration taken into consideration while standardizing 5G. Three
errors and consequent security lapses, is one of the key obstacles categories can be used to categorize the regulatory approach. The
still standing in the way of the implementation of NFV in mobile first type of regulation is at the level of the government, where
networks [27]. Table 1 highlights additional issues, but the primary laws are often made at the national level through international
issue that requires immediate attention is that if the hypervisor is organizations like the United Nations (UN) and the European
exploited, the entire network could be at risk [28]. Union (EU) [40]. The second is the industry level, where
different sectors and organizations like 3GPP, ETSI, and ONF
A. Mobile Clouds-Security-Based Solutions work together to provide the finest guidelines and procedures for
In MCC, the majority of proposed security solutions center on the
privacy protection. The third category is consumer-level
strategic application of virtualization technologies, the redesign of
legislation, which guarantees desired privacy by taking into
encryption techniques, and the dynamic distribution of data
account customer needs [41].
processing sites. Therefore, since each end node connects to a
particular virtual instance in the cloud via a Virtual Machine, Anonymity-based solutions, in which the subscriber's real name
virtualization presents itself as a suitable solution for protecting could be concealed and replaced with pseudonyms, must be used
cloud services (VM). Separating each user's virtual connection for location privacy [42]. Practices based on encryption are also
from that of other users, offers security. The service-based helpful in this situation; for instance, messages can be encrypted
restriction will also make it possible to employ cloud computing before being sent to a provider of location-based services (LBS).
technologies securely. For instance, the authors of [29] presented Obfuscation is a technique that can be used to safeguard location
"Protect Sharing and Searching for Real-Time Video Data in privacy by lowering the quality of location data. Additionally,
Mobile Cloud," a system that uses 5G technology and a cloud location cloaking-based algorithms can effectively defend
platform to secure cloud services and let mobile users share real- against several of the most common location privacy assaults,
time films on the internet. This architecture limits access to just including timing and boundary attacks.
authorized viewers, unlike previous options, where anyone with C. SDN and NFV- Security-Based Solutions
shared connections may view such online video broadcasts.
Generic methods are less effective than learning-based systems for Through a cycle of gathering intelligence from the network
addressing specific security issues like HX-DoS, for example [30]. resources, states, and flows, SDN promotes speedy threat
For instance, the learning-based system [31] examines a certain identification due to the logically centralized control plane with
number of packet samples for a variety of known features in order a global network view and programmability. In order to support
to identify and reduce hazards. network forensics, the modification of security policies, and the
The usage of anti-malware software could potentially increase the insertion of security services, the SDN architecture provides
overall resistance to malware attacks in order to secure mobile extremely reactive and proactive security monitoring, traffic
terminals. Anti-malware programs can be downloaded and analysis, and response systems [43]. By modifying the flow
installed on mobile devices or they can be hosted and delivered tables of SDN switches, security systems like firewalls and
directly from the cloud [32], [33]. A public verifiable data intrusion detection systems (IDS) can be employed for specific
possession scheme, some lightweight compromise resilient traffic, whereas consistent network security policies can be
storage outsourcing, and energy-efficient mechanisms for the installed across the network due to global network visibility [44].
integrity verification of data and storage services will make up the
security architecture for MCC data and storage. Some In accordance with the ETSI NFV design, a security orchestrator
frameworks for application security have been proposed, and they is used to secure VNFs, as shown in [45]. In a multi-tenant
include Mob iCloud, a secure cloud framework for mobile context, the suggested architecture offers security to both the
computing and communication, lightweight dynamic credential physical and virtual components of a telecommunication
generation for user identity protection, in-device spatial cloaking network. [46] makes the suggestion of using trusted computing,
for privacy protection, and securing elastic applications on mobile remote verification, and integrity checking of virtual systems and
devices for cloud computing [34], [35]. hypervisors to offer hardware-based protection to private
A cloud-based framework called C-RAN is suggested for information and identify fraudulent software in virtualized
enhancing and offering safer Radio Access Networks (RANs) for environments.
5G clouds. The authors of [36] explained how C-RAN can
IV. CONCLUSION [18] H. Hawilo, A. Shami, M. Mirahmadi, and R. Asal, “NFV: state of the
art, challenges, and implementation in next generation mobile
In order to address the issues of huge connectivity, flexibility, and networks (vEPC),” IEEE Network, vol. 28, no. 6, pp. 18–26, Nov
prices, 5G will leverage mobile clouds, SDN, and NFV. These 2014.
technologies have many advantages, but they also come with [19] W. Yang and C. Fung, “A survey on security in network functions
virtu-alization,” in 2016 IEEE NetSoft Conference and Workshops
built-in security risks. As a result, we have emphasized in this (NetSoft), June 2016, pp. 15–19.
article the key security issues that, if not effectively resolved, [20] M. Liyanage, A. Gurtov, and M. Ylianttila, Software Defined Mobile
could become more dangerous in 5G. We have also discussed the Networks (SDMN): Beyond LTE Network Architecture. John Wiley
security measures and answers to those problems. However, the & Sons, 2015.
security threat vectors cannot now be completely realized because [21] M. Liyanage, A. B. Abro, M. Ylianttila, and A. Gurtov,
to the limited standalone and integrated implementation of these “Opportunities and Challenges of Software-Defined Mobile
Networks in Network Security,” IEEE Security Privacy, vol. 14, no.
technologies in 5G. Similar to this, as more consumer devices,
4, pp. 34–44, July 2016.
such as IoT, are connected and new, diversified sets of services [22] M. Liyanage, M. Ylianttila, and A. Gurtov, “Securing the control
are made available through 5G, the issues associated with channel of software-defined mobile networks,” in Proceeding of
communication security and privacy will become more apparent. IEEE International Symposium on a World of Wireless, Mobile and
In conclusion, it is very likely. MultimediaNetworks 2014, June 2014, pp. 1–6.
[23] S. Shin and G. Gu, “Attacking software-defined networks: A first
feasibility study,” in Proceedings of the Second ACM SIGCOMM
Workshop on Hot Topics in Software Defined Networking, ser.
REFERENCES HotSDN ’13. New York, NY, USA: ACM, 2013, pp. 165–166.
[Online].
[1] M. Agiwal, A. Roy, and N. Saxena, “Next Generation 5G Wireless Available: http://doi.acm.org/10.1145/2491185.2491220
Networks: A Comprehensive Survey,” IEEE Communications Surveys [24] M. Liyanage, A. Braeken, A. D. Jurcut, M. Ylianttila,
Tutorials, vol. 18, no. 3, pp. 1617–1655, thirdquarter 2016. and A. Gurtov, “Secure communication channel architecture
[2] N. Alliance, “NGMN 5G white paper,” Next Generation Mobile Net- for Software Defined Mobile Networks,” Computer Networks,
works, White paper, 2015. vol. 114, pp. 32 – 50, 2017. [Online]. Available:
[3] 3GPP. (2017, May) SA3-Security. The Third Gen- http://www.sciencedirect.com/science/article/pii/S13891286173000
eration Partnership Project (3GPP). [Online]. Available: 75
http://www.3gpp.org/Specifications-groups/sa-plenary/54-sa3-security [25] T. Kumar and M. Liyanage and A. Braeken and I. Ahmad and M.
[4] ONF. (2013) SDN Security Considerations in the Data Yliant-tila, “From Gadget to Gadget-Free Hyperconnected World:
Center. Open Networking Foundation. [Online]. Available: Conceptual Analysis of User Privacy Challenges,” in 2017 European
https://www.opennetworking.org/sdn-resources/sdn-library Conference onNetworks and Communications (EuCNC), June 2017,
[5] P. Kulkarni, R. Khanai, and G. Bindagi, “Security frameworks for pp. 1–6.
mobile cloud computing: A survey,” in 2016 International Conference [26] R. Yu, Z. Bai, L. Yang, P. Wang, O. A. Move, and Y. Liu, “A
on Electrical, Electronics, and Optimization Techniques (ICEEOT), Location Cloaking Algorithm Based on Combinatorial Optimization
March 2016, pp. 2507–2511. for Location-Based Services in 5G Networks,” IEEE Access, vol. 4,
[6] S. S. Vikas, K. Pawan, A. K. Gurudatt, and G. Shyam, “Mobile pp. 6515–6527, 2016.
cloud computing: Security threats,” in 2014 International Conference
on Electronics and Communication Systems (ICECS), Feb 2014, pp. 1– [27] S. Farhang, Y. Hayel, and Q. Zhu, “PHY-layer location privacy-
4. preserving access point selection mechanism in next-generation wireless
[7] M. L. Polla, F. Martinelli, and D. Sgandurra, “A Survey on networks,” in 2015 IEEE Conference on Communications and Network
Security for Mobile Devices,” IEEE Communications Surveys Security (CNS), Sept 2015, pp. 263–271.
Tutorials, vol. 15, no. 1, pp. 446–471, First 2013.
[8] H. Suo, Z. Liu, J. Wan, and K. Zhou, “Security and privacy in mobile [28] Z. Yan, P. Zhang, and A. V. Vasilakos, “A security and trust framework
cloud computing,” in 2013 9th International Wireless for virtualized networks and software-defined networking,” Security and
Communications and Mobile Computing Conference (IWCMC), Communication Networks, vol. 9, no. 16, pp. 3059–3069, 2016, sCN-
July 2013, pp. 655–659. 14-0760.R1. [Online]. Available: http://dx.doi.org/10.1002/sec.1243
[9] A. Chonka and J. Abawajy, “Detecting and Mitigating HX-DoS [29] L. T. Sorensen, S. Khajuria, and K. E. Skouby, “5G Visions of User
Attacks against Cloud Web Services,” in 2012 15th International Privacy,” in 2015 IEEE 81st Vehicular Technology Conference (VTC
Conference onNetwork-Based Information Systems, Sept 2012, pp. Spring), May 2015, pp. 1–4.
429–434. [30] F. Kemmer, C. Reich, M. Knahl, and N. Clarke, “Software defined
[10] V. Sucasas, G. Mantas, and J. Rodriguez, “Security Challenges for privacy,” in 2016 IEEE International Conference on Cloud Engineering
Cloud Radio Access Networks,” Backhauling/Fronthauling for Workshop (IC2EW), April 2016, pp. 25–29.
Future WirelessSystems, pp. 195–211, 2016. [31] I. Ahmad, S. Namal, M. Ylianttila, and A. Gurtov, “Towards software
[11] I. Ahmad, S. Namal, M. Ylianttila, and A. Gurtov, “Security in defined cognitive networking,” in 2015 7th International Conference on
Software Defined Networks: A Survey,” IEEE Communications New Technologies, Mobility and Security (NTMS), July 2015, pp. 1–5.
Surveys Tutorials, vol. 17, no. 4, pp. 2317–2346, Fourthquarter [32] M. Liyanage and A. Gurtov, “Secured VPN Models for LTE Backhaul
2015. Networks,” in 2012 IEEE Vehicular Technology Conference (VTC Fall),
[12] S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “AVANT-GUARD: Sept 2012, pp. 1–5.
Scalable and Vigilant Switch Flow Management in Software- [33] M. Liyanage, I. Ahmad, M. Ylianttila, A. Gurtov, A. B. Abro, and E. M.
defined Networks,” in Proceedings of the 2013 ACM SIGSAC de Oca, “Leveraging LTE security with SDN and NFV,” in 2015 IEEE
Conference on Computer & Communications Security, ser. 10th International Conference on Industrial and Information Systems
CCS ’13. New York, NY, USA: ACM, 2013, pp. 413–424. (ICIIS), Dec 2015, pp. 220–225.
[Online]. Available: http://doi.acm.org/10.1145/2508859.2516684 [34] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack
[13] P. Fonseca, R. Bennesby, E. Mota, and A. Passito, “A replication detection using NOX/OpenFlow,” in Local Computer Networks (LCN),
component for resilient OpenFlow-based networking,” in 2012 2010 IEEE 35th Conference on, Oct 2010, pp. 408–415.
IEEE Network Operations and Management Symposium, April [35] E. Maccherani, M. Femminella, J. W. Lee, R. Francescangeli, J. Janak,
2012, pp. 933–939. G. Reali, and H. Schulzrinne, “Extending the NetServ autonomic
[14] D. Kreutz, F. M. Ramos, and P. Verissimo, “Towards Secure management capabilities using OpenFlow,” in 2012 IEEE Network
and Dependable Software-defined Networks,” in Operations and Management Symposium, April 2012, pp. 582–585.
Proceedings of the Second ACM SIGCOMM Workshop on [36] E. Al-Shaer and S. Al-Haj, “FlowChecker: Configuration Analysis and
Hot Topics in Software Defined Networking, ser. HotSDN Verification of Federated Openflow Infrastructures,” in Proceedings of
’13. New York, NY, USA: ACM, 2013, pp. 55–60. [Online]. the 3rd ACM Workshop on Assurable and Usable Security Configuration,
Available: http://doi.acm.org/10.1145/2491185.2491199 ser. SafeConfig ’10. ACM, 2010, pp. 37–44.
[15] A. van Cleeff, W. Pieters, and R. J. Wieringa, “Security Implications [37] A. Khurshid, W. Zhou, M. Caesar, and P. B. Godfrey, “Veriflow:
of Virtualization: A Literature Study,” in 2009 International Verifying Network-wide Invariants in Real Time,” SIGCOMM Comput.
Conference onComputational Science and Engineering, vol. 3, Aug Commun. Rev., vol. 42, no. 4, pp. 467–472, Sep. 2012.
2009, pp. 353–358. [38] S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson,
[16] S. J. Vaughan-Nichols, “Virtualization sparks security concerns,” “FRESCO: Modular composable security services for software-defined
Com- puter, vol. 41, no. 8, pp. 13–15, Aug 2008. networks,” in Proceedings of Network and Distributed Security Sympo-
[17] M. Monshizadeh, V. Khatri, and A. Gurtov, “NFV security consid- sium, 2013.
erations for cloud-based mobile virtual network operators,” in 2016 [39] A. K. Nayak, A. Reimers, N. Feamster, and R. Clark, “Resonance:
24th International Conference on Software, Telecommunications dynamic access control for enterprise networks,” in Proceedings of the
and Computer Networks (SoftCOM), Sept 2016, pp. 1–5. 1st ACM workshop on Research on enterprise networking. ACM, 2009,
pp. 11–18.
[40] S. Namal, I. Ahmad, A. Gurtov, and M. Ylianttila, “SDN Based Inter-
Technology Load Balancing Leveraged by Flow Admission Control,”
in2013 IEEE SDN for Future Networks and Services (SDN4FNS), Nov
2013, pp. 1–5.

[41] C. Schlesinger, A. Story, S. Gutz, N. Foster, and D. Walker, “Splen-


did isolation: Language-based security for software-defined networks,”
2012.
[42] T. Dierks, “The transport layer security (TLS) protocol version 1.2,”
2008. [Online]. Available: http://tools.ietf.org/html/rfc5246
[43] J.-H. Lam, S.-G. Lee, H.-J. Lee, and Y. E. Oktian, “Securing distributed
SDN with IBC,” in 2015 Seventh International Conference on Ubiqui-
tous and Future Networks, July 2015, pp. 921–925.
[44] M. A. S. Santos, B. T. de Oliveira, C. B. Margi, B. A. A. Nunes,
T. Turletti, and K. Obraczka, “Software-defined networking based ca-
pacity sharing in hybrid networks,” pp. 1–6, Oct 2013.
[45] C. YuHunag, T. MinChi, C. YaoTing, C. YuChieh, and C. YanRen, “A
novel design for future on-demand service and security,” in
Communica- tion Technology (ICCT), 2010 12th IEEE International
Conference on. IEEE, 2010, pp. 385–388.
[46] S. Namal, I. Ahmad, A. Gurtov, and M. Ylianttila, “Enabling Secure
Mobility with OpenFlow,” in SDN for Future Networks and Services

You might also like