Skip to main content
Top

2016 | OriginalPaper | Chapter

A Modular Secure Framework Based on SDMN for Mobile Core Cloud

Authors : Karim Zkik, Tarik Tachihante, Ghizlane Orhanou, Said El Hajji

Published in: Mobile, Secure, and Programmable Networking

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

During these last few years, mobile data traffic has been strongly growing while the voice traffic decreases (fixed and mobile), This new reality pushes operators to invest in a new next generation of mobile network (Mobile Cloud Computing, 5G) to enhance their competitivity and provide more innovative marketing products and services to the end user. But they were facing a major obstacle: the computer networks management is too complex and difficult. The research community proposes Software Defined Mobile Networks (SDMNs) as a solution to provide more flexibility and to ease the management of the next-generation mobile networks especially Mobile Cloud Computing (MCC). This new solution offers a huge advantage to the mobile operators and enables innovation through network programmability. SDMN provides several benefits including, network and service customized, improved operations and better performance, but there are some security issues that need to be taken care of. This paper describes the emergence of SDMN as an important new networking technology, discusses the different problems related to security issue. We propose a framework to secure the different levels in SDMN architecture with an implementation of our framework. A simulation has been done of some main threats such as DDoS attack and malware infection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 20152020 (2016) Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 20152020 (2016)
3.
go back to reference Kreutz, D., Ramos, F.M.V., Verissimo, P., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2015)CrossRef Kreutz, D., Ramos, F.M.V., Verissimo, P., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2015)CrossRef
4.
go back to reference Masoudi, R., Ghaffari, A.: Software defined networks: a survey. J. Netw. Comput. Appl. 67, 1–25 (2016)CrossRef Masoudi, R., Ghaffari, A.: Software defined networks: a survey. J. Netw. Comput. Appl. 67, 1–25 (2016)CrossRef
5.
go back to reference Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Soft. 86, 2263–2268 (2013)CrossRef Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Soft. 86, 2263–2268 (2013)CrossRef
6.
go back to reference Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Fut. Gener. Comput. Syst. 29, 84106 (2013) Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Fut. Gener. Comput. Syst. 29, 84106 (2013)
7.
go back to reference Bellavistaa, P., Callegatia, F., Cerronia, W., Contolic, C., Corradia, A., Foschinia, L., Pernafinia, A., Santandrea, G.: Virtual network function embedding in real cloud environments. Comput. Netw. 93, 506517 (2015). Part 3CrossRef Bellavistaa, P., Callegatia, F., Cerronia, W., Contolic, C., Corradia, A., Foschinia, L., Pernafinia, A., Santandrea, G.: Virtual network function embedding in real cloud environments. Comput. Netw. 93, 506517 (2015). Part 3CrossRef
8.
go back to reference Naboulsi, D., Fiore, M., Ribot, S., Stanica, R.: Large-scale mobile traffic analysis: a survey. IEEE Commun. Surv. Tutorials 18(1), 124–161 (2015). IEEE Communications Society, Institute of Electrical and Electronics EngineersCrossRef Naboulsi, D., Fiore, M., Ribot, S., Stanica, R.: Large-scale mobile traffic analysis: a survey. IEEE Commun. Surv. Tutorials 18(1), 124–161 (2015). IEEE Communications Society, Institute of Electrical and Electronics EngineersCrossRef
9.
go back to reference Pentikousis, K., Wang, Y., Weihua, H.: Huawei Technologies, MobileFlow, Toward SoftwareDefined Mobile Networks (2012) Pentikousis, K., Wang, Y., Weihua, H.: Huawei Technologies, MobileFlow, Toward SoftwareDefined Mobile Networks (2012)
10.
go back to reference Yao, G., Bi, J., Guo, L.: On the cascading failures of multicontrollers in software defined networks. In: 2013 21st IEEE International Conference on Network Protocols (ICNP) (2013) Yao, G., Bi, J., Guo, L.: On the cascading failures of multicontrollers in software defined networks. In: 2013 21st IEEE International Conference on Network Protocols (ICNP) (2013)
11.
go back to reference McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 6974 (2008)CrossRef McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 6974 (2008)CrossRef
12.
go back to reference Liyanage, M., Ylianttila, M., Gurtov, A.: Securing the control channel of software-defined mobile networks. In: 2014 IEEE 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), p. 16. IEEE (2014) Liyanage, M., Ylianttila, M., Gurtov, A.: Securing the control channel of software-defined mobile networks. In: 2014 IEEE 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), p. 16. IEEE (2014)
13.
go back to reference Ahmad, I., Namaly, S., Ylianttilaz, M., Gurtov, A.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutorials 17(4), 2317–2346 (2015)CrossRef Ahmad, I., Namaly, S., Ylianttilaz, M., Gurtov, A.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutorials 17(4), 2317–2346 (2015)CrossRef
14.
go back to reference Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J.L., Kantola, R., Perez, O.L., Itzazelaia, M.U., de Oca, E.M., Valtierra, A. and Jimenez, C: Security for future software defined mobile networks. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies (2015) Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J.L., Kantola, R., Perez, O.L., Itzazelaia, M.U., de Oca, E.M., Valtierra, A. and Jimenez, C: Security for future software defined mobile networks. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies (2015)
15.
go back to reference Fonseca, P., Bennesby, R., Mota, E., Passito, A.: A replication component for resilient openflow-based networking. In: IEEE Network Operations and Management Symposium (NOMS): Mini-Conference (2012) Fonseca, P., Bennesby, R., Mota, E., Passito, A.: A replication component for resilient openflow-based networking. In: IEEE Network Operations and Management Symposium (NOMS): Mini-Conference (2012)
16.
go back to reference Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: 35th Annual IEEE Conference on Local Computer Networks (2010) Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: 35th Annual IEEE Conference on Local Computer Networks (2010)
17.
go back to reference Shin, S., Porras, P., Yegneswaran, V., Fong, M., Guofei, G., Tyson, M.: FRESCO: modular composable security services for software-defined networks. In: ISOC Network and Distributed System Security Symposium (2013) Shin, S., Porras, P., Yegneswaran, V., Fong, M., Guofei, G., Tyson, M.: FRESCO: modular composable security services for software-defined networks. In: ISOC Network and Distributed System Security Symposium (2013)
18.
go back to reference Hongxin, H., Han, W., Ahn, G.-J., Zhao, Z.: FLOWGUARD: building robust firewalls for software-defined networks. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN 2014, pp. 97–102 (2014) Hongxin, H., Han, W., Ahn, G.-J., Zhao, Z.: FLOWGUARD: building robust firewalls for software-defined networks. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN 2014, pp. 97–102 (2014)
19.
go back to reference Luo, S., Hongfang, Y., Li, L.: Practical flow table aggregation in SDN. Comput. Netw. 92, 7288 (2015). Part 1CrossRef Luo, S., Hongfang, Y., Li, L.: Practical flow table aggregation in SDN. Comput. Netw. 92, 7288 (2015). Part 1CrossRef
20.
go back to reference Jarraya, Y., Madi, T., Debbabi, M.: A survey and a layered taxonomy of software-defined networking. IEEE Commun. Surv. Tutorials 16(4), 1955–1980 (2014)CrossRef Jarraya, Y., Madi, T., Debbabi, M.: A survey and a layered taxonomy of software-defined networking. IEEE Commun. Surv. Tutorials 16(4), 1955–1980 (2014)CrossRef
21.
go back to reference Benton, K., Camp, L.J., Small, C.: OpenFlow vulnerability assessment. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN 2013, p. 151152. ACM (2013) Benton, K., Camp, L.J., Small, C.: OpenFlow vulnerability assessment. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN 2013, p. 151152. ACM (2013)
22.
go back to reference XenServer 6.x Best Practices. Dell Compellent Storage Center (2013) XenServer 6.x Best Practices. Dell Compellent Storage Center (2013)
24.
go back to reference Open vSwitch Configuration Guide. Configuration Guide for the OVS PICA8 Switch, 1st edn. (2011) Open vSwitch Configuration Guide. Configuration Guide for the OVS PICA8 Switch, 1st edn. (2011)
Metadata
Title
A Modular Secure Framework Based on SDMN for Mobile Core Cloud
Authors
Karim Zkik
Tarik Tachihante
Ghizlane Orhanou
Said El Hajji
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-50463-6_12

Premium Partner