Skip to main content
Erschienen in: Mobile Networks and Applications 5/2016

09.01.2016

Software-Defined Mobile Networks Security

verfasst von: Min Chen, Yongfeng Qian, Shiwen Mao, Wan Tang, Ximin Yang

Erschienen in: Mobile Networks and Applications | Ausgabe 5/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The future 5G wireless is triggered by the higher demand on wireless capacity. With Software Defined Network (SDN), the data layer can be separated from the control layer. The development of relevant studies about Network Function Virtualization (NFV) and cloud computing has the potential of offering a quicker and more reliable network access for growing data traffic. Under such circumstances, Software Defined Mobile Network (SDMN) is presented as a promising solution for meeting the wireless data demands. This paper provides a survey of SDMN and its related security problems. As SDMN integrates cloud computing, SDN, and NFV, and works on improving network functions, performance, flexibility, energy efficiency, and scalability, it is an important component of the next generation telecommunication networks. However, the SDMN concept also raises new security concerns. We explore relevant security threats and their corresponding countermeasures with respect to the data layer, control layer, application layer, and communication protocols. We also adopt the STRIDE method to classify various security threats to better reveal them in the context of SDMN. This survey is concluded with a list of open security challenges in SDMN.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Sama MR, Contreras LM, Kaippallimalil J, Akiyoshi I, Qian H, Ni H (2015) Software-defined control of the virtualized mobile packet core. IEEE Commun Mag 53(2):107–115CrossRef Sama MR, Contreras LM, Kaippallimalil J, Akiyoshi I, Qian H, Ni H (2015) Software-defined control of the virtualized mobile packet core. IEEE Commun Mag 53(2):107–115CrossRef
2.
Zurück zum Zitat Ge X, Yang B, Ye J, Mao G, Wang C-X, Han T (2015) Spatial Spectrum and Energy Efficiency of Random Cellular Networks. IEEE Trans Commun 63(3):1019–1030CrossRef Ge X, Yang B, Ye J, Mao G, Wang C-X, Han T (2015) Spatial Spectrum and Energy Efficiency of Random Cellular Networks. IEEE Trans Commun 63(3):1019–1030CrossRef
3.
Zurück zum Zitat Bernardos C, La Oliva A, Serrano P, Banchs A, Contreras LM, Jin H, Zúñiga JC (2014) An architecture for software defined wireless networking. IEEE Wirel Commun 21(3):52–61CrossRef Bernardos C, La Oliva A, Serrano P, Banchs A, Contreras LM, Jin H, Zúñiga JC (2014) An architecture for software defined wireless networking. IEEE Wirel Commun 21(3):52–61CrossRef
4.
Zurück zum Zitat Ge X, Huang K, Wang C-X, Hong X, Yang X (2011) Capacity Analysis of a Multi-Cell Multi-Antenna Cooperative Cellular Network with Co-Channel Interference. IEEE Trans Wirel Commun 10(10):3298–3309CrossRef Ge X, Huang K, Wang C-X, Hong X, Yang X (2011) Capacity Analysis of a Multi-Cell Multi-Antenna Cooperative Cellular Network with Co-Channel Interference. IEEE Trans Wirel Commun 10(10):3298–3309CrossRef
5.
Zurück zum Zitat He J, Wen Y, Huang J, Wu D (2014) On the Cost–QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2’s Pricing Models. IEEE Transactions on Circuits and Systems for Video Technology 24(4):669–680CrossRef He J, Wen Y, Huang J, Wu D (2014) On the Cost–QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2’s Pricing Models. IEEE Transactions on Circuits and Systems for Video Technology 24(4):669–680CrossRef
6.
Zurück zum Zitat Chávez-Santiago R, Szydełko M, Kliks A, Foukalas F, Haddad Y, Nolan KE, Kelly MY, Masonta MT, Balasingham I (2015) 5G: The convergence of wireless communications. Wirel Pers Commun:1–26 Chávez-Santiago R, Szydełko M, Kliks A, Foukalas F, Haddad Y, Nolan KE, Kelly MY, Masonta MT, Balasingham I (2015) 5G: The convergence of wireless communications. Wirel Pers Commun:1–26
7.
Zurück zum Zitat Naudts B, Kind M, Westphal F-J, Verbrugge S, Colle D, Pickavet M (2012) Techno-economic analysis of software defined networking as architecture for the virtualization of a mobile network. In: 2012 European Workshop on Software Defined Networking (EWSDN). IEEE, pp 67–72 Naudts B, Kind M, Westphal F-J, Verbrugge S, Colle D, Pickavet M (2012) Techno-economic analysis of software defined networking as architecture for the virtualization of a mobile network. In: 2012 European Workshop on Software Defined Networking (EWSDN). IEEE, pp 67–72
8.
Zurück zum Zitat Nunes B, Mendonca M, Nguyen X-N, Obraczka K, Turletti T, et al. (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials 16(3):1617–1634CrossRef Nunes B, Mendonca M, Nguyen X-N, Obraczka K, Turletti T, et al. (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials 16(3):1617–1634CrossRef
9.
Zurück zum Zitat Checko A, Christiansen HL, Yan Y, Scolari L, Kardaras G, Berger MS, Dittmann L (2014) Cloud RAN for mobile networks – a technology overview. IEEE Communications Surveys & Tutorials 17(1):405–426CrossRef Checko A, Christiansen HL, Yan Y, Scolari L, Kardaras G, Berger MS, Dittmann L (2014) Cloud RAN for mobile networks – a technology overview. IEEE Communications Surveys & Tutorials 17(1):405–426CrossRef
10.
Zurück zum Zitat Xiao J, Hu R, Qian Y, Gong L, Wang B (2013) Expanding lte network spectrum with cognitive radios: From concept to implementation. IEEE Wirel Commun 20(2):12–19CrossRef Xiao J, Hu R, Qian Y, Gong L, Wang B (2013) Expanding lte network spectrum with cognitive radios: From concept to implementation. IEEE Wirel Commun 20(2):12–19CrossRef
11.
Zurück zum Zitat Manzalini A, Saracco R, Buyukkoc C, et al. (2014) Software-defined networks for future networks and services: main technical challenges and business implications, SDN4FNS. IEEE Manzalini A, Saracco R, Buyukkoc C, et al. (2014) Software-defined networks for future networks and services: main technical challenges and business implications, SDN4FNS. IEEE
12.
Zurück zum Zitat Kreutz D, Ramos F, Verissimo P (2013) Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 55–60 Kreutz D, Ramos F, Verissimo P (2013) Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 55–60
13.
Zurück zum Zitat Hakiri A, Gokhale A, Berthou P, Schmidt DC, Gayraud T (2014) Software-defined networking: Challenges and research opportunities for future internet. Comput Netw 75(24):453–471CrossRef Hakiri A, Gokhale A, Berthou P, Schmidt DC, Gayraud T (2014) Software-defined networking: Challenges and research opportunities for future internet. Comput Netw 75(24):453–471CrossRef
14.
Zurück zum Zitat Shin S, Porras PA, Yegneswaran V, Fong MW, Gu G, Tyson M (2013) Fresco: Modular composable security services for software-defined networks. In: NDSS Shin S, Porras PA, Yegneswaran V, Fong MW, Gu G, Tyson M (2013) Fresco: Modular composable security services for software-defined networks. In: NDSS
15.
Zurück zum Zitat Kreutz D, Bessani A, Feitosa E, Cunha H (2014) Towards secure and dependable authentication and authorization infrastructures. In: 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, pp 43–52 Kreutz D, Bessani A, Feitosa E, Cunha H (2014) Towards secure and dependable authentication and authorization infrastructures. In: 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, pp 43–52
17.
Zurück zum Zitat Kreutz D, Ramos FM, Esteves Verissimo P, Esteve Rothenberg C, Azodolmolky S, Uhlig S (2015) Software-defined networking: A comprehensive survey. proc IEEE 103(1):14–76CrossRef Kreutz D, Ramos FM, Esteves Verissimo P, Esteve Rothenberg C, Azodolmolky S, Uhlig S (2015) Software-defined networking: A comprehensive survey. proc IEEE 103(1):14–76CrossRef
18.
Zurück zum Zitat Yap K-K, Sherwood R, Kobayashi M, Huang T-Y, Chan M, Handigol N, McKeown N, Parulkar G (2010) Blueprint for introducing innovation into wireless mobile networks. In: Proceedings of the second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures. ACM, pp 25–32 Yap K-K, Sherwood R, Kobayashi M, Huang T-Y, Chan M, Handigol N, McKeown N, Parulkar G (2010) Blueprint for introducing innovation into wireless mobile networks. In: Proceedings of the second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures. ACM, pp 25–32
19.
Zurück zum Zitat Hernan S, Lambert S, Ostwald T, Shostack A (2006) Uncover security design flaws using the stride approach msdn. microsoft. com Hernan S, Lambert S, Ostwald T, Shostack A (2006) Uncover security design flaws using the stride approach msdn. microsoft. com
21.
Zurück zum Zitat Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305(1):357–383MathSciNetCrossRef Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305(1):357–383MathSciNetCrossRef
22.
Zurück zum Zitat Yazıcı V, Kozat UC, Oguz Sunay M (2014) A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management. IEEE Commun Mag 52(11):76–85CrossRef Yazıcı V, Kozat UC, Oguz Sunay M (2014) A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management. IEEE Commun Mag 52(11):76–85CrossRef
23.
Zurück zum Zitat Yang M, Li Y, Hu L, Li B, Jin D, Chen S, Yan Z (2014) Cross-layer software-defined 5G network. Mobile Networks and Applications 20(3):1–10 Yang M, Li Y, Hu L, Li B, Jin D, Chen S, Yan Z (2014) Cross-layer software-defined 5G network. Mobile Networks and Applications 20(3):1–10
24.
Zurück zum Zitat Jin X, Li LE, Vanbever L, Rexford J (2013) Softcell: Scalable and flexible cellular core network architecture. In: Proceedings of the ninth ACM Conference on Emerging Networking Experiments and Technologies. ACM, pp 163–174 Jin X, Li LE, Vanbever L, Rexford J (2013) Softcell: Scalable and flexible cellular core network architecture. In: Proceedings of the ninth ACM Conference on Emerging Networking Experiments and Technologies. ACM, pp 163–174
25.
Zurück zum Zitat Costa-Requena J (2014) SDN integration in lte mobile backhaul networks. In: 2014 International Conference on Information Networking (ICOIN). IEEE, pp 264–269 Costa-Requena J (2014) SDN integration in lte mobile backhaul networks. In: 2014 International Conference on Information Networking (ICOIN). IEEE, pp 264–269
26.
Zurück zum Zitat Kempf J, Johansson B, Pettersson S, Lüning H, Nilsson T (2012) Moving the mobile evolved packet core to the cloud. In: 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 784–791 Kempf J, Johansson B, Pettersson S, Lüning H, Nilsson T (2012) Moving the mobile evolved packet core to the cloud. In: 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 784–791
27.
Zurück zum Zitat Sama MR, Ben Hadj Said S, Guillouard K, Suciu L (2014) Enabling network programmability in lte/epc architecture using OpenFlow. In: 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt). IEEE, pp 389–396 Sama MR, Ben Hadj Said S, Guillouard K, Suciu L (2014) Enabling network programmability in lte/epc architecture using OpenFlow. In: 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt). IEEE, pp 389–396
28.
Zurück zum Zitat Nagy M, Kotuliak I (2014) Utilizing OpenFlow, SDN and NFV in GPRS core network, in Testbeds and Research Infrastructure: Development of Networks and Communities. Springer, pp 184–193 Nagy M, Kotuliak I (2014) Utilizing OpenFlow, SDN and NFV in GPRS core network, in Testbeds and Research Infrastructure: Development of Networks and Communities. Springer, pp 184–193
29.
Zurück zum Zitat Ge X, Cheng H, Guizani M, Han T (2014) 5G Wireless Backhaul Networks: Challenges and Research Advances. IEEE Netw 28(6):6–11CrossRef Ge X, Cheng H, Guizani M, Han T (2014) 5G Wireless Backhaul Networks: Challenges and Research Advances. IEEE Netw 28(6):6–11CrossRef
30.
Zurück zum Zitat He J, Xue Z, Wu D, Wu DO, Wen Y (2014) CBM: Online Strategies on Cost-aware Buffer Management for Mobile Video Streaming. IEEE Transactions on Multimedia 16(1): 242–252CrossRef He J, Xue Z, Wu D, Wu DO, Wen Y (2014) CBM: Online Strategies on Cost-aware Buffer Management for Mobile Video Streaming. IEEE Transactions on Multimedia 16(1): 242–252CrossRef
31.
Zurück zum Zitat Lei L, Zhong Z, Zheng K, Chen J, Meng H (2013) Challenges on Wireless Heterogeneous Networks for Mobile Cloud Computing. IEEE Wirel Commun 20(3):34–44CrossRef Lei L, Zhong Z, Zheng K, Chen J, Meng H (2013) Challenges on Wireless Heterogeneous Networks for Mobile Cloud Computing. IEEE Wirel Commun 20(3):34–44CrossRef
32.
Zurück zum Zitat Zheng K, Wang Y, Wang W, Dohler M, Wang J (2011) Energy-efficient wireless in-home: the need for interference-controlled femtocells. IEEE Wirel Commun 18(6):36–44CrossRef Zheng K, Wang Y, Wang W, Dohler M, Wang J (2011) Energy-efficient wireless in-home: the need for interference-controlled femtocells. IEEE Wirel Commun 18(6):36–44CrossRef
33.
Zurück zum Zitat Liyanage M, Ylianttila M, Gurtov A (2014) Securing the control channel of software-defined mobile networks. In: 2014 IEEE 15th International Symposium on A World of Wireless Mobile and Multimedia Networks (WoWMoM). IEEE, pp 1–6 Liyanage M, Ylianttila M, Gurtov A (2014) Securing the control channel of software-defined mobile networks. In: 2014 IEEE 15th International Symposium on A World of Wireless Mobile and Multimedia Networks (WoWMoM). IEEE, pp 1–6
34.
Zurück zum Zitat Wu D, Xue Z, He J (2014) iCloudAccess: Cost-Effective Streaming of Video Games from the Cloud with Low Latency. IEEE Transactions on Circuits and Systems for Video Technology 24(8):1405–1416CrossRef Wu D, Xue Z, He J (2014) iCloudAccess: Cost-Effective Streaming of Video Games from the Cloud with Low Latency. IEEE Transactions on Circuits and Systems for Video Technology 24(8):1405–1416CrossRef
35.
Zurück zum Zitat He J, Wu D, Zeng Y, Hei X, Wen Y (2013) Toward Optimal Deployment of Cloud-Assisted Video Distribution Services. IEEE Transactions on Circuits and Systems for Video Technology 23(10):1717–1728CrossRef He J, Wu D, Zeng Y, Hei X, Wen Y (2013) Toward Optimal Deployment of Cloud-Assisted Video Distribution Services. IEEE Transactions on Circuits and Systems for Video Technology 23(10):1717–1728CrossRef
37.
Zurück zum Zitat Bays LR, Oliveira RR, Barcellos MP, Gaspary LP, Madeira ERM (2015) Virtual network security: Threats, countermeasures, and challenges. Journal of Internet Services and Applications 6(1):1–19CrossRef Bays LR, Oliveira RR, Barcellos MP, Gaspary LP, Madeira ERM (2015) Virtual network security: Threats, countermeasures, and challenges. Journal of Internet Services and Applications 6(1):1–19CrossRef
38.
Zurück zum Zitat Wolinsky DI, Agrawal A, Boykin PO, Davis JR, Ganguly A, Paramygin V, Sheng YP, Figueiredo RJ (2006) On the design of virtual machine sandboxes for distributed computing in wide-area overlays of virtual workstations. In: 2006 First International Workshop on Virtualization Technology in Distributed Computing, 2006 VTDC. IEEE, pp 8–8 Wolinsky DI, Agrawal A, Boykin PO, Davis JR, Ganguly A, Paramygin V, Sheng YP, Figueiredo RJ (2006) On the design of virtual machine sandboxes for distributed computing in wide-area overlays of virtual workstations. In: 2006 First International Workshop on Virtualization Technology in Distributed Computing, 2006 VTDC. IEEE, pp 8–8
39.
Zurück zum Zitat Wu H, Ding Y, Winer C, Yao L (2010) Network security for virtual machine in cloud computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT). IEEE, pp 18–21 Wu H, Ding Y, Winer C, Yao L (2010) Network security for virtual machine in cloud computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT). IEEE, pp 18–21
40.
Zurück zum Zitat de Oliveira DAS, Wu FS (2009) Protecting kernel code and data with a virtualization-aware collaborative operating system. In: 2009 Annual Computer Security Applications Conference, ACSAC’09. IEEE, pp 451–460 de Oliveira DAS, Wu FS (2009) Protecting kernel code and data with a virtualization-aware collaborative operating system. In: 2009 Annual Computer Security Applications Conference, ACSAC’09. IEEE, pp 451–460
41.
Zurück zum Zitat Zhang L, Shetty S, Liu P, Jing J (2014) Rootkitdet: Practical end-to-end defense against kernel rootkits in a cloud environment. In: Computer Security-ESORICS 2014. Springer, pp 475– 493 Zhang L, Shetty S, Liu P, Jing J (2014) Rootkitdet: Practical end-to-end defense against kernel rootkits in a cloud environment. In: Computer Security-ESORICS 2014. Springer, pp 475– 493
42.
Zurück zum Zitat Baliga A, Kamat P, Iftode L (2007) Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE, pp 246–251 Baliga A, Kamat P, Iftode L (2007) Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE, pp 246–251
43.
Zurück zum Zitat Fernandes DA, Soares LF, Gomes JV, Freire MM, Inácio PR (2014) Security issues in cloud environments: A survey. Int J Inf Secur 13(2):113–170CrossRef Fernandes DA, Soares LF, Gomes JV, Freire MM, Inácio PR (2014) Security issues in cloud environments: A survey. Int J Inf Secur 13(2):113–170CrossRef
44.
Zurück zum Zitat Nguyen M-D, Chau N-T, Jung S, Jung S (2014) A demonstration of malicious insider attacks inside cloud iaas vendor. International journal of Information and Education Teachnology 4(6) Nguyen M-D, Chau N-T, Jung S, Jung S (2014) A demonstration of malicious insider attacks inside cloud iaas vendor. International journal of Information and Education Teachnology 4(6)
45.
Zurück zum Zitat Rocha F, Correia M (2011) Lucy in the sky without diamonds: Stealing confidential data in the cloud. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, pp 129–134 Rocha F, Correia M (2011) Lucy in the sky without diamonds: Stealing confidential data in the cloud. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, pp 129–134
46.
Zurück zum Zitat Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28 (3):583–592CrossRef Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28 (3):583–592CrossRef
47.
Zurück zum Zitat Yan Q, Yu F (2015) Distributed denial of service attacks in software-defined networking with cloud computing. EEE Commun Mag 53(4):52–59CrossRef Yan Q, Yu F (2015) Distributed denial of service attacks in software-defined networking with cloud computing. EEE Commun Mag 53(4):52–59CrossRef
48.
Zurück zum Zitat Szefer J, Keller E, Lee RB, Rexford J (2011) Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, pp 401–412 Szefer J, Keller E, Lee RB, Rexford J (2011) Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, pp 401–412
49.
Zurück zum Zitat Liang C, Yu FR (2015) Wireless virtualization for next generation mobile cellular networks. IEEE Wirel Commun 22(1):61–69CrossRef Liang C, Yu FR (2015) Wireless virtualization for next generation mobile cellular networks. IEEE Wirel Commun 22(1):61–69CrossRef
50.
Zurück zum Zitat Costa-Requena J, Santos JL, Guasch VF, Ahokas K, Premsankar G, Luukkainen S, Pérez OL, Itzazelaia MU, Ahmad I, Liyanage M, et al. (2015) SDN and NFV integration in generalized mobile network architecture. In: 2015 European Conference on Networks and Communications (EuCNC). IEEE, pp 154–158 Costa-Requena J, Santos JL, Guasch VF, Ahokas K, Premsankar G, Luukkainen S, Pérez OL, Itzazelaia MU, Ahmad I, Liyanage M, et al. (2015) SDN and NFV integration in generalized mobile network architecture. In: 2015 European Conference on Networks and Communications (EuCNC). IEEE, pp 154–158
51.
Zurück zum Zitat Yang M, Li Y, Li B, Jin D, Chen S (2015) Service-oriented 5G network architecture: an end-to-end software defining approach. Int J Commun Syst Yang M, Li Y, Li B, Jin D, Chen S (2015) Service-oriented 5G network architecture: an end-to-end software defining approach. Int J Commun Syst
52.
Zurück zum Zitat Kloti R, Kotronis V, Smith P (2013) OpenFlow: A security analysis. In: 2013 21st IEEE International Conference on Network Protocols (ICNP). IEEE, pp 1–6 Kloti R, Kotronis V, Smith P (2013) OpenFlow: A security analysis. In: 2013 21st IEEE International Conference on Network Protocols (ICNP). IEEE, pp 1–6
53.
Zurück zum Zitat Hong S, Xu L, Wang H, Gu G (2015) Poisoning network visibility in software-defined networks: New attacks and countermeasures. In: Network and Distributed System Security (NDSS) Symposium 2015. NDSS, pp 8–11 Hong S, Xu L, Wang H, Gu G (2015) Poisoning network visibility in software-defined networks: New attacks and countermeasures. In: Network and Distributed System Security (NDSS) Symposium 2015. NDSS, pp 8–11
54.
Zurück zum Zitat Benton K, Camp LJ, Small C (2013) OpenFlow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 151–152 Benton K, Camp LJ, Small C (2013) OpenFlow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 151–152
55.
Zurück zum Zitat Shin S, Gu G (2013) Attacking software-defined networks: A first feasibility study. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 165–166 Shin S, Gu G (2013) Attacking software-defined networks: A first feasibility study. In: Proceedings of the second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, pp 165–166
56.
Zurück zum Zitat Shin S, Song Y, Lee T, Lee S, Chung J, Porras P, Yegneswaran V, Noh J, Kang BB (2014) Rosemary: A robust, secure, and high-performance network operating system . ACM Shin S, Song Y, Lee T, Lee S, Chung J, Porras P, Yegneswaran V, Noh J, Kang BB (2014) Rosemary: A robust, secure, and high-performance network operating system . ACM
57.
Zurück zum Zitat Schehlmann L, Abt S, Baier H (2014) Blessing or curse? revisiting security aspects of software-defined networking. In: 2014 10th International Conference on Network and Service Management (CNSM). IEEE, pp 382–387 Schehlmann L, Abt S, Baier H (2014) Blessing or curse? revisiting security aspects of software-defined networking. In: 2014 10th International Conference on Network and Service Management (CNSM). IEEE, pp 382–387
58.
Zurück zum Zitat Marinho J, Granjal J, Monteiro E (2015) A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security 2015(1):1–14CrossRef Marinho J, Granjal J, Monteiro E (2015) A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security 2015(1):1–14CrossRef
59.
Zurück zum Zitat Naseef M (2014) Vulnerabilities of LTE and LTE-Advanced Communication White Paper Naseef M (2014) Vulnerabilities of LTE and LTE-Advanced Communication White Paper
60.
Zurück zum Zitat Qi F, Sun S, Rong B, Hu RQ, Qian Y Cognitive radio based adaptive SON for LTE-a heterogeneous networks. In: 2014 IEEE Global Communications Conference (GLOBECOM), vol 2014. IEEE, pp 4412–4417 Qi F, Sun S, Rong B, Hu RQ, Qian Y Cognitive radio based adaptive SON for LTE-a heterogeneous networks. In: 2014 IEEE Global Communications Conference (GLOBECOM), vol 2014. IEEE, pp 4412–4417
61.
Zurück zum Zitat Lien S-Y, Chen K-C, Liang Y-C, Lin Y (2014) Cognitive radio resource management for future cellular networks. IEEE Wirel Commun 21(1):70–79CrossRef Lien S-Y, Chen K-C, Liang Y-C, Lin Y (2014) Cognitive radio resource management for future cellular networks. IEEE Wirel Commun 21(1):70–79CrossRef
62.
Zurück zum Zitat Baldini G, Sturman T, Biswas AR, Leschhorn R, Gódor G, Street M (2012) Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Communications Surveys & Tutorials 14(2):355–379CrossRef Baldini G, Sturman T, Biswas AR, Leschhorn R, Gódor G, Street M (2012) Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Communications Surveys & Tutorials 14(2):355–379CrossRef
63.
Zurück zum Zitat Park J-M, Reed JH, Beex A, Clancy TC, Kumar V, Bahrak B (2014) Security and enforcement in spectrum sharing. Proc IEEE 102(3):270–281CrossRef Park J-M, Reed JH, Beex A, Clancy TC, Kumar V, Bahrak B (2014) Security and enforcement in spectrum sharing. Proc IEEE 102(3):270–281CrossRef
64.
Zurück zum Zitat Sethi A, Brown TX (2008) Hammer model threat assessment of cognitive radio denial of service attacks. In: 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks 2008, DySPAN 2008. IEEE, pp 1–12 Sethi A, Brown TX (2008) Hammer model threat assessment of cognitive radio denial of service attacks. In: 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks 2008, DySPAN 2008. IEEE, pp 1–12
65.
Zurück zum Zitat Hlavacek D, Chang JM (2014) A layered approach to cognitive radio network security: A survey. Comput Netw 75(24):414– 436CrossRef Hlavacek D, Chang JM (2014) A layered approach to cognitive radio network security: A survey. Comput Netw 75(24):414– 436CrossRef
66.
Zurück zum Zitat Zhang L, Ding G, Wu Q, Zou Y, Han Z, Wang J (2015) Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communication Surveys & Tutorials 17(3):1342– 1363CrossRef Zhang L, Ding G, Wu Q, Zou Y, Han Z, Wang J (2015) Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communication Surveys & Tutorials 17(3):1342– 1363CrossRef
67.
Zurück zum Zitat Jermyn J, Salles-Loustau G, Zonouz S (2014) An analysis of dos attack strategies against the LTE RAN. Journal of Cyber Security 3(2):159–180CrossRef Jermyn J, Salles-Loustau G, Zonouz S (2014) An analysis of dos attack strategies against the LTE RAN. Journal of Cyber Security 3(2):159–180CrossRef
68.
Zurück zum Zitat Golde N, Redon K, Borgaonkar R (2012) Weaponizing femtocells: The effect of rogue devices on mobile telecommunications. In: NDSS Golde N, Redon K, Borgaonkar R (2012) Weaponizing femtocells: The effect of rogue devices on mobile telecommunications. In: NDSS
69.
Zurück zum Zitat Lichtman M, Reed JH, Clancy TC, Norton M (2013) Vulnerability of lte to hostile interference. In: 2013 IEEE Global Conference on Signal and Information Processing (GlobalSIP). IEEE, pp 285–288 Lichtman M, Reed JH, Clancy TC, Norton M (2013) Vulnerability of lte to hostile interference. In: 2013 IEEE Global Conference on Signal and Information Processing (GlobalSIP). IEEE, pp 285–288
70.
Zurück zum Zitat Liyanage M, Ahmad I, Ylianttila M, Santos JL, Kantola R, Perez OL, Itzazelaia MU, de Oca EM, Valtierra A, Jimenez C (2015) Security for future software defined mobile networks. In: 9th International Conference on Next Generation Mobile Applications Services and Technologies (NGMAST). IEEE, pp 1–9 Liyanage M, Ahmad I, Ylianttila M, Santos JL, Kantola R, Perez OL, Itzazelaia MU, de Oca EM, Valtierra A, Jimenez C (2015) Security for future software defined mobile networks. In: 9th International Conference on Next Generation Mobile Applications Services and Technologies (NGMAST). IEEE, pp 1–9
71.
Zurück zum Zitat Zhou H, Wu C, Jiang M, Zhou B, Gao W, Pan T, Huang M (2015) Evolving defense mechanism for future network security. IEEE Commun Mag 53(4):45–51CrossRef Zhou H, Wu C, Jiang M, Zhou B, Gao W, Pan T, Huang M (2015) Evolving defense mechanism for future network security. IEEE Commun Mag 53(4):45–51CrossRef
72.
Zurück zum Zitat Gonzales D, Kaplan J, Saltzman E, Winkelman Z, Woods D (2015) Cloud-trust-a security assessment model for infrastructure as a service (IaaS) clouds, IEEE Transactions on Cloud Computing Gonzales D, Kaplan J, Saltzman E, Winkelman Z, Woods D (2015) Cloud-trust-a security assessment model for infrastructure as a service (IaaS) clouds, IEEE Transactions on Cloud Computing
73.
Zurück zum Zitat Hu F, Hao Q, Bao K (2014) A survey on software-defined network and OpenFlow: from concept to implementation. IEEE Communications Surveys & Tutorials 16(4):2181–2206CrossRef Hu F, Hao Q, Bao K (2014) A survey on software-defined network and OpenFlow: from concept to implementation. IEEE Communications Surveys & Tutorials 16(4):2181–2206CrossRef
74.
Zurück zum Zitat Hu H, Ahn G-J, Han W, Zhao Z (2014) Towards a reliable SDN firewall, Presented as part of the Open Networking Summit 2014 (ONS 2014) Hu H, Ahn G-J, Han W, Zhao Z (2014) Towards a reliable SDN firewall, Presented as part of the Open Networking Summit 2014 (ONS 2014)
75.
Zurück zum Zitat Matias J, Garay J, Toledo N, Unzilla J, Jacob E (2015) Toward an SDN-enabled NFV architecture. IEEE Commun Mag 53(4):187–193CrossRef Matias J, Garay J, Toledo N, Unzilla J, Jacob E (2015) Toward an SDN-enabled NFV architecture. IEEE Commun Mag 53(4):187–193CrossRef
76.
Zurück zum Zitat Alzahrani AJ, Ghorbani AA (2015) A multi-agent system for smartphone intrusion detection framework. In: Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Vol 1. Springer, pp 101–113 Alzahrani AJ, Ghorbani AA (2015) A multi-agent system for smartphone intrusion detection framework. In: Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Vol 1. Springer, pp 101–113
77.
Zurück zum Zitat El-Gaml EF, ElAttar H, El-Badawy HM (2014) Evaluation of intrusion prevention technique in lte based network. Int J Sci Eng Res 5:1395–1400 El-Gaml EF, ElAttar H, El-Badawy HM (2014) Evaluation of intrusion prevention technique in lte based network. Int J Sci Eng Res 5:1395–1400
78.
Zurück zum Zitat Liebergeld S, Lange M, Borgaonkar R (2014) Cellpot: A concept for next generation cellular network honeypots. In: Workshop on Security Emergence Network Technology. NDSS Liebergeld S, Lange M, Borgaonkar R (2014) Cellpot: A concept for next generation cellular network honeypots. In: Workshop on Security Emergence Network Technology. NDSS
79.
Zurück zum Zitat Yan Z, Zhang P, Vasilakos AV (2015) A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks Yan Z, Zhang P, Vasilakos AV (2015) A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks
80.
Zurück zum Zitat Franċois J, Festor O (2015) Anomaly traceback using software defined networking. In: 2015 National Conference on Parallel Computing Technologies (PARCOMPTECH). IEEE, pp 203–208 Franċois J, Festor O (2015) Anomaly traceback using software defined networking. In: 2015 National Conference on Parallel Computing Technologies (PARCOMPTECH). IEEE, pp 203–208
81.
Zurück zum Zitat Duan X, Wang X (2015) Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun Mag 53(4):28–35CrossRef Duan X, Wang X (2015) Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun Mag 53(4):28–35CrossRef
82.
Zurück zum Zitat Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Renzo MD (2015) Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27CrossRef Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Renzo MD (2015) Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27CrossRef
83.
Zurück zum Zitat Montero D, Yannuzzi M, Shaw A, Jacquin L, Pastor A, Serral-Gracia R, Lioy A, Risso F, Basile C, Sassu R et al (2015) Virtualized security at the network edge: A user-centric approach. IEEE Commun Mag 53(4):176–186CrossRef Montero D, Yannuzzi M, Shaw A, Jacquin L, Pastor A, Serral-Gracia R, Lioy A, Risso F, Basile C, Sassu R et al (2015) Virtualized security at the network edge: A user-centric approach. IEEE Commun Mag 53(4):176–186CrossRef
84.
Zurück zum Zitat Ding AY, Crowcroft J, Tarkoma S, Flinck H (2014) Software defined networking for security enhancement in wireless mobile networks. Comput Netw 66:94–101CrossRef Ding AY, Crowcroft J, Tarkoma S, Flinck H (2014) Software defined networking for security enhancement in wireless mobile networks. Comput Netw 66:94–101CrossRef
85.
Zurück zum Zitat Dhawan M, Poddar R, Mahajan K, Mann V (2015) SPHINX: Detecting security attacks in software-defined networks. In: Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium Dhawan M, Poddar R, Mahajan K, Mann V (2015) SPHINX: Detecting security attacks in software-defined networks. In: Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium
86.
Zurück zum Zitat Leng J, Zhou Y, Zhang J, Hu C (2015) An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network, arXiv:1504.03095 Leng J, Zhou Y, Zhang J, Hu C (2015) An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network, arXiv:1504.​03095
87.
Zurück zum Zitat Tri N, Hiep T, Kim K (2015) Assessing the impact of resource attack in software defined network. In: 2015 International Conference on Information Networking (ICOIN). IEEE, pp 420–425 Tri N, Hiep T, Kim K (2015) Assessing the impact of resource attack in software defined network. In: 2015 International Conference on Information Networking (ICOIN). IEEE, pp 420–425
88.
Zurück zum Zitat Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(18):1587–1611CrossRef Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(18):1587–1611CrossRef
90.
Zurück zum Zitat Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706CrossRef Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706CrossRef
92.
Zurück zum Zitat Gudipati A, Perry D, Li LE, Katti S (2013) SoftRAN: Software defined radio access network. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, pp 25–30 Gudipati A, Perry D, Li LE, Katti S (2013) SoftRAN: Software defined radio access network. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, pp 25–30
93.
Zurück zum Zitat Porras P, Shin S, Yegneswaran V, Fong M, Tyson M, Gu G (2012) A security enforcement kernel for OpenFlow networks. In: Proceedings of the first workshop on Hot topics in software defined networks. ACM, pp 121–126 Porras P, Shin S, Yegneswaran V, Fong M, Tyson M, Gu G (2012) A security enforcement kernel for OpenFlow networks. In: Proceedings of the first workshop on Hot topics in software defined networks. ACM, pp 121–126
94.
Zurück zum Zitat Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining OpenFlow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62:122–136CrossRef Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining OpenFlow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62:122–136CrossRef
95.
Zurück zum Zitat Yang M, Li Y, Jin D, Zeng L, Wu X, Vasilakos AV (2014) Software-defined and virtualized future mobile and wireless networks: a survey. Mobile Networks and Applications 20(1):4–18CrossRef Yang M, Li Y, Jin D, Zeng L, Wu X, Vasilakos AV (2014) Software-defined and virtualized future mobile and wireless networks: a survey. Mobile Networks and Applications 20(1):4–18CrossRef
96.
Zurück zum Zitat Li G, Wu D, Shen J, Li T (2015) Deciphering Privacy Leakage in Microblogging Social Networks: A Measurement Study, Security and Communication Networks Li G, Wu D, Shen J, Li T (2015) Deciphering Privacy Leakage in Microblogging Social Networks: A Measurement Study, Security and Communication Networks
97.
Zurück zum Zitat Akhunzada A, Ahmed E, Gani A, Khan M, Imran M, Guizani S (2015) Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun Mag 53(4):36–44CrossRef Akhunzada A, Ahmed E, Gani A, Khan M, Imran M, Guizani S (2015) Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun Mag 53(4):36–44CrossRef
98.
Zurück zum Zitat Tasch M, Khondoker R, Marx R, Bayarou K (2014) Security analysis of security applications for software defined networks. In: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference. ACM, pp 23–30 Tasch M, Khondoker R, Marx R, Bayarou K (2014) Security analysis of security applications for software defined networks. In: Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference. ACM, pp 23–30
Metadaten
Titel
Software-Defined Mobile Networks Security
verfasst von
Min Chen
Yongfeng Qian
Shiwen Mao
Wan Tang
Ximin Yang
Publikationsdatum
09.01.2016
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 5/2016
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-015-0665-5

Weitere Artikel der Ausgabe 5/2016

Mobile Networks and Applications 5/2016 Zur Ausgabe

Neuer Inhalt