IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v11y2019i4p85-d218078.html
   My bibliography  Save this article

A Robust Security Architecture for SDN-Based 5G Networks

Author

Listed:
  • Jiaying Yao

    (School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China
    Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Zhenjiang 212013, China)

  • Zhigeng Han

    (Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Zhenjiang 212013, China
    School of Information Engineering, Nanjing Audit University, Nanjing 211815, China)

  • Muhammad Sohail

    (School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China
    Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Zhenjiang 212013, China)

  • Liangmin Wang

    (School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China
    Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Zhenjiang 212013, China)

Abstract

5G is the latest generation of cellular mobile communications. Due to its significant advantage in high data rate, reduced latency and massive device connectivity, the 5G network plays a vital role in today’s commercial telecommunications networks. However, the 5G network also faces some challenges when used in practice. This is because it consists of various diverse ingredients, termed heterogeneity. The heterogeneity of the 5G network has two consequences: first, it prevents us to use this technology in a uniform way, preventing the wide use of 5G technology; second, it complicates the structure of the 5G network, making it hard to monitor what is going on in a 5G network. To break through this limitation, researchers have worked in this field and design their own protocol, in which software-defined networking (SDN) is one key design concept. By separating control and data plane, SDN can make the 5G network functional and programmable, such that we can handle the heterogeneity in traditional 5G networks. In light of this, we say that SDN-5G network is attractive, but its advantages are not free. The intelligence centralization used in SDN has its own drawbacks when it comes to security. To break through this limitation, we propose a robust security architecture for SDN-based 5G Networks. To find the illegal request from malicious attackers, we add extra cryptographic authentication, termed synchronize secret. The basic idea of our scheme is leveraging preload secrets to differ attacks from regular network communications. The simulation results indicate that our work can completely handle the security problem from SDN with a low disconnect rate of 0.01%, which is much better than that from state of the art.

Suggested Citation

  • Jiaying Yao & Zhigeng Han & Muhammad Sohail & Liangmin Wang, 2019. "A Robust Security Architecture for SDN-Based 5G Networks," Future Internet, MDPI, vol. 11(4), pages 1-14, March.
  • Handle: RePEc:gam:jftint:v:11:y:2019:i:4:p:85-:d:218078
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/11/4/85/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/11/4/85/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mohd Hirzi Adnan & Zuriati Ahmad Zukarnain & Nur Ziadah Harun, 2022. "Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions," Future Internet, MDPI, vol. 14(3), pages 1-28, February.
    2. Symeon Papavassiliou, 2020. "Software Defined Networking (SDN) and Network Function Virtualization (NFV)," Future Internet, MDPI, vol. 12(1), pages 1-3, January.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:11:y:2019:i:4:p:85-:d:218078. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.