17 research outputs found

    Security analysis of mobile edge computing in virtualized small cell networks

    Get PDF
    Based upon the context of Mobile Edge Computing (MEC) actual research and within the innovative scope of the SESAME EU-funded research project, we propose and assess a framework for security analysis applied in virtualised Small Cell Networks, with the aim of further extending MEC in the broader 5G environment. More specifically, by applying the fundamental concepts of the SESAME original architecture that aims at providing enhanced multi-tenant MEC services through Small Cells coordination and virtualization, we focus on a realistic 5G-oriented scenario enabling the provision of large multi-tenant enterprise services by using MEC. Then we evaluate several security issues by using a formal methodology, known as the Secure Tropos

    On programmable networking evolution

    No full text

    Towards a Blockchain-Based SD-IoV for Applications Authentication and Trust Management

    No full text
    International audienceIoV, bringing smartness into the vehicular environment, represents the future of the vehicular networks. To improve the IoV network management, resource utilization and QoS, a new architecture integrating the SDN technology have been proposed: SD-IoV. However, this architecture introduces new threats and, in particular, security is an important challenge. One of the major shortcomings with security is the lack of authentication and authorization of the applications (network, third party or user) at the distributed SD-IoV control layer. Indeed, these applications are currently able to control the SDN controllers and therefore the network behavior without any restriction. Consequently, a malicious or compromised application could easily disturb the entire network. That is why this paper proposes an innovative trust establishment system based on the blockchain technology. This system aims to control the application identity, as well as the application behavior and the network resources allocation and management. The ideas of application identity and application trust index, using the distributed nature of the SD-IoV, are introduced. Moreover, a design of this system, using smart contracts is also presented

    Integrating SDN and NFV with QoS-aware service composition

    No full text
    Traditional networks are transformed to enable full integration of heterogeneous hardware and software functions, that are configured at runtime, with minimal time to market, and are provided to their end users on “as a service” principle. Therefore, a countless number of possibilities for further innovation and exploitation opens up. Network Function Virtualization (NFV) and Software-Defined Networking (SDN) are two key enablers for such a new flexible, scalable, and service-oriented network architecture. This chapter provides an overview of QoS-aware strategies that can be used over the levels of the network abstraction aiming to fully exploit the new network opportunities. Specifically, we present three use cases of integrating SDN and NFV with QoS-aware service composition, ranging from the energy efficient placement of virtual network functions inside modern data centers, to the deployment of data stream processing applications using SDN to control the network paths, to exploiting SDN for context-aware service compositions
    corecore