2021
DOI: 10.1109/tnsm.2021.3081014
|View full text |Cite
|
Sign up to set email alerts
|

On Achieving Trustworthy Service Function Chaining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…For ensuring integrity of the SFC steering data in the SFCencapsulation and for verifying the correct order of traversal, Pattaranantakul et al [28] present a scheme based on the enforcement of a sequentially-created multisignature where each SF has to sign all received packets.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For ensuring integrity of the SFC steering data in the SFCencapsulation and for verifying the correct order of traversal, Pattaranantakul et al [28] present a scheme based on the enforcement of a sequentially-created multisignature where each SF has to sign all received packets.…”
Section: Related Workmentioning
confidence: 99%
“…This is especially important when integrity of steering data cannot be ensured since it then provides the only way of verification. Proposals for such a scheme exist [4], [28] and may be integrated in the presented concept in future work.…”
Section: G General Sfc-specific Security Requirementsmentioning
confidence: 99%
“…However, the author did not consider the problem of virtual resources and lacked consideration of parameters such as delay. In [14], authors improve the reliability and security of SFC by adding processes and signatures that enforce ordering. But in fact, in order to improve the reliability of SFC, it is often necessary to increase the number of infrastructures to increase the cost.…”
Section: ) Sfc Schedulingmentioning
confidence: 99%
“…s(u) represents the CPU computing resources of the node, and bw(i, j) is the link bandwidth between nodes i and j. Therefore, we use (14) (15) to denote the computational resource cost of physical nodes and the bandwidth resource cost of physical links.…”
Section: Sfc-homentioning
confidence: 99%