2021
DOI: 10.14445/22315381/ijett-v69i7p229
|View full text |Cite
|
Sign up to set email alerts
|

T-S3RA: Traffic-Aware Scheduling for Secure Slicing and Resource Allocation in SDN/NFVEnabled 5G Networks

Abstract: Network slicing and resource allocation play pivotal roles in software-defined network (SDN)/network function virtualization (NFV)-assisted 5G networks. In 5G communications, the traffic rate is high, necessitating high data rates and low latency. Deep learning is a potential solution for overcoming these constraints. Secure slicing avoids resource wastage; however, DDoS attackers can exploit the sliced network. Therefore, we focused on secure slicing with resource allocation under massive network traffic. Tra… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 42 publications
0
7
0
Order By: Relevance
“…However, none of these studies takes the security requirements of slices into account. A few recent studies considered the security metric in their evaluation such as [7,14]. In [7] authors propose a heuristic 5G core network slice provisioning algorithm called VIKOR-CNSP based on VIKOR, an MCDM approach.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, none of these studies takes the security requirements of slices into account. A few recent studies considered the security metric in their evaluation such as [7,14]. In [7] authors propose a heuristic 5G core network slice provisioning algorithm called VIKOR-CNSP based on VIKOR, an MCDM approach.…”
Section: Related Workmentioning
confidence: 99%
“…However, this approach does not introduce any real-time analysis of the security requirement, and the slice acceptance ratio, which must be large for high priority traffic, is marginal. In [14] authors proposed a Traffic-aware Scheduling for Secure Slicing and Resource Allocation (T-S3RA) over SDN/NFV-enabled 5G networks using deep learning models. In this approach, user devices are authenticated using Boolean logic with a password-based key derivation function.…”
Section: Related Workmentioning
confidence: 99%
“…The orthogonality of the subcarriers is achieved by the use of the fast Fourier transform (FFT), hence mitigating interference. In order to achieve flat fading in Orthogonal Frequency Division Multiplexing (OFDM), a technique involves generating low-rate data streams on subcarriers has been proposed [11]. OFDM transmission is implemented in a sequential fashion, where each symbol is transmitted individually [12].…”
Section: Orthogonal Frequency Division Multiplexing (Ofdm)mentioning
confidence: 99%
“…The subcarriers are orthogonal owing to the fast Fourier transform (FFT), which avoids interference. Flat fading can be achieved in OFDM by producing low-rate data streams against subcarriers [14].…”
Section: Ofdmmentioning
confidence: 99%