Network slicing deployment method based on isolation level

In order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isol...

Full description

Saved in:
Bibliographic Details
Main Authors: Qirun PAN, Kaizhi HUANG, Wei YOU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2020-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020003
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529991993491456
author Qirun PAN
Kaizhi HUANG
Wei YOU
author_facet Qirun PAN
Kaizhi HUANG
Wei YOU
author_sort Qirun PAN
collection DOAJ
description In order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isolation and security isolation.When deploying the virtual nodes in the appropriate location,not only ensured that all network slice instances could reach their respective performance levels and security levels,but also isolated them.The gradation difference started to limit the coexistence condition of the virtual node.Then the integer linear programming method was used to model the problem,and the deployment cost was minimized as the objective function.Finally,the particle swarm optimization algorithm based on genetic algorithm was used to find the final deployment result.The simulation results show that the method has lower deployment cost and higher benefit-to-cost ratio,and can guarantee both performance and security.
format Article
id doaj-art-a5d0a96237214b65b2fd172694d73dec
institution Kabale University
issn 2096-109X
language English
publishDate 2020-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-a5d0a96237214b65b2fd172694d73dec2025-01-15T03:14:03ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2020-04-0169610559558566Network slicing deployment method based on isolation levelQirun PANKaizhi HUANGWei YOUIn order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isolation and security isolation.When deploying the virtual nodes in the appropriate location,not only ensured that all network slice instances could reach their respective performance levels and security levels,but also isolated them.The gradation difference started to limit the coexistence condition of the virtual node.Then the integer linear programming method was used to model the problem,and the deployment cost was minimized as the objective function.Finally,the particle swarm optimization algorithm based on genetic algorithm was used to find the final deployment result.The simulation results show that the method has lower deployment cost and higher benefit-to-cost ratio,and can guarantee both performance and security.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020003network slicingisolationperformance degradationside channel attack
spellingShingle Qirun PAN
Kaizhi HUANG
Wei YOU
Network slicing deployment method based on isolation level
网络与信息安全学报
network slicing
isolation
performance degradation
side channel attack
title Network slicing deployment method based on isolation level
title_full Network slicing deployment method based on isolation level
title_fullStr Network slicing deployment method based on isolation level
title_full_unstemmed Network slicing deployment method based on isolation level
title_short Network slicing deployment method based on isolation level
title_sort network slicing deployment method based on isolation level
topic network slicing
isolation
performance degradation
side channel attack
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020003
work_keys_str_mv AT qirunpan networkslicingdeploymentmethodbasedonisolationlevel
AT kaizhihuang networkslicingdeploymentmethodbasedonisolationlevel
AT weiyou networkslicingdeploymentmethodbasedonisolationlevel