Cargando…
A security-aware service function chain deployment method for load balance and delay optimization
Network function virtualization (NFV) decouples network functions from hardware devices. However, it introduces security challenges due to its reliance on software, which facilitates attacks. This security problem has a significant negative impact on the interests of users. Existing deployment metho...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9211053/ https://www.ncbi.nlm.nih.gov/pubmed/35729279 http://dx.doi.org/10.1038/s41598-022-14494-2 |
_version_ | 1784730281375170560 |
---|---|
author | Zhai, Dong Meng, Xiangru Yu, Zhenhua Hu, Hang Huang, Tao |
author_facet | Zhai, Dong Meng, Xiangru Yu, Zhenhua Hu, Hang Huang, Tao |
author_sort | Zhai, Dong |
collection | PubMed |
description | Network function virtualization (NFV) decouples network functions from hardware devices. However, it introduces security challenges due to its reliance on software, which facilitates attacks. This security problem has a significant negative impact on the interests of users. Existing deployment methods are not suitable for SFC requests with a security demand, causing the use of substrate resources unreasonable and lower acceptance ratio. Moreover, a strict delay requirement is another challenge for NFV. To make the use of the substrate resources more reasonable and reduce the transmission delay, this paper proposes a security-constraint and function-mutex-constraint consolidation (SFMC) method for virtual network function (VNF) to reduce resource consumption and transmission delay. In addition, a security-aware service function chain (SASFC) deployment method for load balance and delay optimization is presented, which deploys service function chains according to the consolidated results of the SFMC method. The SASFC method first obtains a candidate server node set using resource, hosting capacity, security and node load constraints. It then obtains candidate paths according to the metric of the minimum transmission delay and link load constraint using the Viterbi algorithm. Finally, the path with the highest VNF security level match degree among the candidate paths is adopted to deploy virtual links, and the corresponding server nodes are employed to deploy VNFs. As a result, the SASFC method makes the use of substrate resources more reasonable. It improves the acceptance ratio and long-term average revenue to cost ratio, reduces transmission delay, and achieves load balancing. Experiment results show that when the number of VNFs is five, the acceptance ratio and long-term average revenue to cost ratio of the SASFC method are close to 0.75 and 0.88, which are higher than those of the compared methods. Its transmission delay and proportion of bottleneck nodes are 7.71 and 0.024, which are lower than those of the compared methods. The simulations demonstrate the effectiveness of the SASFC method. |
format | Online Article Text |
id | pubmed-9211053 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-92110532022-06-22 A security-aware service function chain deployment method for load balance and delay optimization Zhai, Dong Meng, Xiangru Yu, Zhenhua Hu, Hang Huang, Tao Sci Rep Article Network function virtualization (NFV) decouples network functions from hardware devices. However, it introduces security challenges due to its reliance on software, which facilitates attacks. This security problem has a significant negative impact on the interests of users. Existing deployment methods are not suitable for SFC requests with a security demand, causing the use of substrate resources unreasonable and lower acceptance ratio. Moreover, a strict delay requirement is another challenge for NFV. To make the use of the substrate resources more reasonable and reduce the transmission delay, this paper proposes a security-constraint and function-mutex-constraint consolidation (SFMC) method for virtual network function (VNF) to reduce resource consumption and transmission delay. In addition, a security-aware service function chain (SASFC) deployment method for load balance and delay optimization is presented, which deploys service function chains according to the consolidated results of the SFMC method. The SASFC method first obtains a candidate server node set using resource, hosting capacity, security and node load constraints. It then obtains candidate paths according to the metric of the minimum transmission delay and link load constraint using the Viterbi algorithm. Finally, the path with the highest VNF security level match degree among the candidate paths is adopted to deploy virtual links, and the corresponding server nodes are employed to deploy VNFs. As a result, the SASFC method makes the use of substrate resources more reasonable. It improves the acceptance ratio and long-term average revenue to cost ratio, reduces transmission delay, and achieves load balancing. Experiment results show that when the number of VNFs is five, the acceptance ratio and long-term average revenue to cost ratio of the SASFC method are close to 0.75 and 0.88, which are higher than those of the compared methods. Its transmission delay and proportion of bottleneck nodes are 7.71 and 0.024, which are lower than those of the compared methods. The simulations demonstrate the effectiveness of the SASFC method. Nature Publishing Group UK 2022-06-21 /pmc/articles/PMC9211053/ /pubmed/35729279 http://dx.doi.org/10.1038/s41598-022-14494-2 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Zhai, Dong Meng, Xiangru Yu, Zhenhua Hu, Hang Huang, Tao A security-aware service function chain deployment method for load balance and delay optimization |
title | A security-aware service function chain deployment method for load balance and delay optimization |
title_full | A security-aware service function chain deployment method for load balance and delay optimization |
title_fullStr | A security-aware service function chain deployment method for load balance and delay optimization |
title_full_unstemmed | A security-aware service function chain deployment method for load balance and delay optimization |
title_short | A security-aware service function chain deployment method for load balance and delay optimization |
title_sort | security-aware service function chain deployment method for load balance and delay optimization |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9211053/ https://www.ncbi.nlm.nih.gov/pubmed/35729279 http://dx.doi.org/10.1038/s41598-022-14494-2 |
work_keys_str_mv | AT zhaidong asecurityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization AT mengxiangru asecurityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization AT yuzhenhua asecurityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization AT huhang asecurityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization AT huangtao asecurityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization AT zhaidong securityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization AT mengxiangru securityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization AT yuzhenhua securityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization AT huhang securityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization AT huangtao securityawareservicefunctionchaindeploymentmethodforloadbalanceanddelayoptimization |