Inicio  /  Future Internet  /  Vol: 10 Par: 6 (2018)  /  Artículo
ARTÍCULO
TITULO

A Tiered Control Plane Model for Service Function Chaining Isolation

Håkon Gunleifsen    
Vasileios Gkioulos and Thomas Kemmerich    

Resumen

This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted links are utilized for enabling network security. Nevertheless, within a Service Function Chain (SFC), Virtual Network Function (VNF) flows cannot be isolated and end-to-end encrypted because each VNF requires direct access to the overall SFC data-flow. This restricts both end-users and Service Providers from enabling end-to-end security, and in extended VNF isolation within the SFC data traffic. Encrypting data flows on a per-flow basis results in an extensive amount of secure tunnels, which cannot scale efficiently in manual configurations. Additionally, creating secure data plane tunnels between NFV providers requires secure exchange of key parameters, and the establishment of an east?west control plane protocol. In this article, we present an architecture focusing on these two problems, investigating how overlay networks can be created, isolated, and secured dynamically. Accordingly, we propose an architecture for automated establishment of encrypted tunnels in NFV, which introduces a novel, tiered east?west communication channel between network controllers in a multi-domain environment.

 Artículos similares

       
 
Ya-Hui Chang, Chih-Wei Tseng and Hsien-Chieh Hsu    
Urban stormwater drainage systems, which include many personholes to collect and discharge precipitation within a city, are extensively constructed to prevent streets and buildings from flooding. This research intends to build a machine learning model to... ver más
Revista: Water

 
Yu Chen, Qi Dong, Xiaozhou Shang, Zhenyu Wu and Jinyu Wang    
Unmanned aerial vehicles (UAVs) are important in reconnaissance missions because of their flexibility and convenience. Vitally, UAVs are capable of autonomous navigation, which means they can be used to plan safe paths to target positions in dangerous su... ver más
Revista: Drones

 
Jiaqi Zhao, Ming Xu, Yunzhi Chen and Guoliang Xu    
Nowdays, DNNs (Deep Neural Networks) are widely used in the field of DDoS attack detection. However, designing a good DNN architecture relies on the designer?s experience and requires considerable work. In this paper, a GA (genetic algorithm) is used to ... ver más
Revista: Future Internet

 
Carlos Serôdio, José Cunha, Guillermo Candela, Santiago Rodriguez, Xosé Ramón Sousa and Frederico Branco    
The emergence of the sixth generation of cellular systems (6G) signals a transformative era and ecosystem for mobile communications, driven by demands from technologies like the internet of everything (IoE), V2X communications, and factory automation. To... ver más
Revista: Future Internet

 
Michael Xevgenis, Dimitrios G. Kogias, Panagiotis A. Karkazis and Helen C. Leligou    
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ... ver más
Revista: Future Internet