Next Article in Journal
Localization of Mixed Completely and Partially Polarized Signals with Crossed-Dipole Sensor Arrays
Previous Article in Journal
PCF Based Sensor with High Sensitivity, High Birefringence and Low Confinement Losses for Liquid Analyte Sensing Applications
Article Menu

Export Article

Open AccessArticle
Sensors 2015, 15(12), 31843-31858; doi:10.3390/s151229887

A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200041, China
Department of Information and Electric Engineering, Muroran Institute of Technology, Muroran 050-8585, Japan
Author to whom correspondence should be addressed.
Academic Editor: Leonhard M. Reindl
Received: 9 November 2015 / Revised: 4 December 2015 / Accepted: 8 December 2015 / Published: 17 December 2015
(This article belongs to the Section Sensor Networks)
View Full-Text   |   Download PDF [2901 KB, uploaded 17 December 2015]   |  


Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. View Full-Text
Keywords: 5G; security assessment; software-defined networking based mobile networks; attack graph; analytic hierarchy process 5G; security assessment; software-defined networking based mobile networks; attack graph; analytic hierarchy process

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Luo, S.; Dong, M.; Ota, K.; Wu, J.; Li, J. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks. Sensors 2015, 15, 31843-31858.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top