Next Article in Journal
Localization of Mixed Completely and Partially Polarized Signals with Crossed-Dipole Sensor Arrays
Previous Article in Journal
PCF Based Sensor with High Sensitivity, High Birefringence and Low Confinement Losses for Liquid Analyte Sensing Applications
Open AccessArticle

A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

1
School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200041, China
2
Department of Information and Electric Engineering, Muroran Institute of Technology, Muroran 050-8585, Japan
*
Author to whom correspondence should be addressed.
Academic Editor: Leonhard M. Reindl
Sensors 2015, 15(12), 31843-31858; https://doi.org/10.3390/s151229887
Received: 9 November 2015 / Revised: 4 December 2015 / Accepted: 8 December 2015 / Published: 17 December 2015
(This article belongs to the Section Sensor Networks)
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. View Full-Text
Keywords: 5G; security assessment; software-defined networking based mobile networks; attack graph; analytic hierarchy process 5G; security assessment; software-defined networking based mobile networks; attack graph; analytic hierarchy process
Show Figures

Figure 1

MDPI and ACS Style

Luo, S.; Dong, M.; Ota, K.; Wu, J.; Li, J. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks. Sensors 2015, 15, 31843-31858.

Show more citation formats Show less citations formats

Article Access Map

1
Back to TopTop