Next Article in Journal
An Energy-Efficient Routing Algorithm in Three-Dimensional Underwater Sensor Networks Based on Compressed Sensing
Previous Article in Journal
Turbo Coded OFDM Combined with MIMO Antennas Based on Matched Interleaver for Coded-Cooperative Wireless Communication
Article Menu

Export Article

Open AccessArticle
Information 2017, 8(2), 65;

Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking

Department of Computer Science, Kyonggi University, Suwon 16227, Korea
Author to whom correspondence should be addressed.
Academic Editor: Eduardo B. Fernandez
Received: 9 April 2017 / Revised: 10 June 2017 / Accepted: 11 June 2017 / Published: 13 June 2017
(This article belongs to the Section Information and Communications Technology)
Full-Text   |   PDF [5474 KB, uploaded 15 June 2017]   |  


In order to build an efficient security architecture, previous studies have attempted to understand complex system architectures and message flows to detect various attack packets. However, the existing hardware-based single security architecture cannot efficiently handle a complex system structure. To solve this problem, we propose a software-defined networking (SDN) policy-based scheme for an efficient security architecture. The proposed scheme considers four policy functions: separating, chaining, merging, and reordering. If SDN network functions virtualization (NFV) system managers use these policy functions to deploy a security architecture, they only submit some of the requirement documents to the SDN policy-based architecture. After that, the entire security network can be easily built. This paper presents information about the design of a new policy functions model, and it discusses the performance of this model using theoretical analysis. View Full-Text
Keywords: SDN; NFV; security architecture; security policy SDN; NFV; security architecture; security policy

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Lee, W.; Kim, N. Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking. Information 2017, 8, 65.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top