Software-defined mobile networks security

Software-defined mobile networks security

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Security and Privacy for Big Data, Cloud Computing and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.

Chapter Contents:

  • 10.1 The evolution of software-defined mobile network
  • 10.2 SDMN architecture
  • 10.2.1 Network function virtualization
  • 10.2.2 OpenFlow
  • 10.3 SDMN security issues
  • 10.3.1 SDN original security issues
  • SDN architecture
  • Security problems of SDN
  • Security principles
  • 10.3.2 Special security issues in SDMN
  • 10.4 SDMN security measures
  • 10.4.1 Data plane attack
  • Attacks aiming at the OpenFlow-enable switch
  • Attacks aiming at the terminals (i. e., client-end devices)
  • 10.4.2 Control plane attack
  • 10.4.3 Application plane attack
  • 10.4.4 Attack at the communication protocols
  • 10.4.5 Category and analysis of STRIDE
  • 10.4.6 SDMN security challenges
  • 10.5 Summary
  • References

Inspec keywords: software radio; mobile communication; software defined networking; mobile radio; cloud computing; telecommunication traffic; protocols; telecommunication security; security of data; virtualisation

Other keywords: SDMN concept; network functions; cloud computing; SDN; control layer; software-defined mobile networks security; software-defined network; data traffic; generation telecommunication networks; quicker network access; related security problems; NFV; security concerns; relevant security threats; network function virtualization; open security challenges; wireless capacity; higher demand; data layer; software-defined mobile network; application layer; more reliable network access; wireless data demands

Subjects: Mobile radio systems; Internet software; Data security; Computer communications; Protocols

Preview this chapter:
Zoom in

Software-defined mobile networks security, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch10-1.gif /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch10-2.gif

Related content

This is a required field
Please enter a valid email address