How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain? |
|
Author: | Hewa, Tharaka1; Kalla, Anshuman1; Porambage1; |
Organizations: |
1Centre for Wireless Communications, University of Oulu, Finland 2School of Computer Science, University College Dublin, Ireland |
Format: | article |
Version: | accepted version |
Access: | open |
Online Access: | PDF Full Text (PDF, 0.7 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe2023032232828 |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers,
2021
|
Publish Date: | 2023-03-22 |
Description: |
AbstractSeveral recent works talk about the potential use of network slice brokering mechanism to facilitate the resource allocation of network slicing in next generation networks. This involves network tenants on the one hand and resource/infrastructure providers on the other hand. However, the potential downside of deploying Network Slice Broker (NSB) is that it can be victimized by DoS (Denial of Service) attack. Thus, the aim of this work is three fold. First, to present the possible ways in which DoS/DDoS attacks can be mounted on NSB and their adverse effects. Second, to propose and implement initial blockchain-based solution named as Security Service Blockchain (SSB) to prevent DoS attacks on NSB. Third, to enumerate the challenges and future research directions to effectively utilize blockchain for mitigating DoS/DDoS attacks on NSB. To evaluate the performance the proposed SSB framework is implemented using Hyperledger Fabric. The results manifest that the latency impact of the legitimate slice creation over scaled up malicious traffic remains minimal with the use of SSB framework. The integration of SSB with NSB results in gaining several fold reduction in latency under DoS attack scenario. see all
|
Series: |
IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications workshops |
ISSN: | 2166-9570 |
ISSN-E: | 2166-9589 |
ISSN-L: | 2166-9570 |
ISBN: | 978-1-7281-7586-7 |
ISBN Print: | 978-1-7281-7587-4 |
Pages: | 1525 - 1531 |
DOI: | 10.1109/PIMRC50174.2021.9569375 |
OADOI: | https://oadoi.org/10.1109/PIMRC50174.2021.9569375 |
Host publication: |
32nd IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2021 |
Conference: |
Annual International Symposium on Personal, Indoor and Mobile Radio Communications |
Type of Publication: |
A4 Article in conference proceedings |
Field of Science: |
213 Electronic, automation and communications engineering, electronics |
Subjects: | |
Funding: |
This work has been performed under 6Genesis Flagship (grant 318927) and 5GEAR projects. The research leading to these results partly received funding from European Union’s Horizon 2020 research and innovation programme under grant agreement no 871808 (5G PPP project INSPIRE-5Gplus). The paper reflects only the authors’ views. The Commission is not responsible for any use that may be made of the information it contains. |
EU Grant Number: |
(871808) INSPIRE-5Gplus - INtelligent Security and PervasIve tRust for 5G and Beyond |
Academy of Finland Grant Number: |
318927 |
Detailed Information: |
318927 (Academy of Finland Funding decision) |
Copyright information: |
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists,
or reuse of any copyrighted component of this work in other works. |