Show simple item record

dc.contributor.authorGunleifsen, Håkon
dc.contributor.authorGkioulos, Vasileios
dc.contributor.authorKemmerich, Thomas
dc.date.accessioned2019-08-30T10:30:00Z
dc.date.available2019-08-30T10:30:00Z
dc.date.created2018-08-06T12:16:07Z
dc.date.issued2018
dc.identifier.citationFuture Internet. 2018, 10 (46), 1-33.nb_NO
dc.identifier.issn1999-5903
dc.identifier.urihttp://hdl.handle.net/11250/2611821
dc.description.abstractThis article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted links are utilized for enabling network security. Nevertheless, within a Service Function Chain (SFC), Virtual Network Function (VNF) flows cannot be isolated and end-to-end encrypted because each VNF requires direct access to the overall SFC data-flow. This restricts both end-users and Service Providers from enabling end-to-end security, and in extended VNF isolation within the SFC data traffic. Encrypting data flows on a per-flow basis results in an extensive amount of secure tunnels, which cannot scale efficiently in manual configurations. Additionally, creating secure data plane tunnels between NFV providers requires secure exchange of key parameters, and the establishment of an east–west control plane protocol. In this article, we present an architecture focusing on these two problems, investigating how overlay networks can be created, isolated, and secured dynamically. Accordingly, we propose an architecture for automated establishment of encrypted tunnels in NFV, which introduces a novel, tiered east–west communication channel between network controllers in a multi-domain environment.nb_NO
dc.language.isoengnb_NO
dc.publisherMDPInb_NO
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleA Tiered Control Plane Model for Service Function Chaining Isolationnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber1-33nb_NO
dc.source.volume10nb_NO
dc.source.journalFuture Internetnb_NO
dc.source.issue46nb_NO
dc.identifier.doi10.3390/fi10060046
dc.identifier.cristin1599893
dc.description.localcode(c) 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).nb_NO
cristin.unitcode194,63,0,0
cristin.unitnameFakultet for informasjonsteknologi og elektroteknikk
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal