TeFENS: Testbed For Experimenting Next-Generation-Network Security

Digital community has envisioned 5G as a network that will be heterogeneous and open in nature, which leads to a pile of security loopholes. It is necessary to have an in depth analysis of the security features of the 5G network before its wide deployment. So, we intend to model a testbed that will be able to probe into security strengths and weakness of the open 5G architecture. In this paper, we have laid down the design of our experimental 5G testbed that encompasses a blend of 5G components spanning over Software Defined Networks, Fog computing and Internet of Things. Our testbed comprises of next generation programmable switches that is capable of effectively demonstrating 5G security services and experimenting on real time data of the programmable openflow enabled switches.

[1]  S. Mercy Shalinie,et al.  SLAMHHA: A supervised learning approach to mitigate host location hijacking attack on SDN controllers , 2017, 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN).

[2]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[3]  Jin Cao,et al.  A secure SDN based multi-RANs architecture for future 5G networks , 2017, Comput. Secur..

[4]  Nicola Blefari-Melazzi,et al.  A framework for experimenting ICN over SDN solutions using physical and virtual testbeds , 2018, Comput. Networks.

[5]  Russell J. Clark,et al.  Advancing Software-Defined Networks: A Survey , 2017, IEEE Access.

[6]  AKHIL GUPTA,et al.  A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.

[7]  Toni Janevski,et al.  5G and the Fog — Survey of related technologies and research directions , 2016, 2016 18th Mediterranean Electrotechnical Conference (MELECON).

[8]  Fernando A. Kuipers,et al.  SDN and Virtualization Solutions for the Internet of Things: A Survey , 2016, IEEE Access.

[9]  Carynthia Kharkongor,et al.  A SDN Controller with Energy Efficient Routing in the Internet of Things (IoT) , 2016 .

[10]  Athanasios V. Vasilakos,et al.  Large-scale MIMO-based wireless backhaul in 5G networks , 2015, IEEE Wireless Communications.

[11]  Antonios Argyriou,et al.  Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..

[12]  Shahid Mumtaz,et al.  A survey of 5G technologies: regulatory, standardization and industrial perspectives , 2017, Digit. Commun. Networks.

[13]  Raimo Kantola,et al.  Enhancing Security of Software Defined Mobile Networks , 2017, IEEE Access.

[14]  Mohsen Guizani,et al.  Smart Cities: A Survey on Data Management, Security, and Enabling Technologies , 2017, IEEE Communications Surveys & Tutorials.

[15]  Zoraida Frias,et al.  5G networks: Will technology and policy collide? , 2017, Telecommunications Policy.

[16]  Bing Chen,et al.  Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.

[17]  Athanasios V. Vasilakos,et al.  Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection , 2015, IEEE Communications Magazine.