Wireless network virtualization for enhancing security: Status, challenges and perspectives

Virtualization is emerging as an efficient resource utilization method that eliminates dedicated physical devices. Virtualization has been widely used in computer systems such as virtual memory, virtual storage access network and wired networks - and most recently in cloud computing - to enhance the network performance, resource utilization and energy efficiency, and to achieve performance isolation between different parties. Inspired by this, several techniques for network and wireless virtualization have been proposed in the literature in order to improve the network performance and security. In this paper, we provide a comprehensive study of network and wireless virtualization for enhancing overall network security. We also outline current state of the research and future perspectives. With this paper, readers can have a more thorough understanding of wireless virtualization for network security and the research trends in this area.

[1]  Evren Eren,et al.  Virtualization of wireless LAN infrastructures , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.

[2]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[3]  Lisandro Zambenedetti Granville,et al.  Data Center Network Virtualization: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[4]  Byungchul Kim,et al.  Implementation of an OpenFlow network virtualization for multi-controller environment , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).

[5]  Ralf Steinmetz,et al.  Threat as a Service?: Virtualization's Impact on Cloud Security , 2012, IT Professional.

[6]  Mercedes Barrionuevo,et al.  Virtualization in Education: Portable Network Laboratory , 2017, CACIC.

[7]  Lei Sun,et al.  A Network Management Solution Based on OpenFlow Towards New Challenges of Multitenant Data Center , 2012, 2012 9th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT).

[8]  Zongpeng Li,et al.  Youtube traffic characterization: a view from the edge , 2007, IMC '07.

[9]  F. Richard Yu,et al.  Wireless Network Virtualization: A Survey, Some Research Issues and Challenges , 2015, IEEE Communications Surveys & Tutorials.

[10]  Sachin Shetty,et al.  Dynamic Spectrum Access for Wireless Networks , 2015, SpringerBriefs in Electrical and Computer Engineering.

[11]  Gordon Blair,et al.  A Principled Approach to the Management of Overlay Networks Using Reflection , 2012, 2012 African Conference for Sofware Engineering and Applied Computing.

[12]  Benny Bing,et al.  Efficient HD video streaming over the internet , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).

[13]  Stephen Farrell,et al.  Security Boundaries , 2008, IEEE Internet Computing.

[14]  Ratul Mahajan,et al.  Measuring ISP topologies with rocketfuel , 2002, TNET.

[15]  Peng Zhang,et al.  Collaborative network security in multi-tenant data center for cloud computing , 2014 .

[16]  Yang Wang,et al.  Security-Awareness in Network Virtualization: A Classified Overview , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[17]  Wei-Tek Tsai,et al.  Cloud-Based Virtual Laboratory for Network Security Education , 2014, IEEE Transactions on Education.

[18]  Gernot Heiser Virtualization for Embedded Systems , 2007 .

[19]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[20]  Raouf Boutaba,et al.  A survey of network virtualization , 2010, Comput. Networks.

[21]  Olivia R. Liu Sheng,et al.  Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology , 1999, J. Manag. Inf. Syst..

[22]  F. Richard Yu,et al.  Energy-Efficient Resource Allocation for Heterogeneous Cognitive Radio Networks with Femtocells , 2012, IEEE Transactions on Wireless Communications.

[23]  F. Richard Yu,et al.  Spectrum sharing and resource allocation for energy-efficient heterogeneous cognitive radio networks with femtocells , 2012, 2012 IEEE International Conference on Communications (ICC).

[24]  Tho Le-Ngoc,et al.  Current trends and perspectives in wireless virtualization , 2013, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).

[25]  Andreas Timm-Giel,et al.  LTE wireless virtualization and spectrum management , 2010, WMNC2010.

[26]  Cheng-Xiang Wang,et al.  Network virtualization and resource description in software-defined wireless networks , 2015, IEEE Communications Magazine.

[27]  Raouf Boutaba,et al.  Network virtualization: state of the art and research challenges , 2009, IEEE Communications Magazine.

[28]  Peter A. Dinda,et al.  VNET/P: bridging the cloud and high performance computing through fast overlay networking , 2012, HPDC '12.

[29]  F. Richard Yu,et al.  Wireless virtualization for next generation mobile cellular networks , 2015, IEEE Wireless Communications.

[30]  Quanyan Zhu,et al.  Dynamic energy-aware capacity provisioning for cloud computing environments , 2012, ICAC '12.

[31]  Chonggang Wang,et al.  Interference mitigation and resource allocation in cognitive radio-enabled heterogeneous networks , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[32]  Martín Casado,et al.  Network Virtualization in Multi-tenant Datacenters , 2014, NSDI.

[33]  Sachin Shetty,et al.  Game Theoretic Dynamic Spectrum Access in Cloud-Based Cognitive Radio Networks , 2014, 2014 IEEE International Conference on Cloud Engineering.

[34]  Peter A. Dinda,et al.  Optimizing overlay-based virtual networking through optimistic interrupts and cut-through forwarding , 2012, 2012 International Conference for High Performance Computing, Networking, Storage and Analysis.

[35]  T. Bittman,et al.  Magic Quadrant for x 86 Server Virtualization Infrastructure , 2010 .

[36]  U.O. Gagliardi Trends in computing-system architecture , 1975, Proceedings of the IEEE.

[37]  David Watson,et al.  Topology aware overlay networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[38]  Sixto Ortiz,et al.  Software-Defined Networking: On the Verge of a Breakthrough? , 2013, Computer.

[39]  Mabry Tyson,et al.  FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.

[40]  David E. Williams Virtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress: Including XenEnterprise, XenServer, and XenExpress , 2007 .

[41]  Athanasios V. Vasilakos,et al.  Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey , 2014, Mobile Networks and Applications.

[42]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[43]  Massimo Ferrari Release: VMware NSX 6.1 , 2014 .

[44]  Sachin Shetty,et al.  Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems , 2016, IEEE Systems Journal.

[45]  Anees Shaikh,et al.  CloudNaaS: a cloud networking platform for enterprise applications , 2011, SoCC.

[46]  Jennifer Rexford,et al.  Scalable Network Virtualization in Software-Defined Networks , 2013, IEEE Internet Computing.

[47]  Anja Feldmann,et al.  Implementing Network Virtualization for a Future Internet , 2009 .

[48]  Sachin Shetty,et al.  Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[49]  Sanjay Kumar,et al.  Virtual WiFi: bring virtualization from wired to wireless , 2011, VEE '11.

[50]  Sachin Shetty,et al.  A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[51]  Fang Hao,et al.  Enhancing dynamic cloud-based services using network virtualization , 2009, CCRV.

[52]  Rob Sherwood,et al.  FlowVisor: A Network Virtualization Layer , 2009 .

[53]  Guofei Gu,et al.  A First Step Toward Network Security Virtualization: From Concept To Prototype , 2015, IEEE Transactions on Information Forensics and Security.

[54]  Xin Wang,et al.  Wireless network virtualization , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[55]  Virtual Bridged,et al.  IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).

[56]  Mislav Grgic,et al.  Dynamic spectrum access in cognitive radio , 2009, 2009 International Symposium ELMAR.

[57]  Nick Feamster,et al.  A slick control plane for network middleboxes , 2013, HotSDN '13.