Heuristic algorithm for secure virtual network embedding

被引:10
|
作者
Liu X. [1 ]
Wang B. [1 ]
Liu S. [1 ]
Yang Z. [1 ]
Zhao Z. [1 ]
机构
[1] Information and Navigation College, Air Force Engineering University, Xi'an
来源
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics | 2018年 / 40卷 / 03期
关键词
Heuristic algorithm; Network virtualization; Security; Virtual network embedding;
D O I
10.3969/j.issn.1001-506X.2018.03.29
中图分类号
学科分类号
摘要
To deal with the low acceptance ratio and high average embedding cost faced by secure virtual network embedding, which is caused by the poor match between the virtual nodes and the physical nodes, a mixed integer linear programming model is established, and a two-stage secure virtual network embedding algorithm based on node attributes comprehensive assessment and path optimization is proposed. In the stage of node embedding, a node embedding function is built to find the best node in candidates, which takes resource richness, security attributes, and topology connection into account. In the stage of link embedding, a path embedding function is set to find the best path in candidates, which takes available bandwidth and hops of the path into account. The simulation results show better performance of the proposed algorithm in metrics such as acceptance ratio, average embedding revenue, and average embedding cost. © 2018, Editorial Office of Systems Engineering and Electronics. All right reserved.
引用
收藏
页码:676 / 681
页数:5
相关论文
共 17 条
  • [1] Anderson T., Peterson L., Shenker S., Et al., Overcoming the internet impasse through virtualization, Computer, 38, 4, pp. 34-41, (2005)
  • [2] Amaldi E., On the computational complexity of the virtual network embedding problem, Electronic Notes in Discrete Mathematics, 52, pp. 213-220, (2016)
  • [3] Bianchi F., Presti F.L., A markov reward model based greedy heuristic for the virtual network embedding problem, Proc. of the IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 373-378, (2016)
  • [4] Cui H.Y., Gao W.J., Liu J., Et al., A virtual network embedding algorithm based on virtual topology connection feature, Proc. of the IEEE 16th International Symposium on Wireless Personal Multimedia Communications, pp. 1-5, (2013)
  • [5] Liu X., Zhang Z.B., Li X.M., Et al., Optimal virtual network embedding based on artificial bee colony, Eurasip Journal on Wireless Communications & Networking, 2016, 1, (2016)
  • [6] Zhang Z.B., Su S., Zhang J.C., Et al., Energy aware virtual network embedding with dynamic demands: online and offline, Computer Networks, 93, pp. 448-459, (2015)
  • [7] Triki N., Kara N., Barachi M.E., Et al., A green energy-aware hybrid virtual network embedding approach, Computer Networks, 91, pp. 712-737, (2015)
  • [8] Han X., Han P.C., Liu Y.J., Et al., Green virtual network embedding with periodical sleep mechanism for fiber-wireless access network, Proc. of the Asia Communications and Photonics Conference, (2016)
  • [9] Lekha P., Tram T.H., Mohan G., Time and bandwidth-aware virtual network embedding and migration in hybrid optical-electrical data centers, Proc. of the IEEE 31st International Conference on Advanced Information Networking and Applications, pp. 947-954, (2017)
  • [10] Shahriar N., Ahmed R., Khan A., Et al., ReNoVatE: recovery from node failure in virtual network embedding, Proc. of the 12th International Conference on Network and Service Management (CNSM), pp. 19-27, (2016)