Heuristic algorithm for secure virtual network embedding

被引:10
作者
Liu X. [1 ]
Wang B. [1 ]
Liu S. [1 ]
Yang Z. [1 ]
Zhao Z. [1 ]
机构
[1] Information and Navigation College, Air Force Engineering University, Xi'an
来源
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics | 2018年 / 40卷 / 03期
关键词
Heuristic algorithm; Network virtualization; Security; Virtual network embedding;
D O I
10.3969/j.issn.1001-506X.2018.03.29
中图分类号
学科分类号
摘要
To deal with the low acceptance ratio and high average embedding cost faced by secure virtual network embedding, which is caused by the poor match between the virtual nodes and the physical nodes, a mixed integer linear programming model is established, and a two-stage secure virtual network embedding algorithm based on node attributes comprehensive assessment and path optimization is proposed. In the stage of node embedding, a node embedding function is built to find the best node in candidates, which takes resource richness, security attributes, and topology connection into account. In the stage of link embedding, a path embedding function is set to find the best path in candidates, which takes available bandwidth and hops of the path into account. The simulation results show better performance of the proposed algorithm in metrics such as acceptance ratio, average embedding revenue, and average embedding cost. © 2018, Editorial Office of Systems Engineering and Electronics. All right reserved.
引用
收藏
页码:676 / 681
页数:5
相关论文
共 17 条
  • [11] Zhang Z.B., Su S., Lin Y.K., Et al., Adaptive multi-objective artificial immune system based virtual network embedding, Journal of Network and Computer Applications, 53, pp. 140-155, (2015)
  • [12] Wang C., Su Y., Zhou L.X., Et al., A virtual network embedding algorithm based on hybrid particle swarm optimization, Proc. of the International Conference on Smart Computing & Communication, pp. 568-576, (2016)
  • [13] Fischer A., De Meer H., Position paper: secure virtual network embedding, Praxis der Information Sverarbeitung und Kommunikation, 34, 4, pp. 190-193, (2011)
  • [14] Bays L.R., Oliveira R.R., Buriol L.S., Et al., Security-aware optimal resource allocation for virtual network embedding, Proc. of the 8th International Conference on Network and Service and Service Management, pp. 378-384, (2012)
  • [15] Liu S.H., Cai Z.P., Xu H., Et al., Towards security-aware virtual network embedding, Computer Networks, 91, pp. 151-163, (2015)
  • [16] Gong S.Q., Chen J., Huang C.H., Et al., Trust-aware secure virtual network embedding algorithm, Journal on Communications, 36, 11, pp. 180-189, (2015)
  • [17] Wang Z.M., Wu J.X., Guo Z.H., Et al., Secure virtual network embedding to mitigate the risk of covert channel attacks, Proc. of the IEEE Conference on Computer Communications Workshops, pp. 144-145, (2016)