skip to main content
research-article

SDN Enabled QoE and Security Framework for Multimedia Applications in 5G Networks

Authors Info & Claims
Published:21 April 2021Publication History
Skip Abstract Section

Abstract

The technologies for real-time multimedia transmission and immersive 3D gaming applications are rapidly emerging, posing challenges in terms of performance, security, authentication, data privacy, and encoding. The communication channel for these multimedia applications must be secure and reliable from network attack vectors and data-contents must employ strong encryption to preserve privacy and confidentiality. Towards delivering secure multimedia application environment for 5G networks, we propose an SDN/NFV (Software-Defined-Networking/Network-Function-Virtualization) framework called STREK, which attempts to deliver highly adaptable Quality-of-Experience (QoE), Security, and Authentication functions for multi-domain Cloud to Edge networks. The STREK architecture consists of a holistic SDNFV dataplane, NFV service-chaining and network slicing, a lightweight adaptable hybrid cipher scheme called TREK, and an open RESTful API for applications to deploy custom policies at runtime for multimedia services. For multi-domain/small-cell deployments, the key-generation scheme is dynamic at flow/session-level, and the handover authentication scheme uses a novel method to exchange security credentials with the Access Points (APs) of neighborhood cells. This scheme is designed to improve authentication function during handover with low overhead, delivering the 5G ultra-low latency requirements. We present the experiments with both software and hardware-based implementations and compare our solution with popular lightweight cryptographic solutions, standard open source software, and SDN-based research proposals for 5G multimedia. In the microbenchmarks, STREK achieves smaller hardware, low overhead, low computation, higher attack resistance, and offers better network performance for multimedia streaming applications. In real-time multimedia use-cases, STREK shows greater level of quality distortion for multimedia contents with minimal encryption bitrate overhead to deliver data confidentiality, immunity to common cryptanalysis, and significant resistance to communication channel attacks, in the context of low-latency 5G networks.

References

  1. C. Singhal and Swades De. 2016. Energy-Efficient and QoE-Aware: TV broadcast in next-generation heterogeneous networks. IEEE Commun. Mag. 2016, 54 (2016), 142--150.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Cisco. 2020. Cisco VNI Forecast and Methodology, 2015--2020. http://www.cisco.com/c/dam/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.pdf.Google ScholarGoogle Scholar
  3. Merly Annie Philip, V. Vaithiyanathan, and Kurunandan Jain. 2018. Implementation analysis of rectangle cipher and its variant. In Proceedings of the 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT’18).Google ScholarGoogle ScholarCross RefCross Ref
  4. J. M. Batalla et al. 2017. Efficient media streaming with collaborative terminals for the smart city environment. IEEE Commun. Mag. 2017, 55 (2017), 98--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Y. Jin and Y. Wen. 2017. When cloud media meets network function virtualization: Challenges and applications. IEEE Multimed. 24, 3 (2017).Google ScholarGoogle Scholar
  6. S. Rizou et al. 2018. A service platform architecture enabling programmable edge-to-cloud virtualization for the 5G media industry. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  7. S. A. Alvi, B. Afzal, G. A. Shah, L. Atzori, and W. Mahmood. 2015. Internet of multimedia things: Vision and challenges. Ad Hoc Netw 33 (2015), 87--111Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ETSI. Mobile Edge Computing (MEC); Framework and Reference Architecture. ETSIGSMEC003V1.1.1 (2016-03). Retrieved from https://www.etsi.org/deliver/etsi_gs/MEC/001_099/003/01.01.01_60/gs_MEC003v010101p.pdf.Google ScholarGoogle Scholar
  9. N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. 2008. OpenFlow: Enabling Innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38, 2 (2008).Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dongfeng Fang, Yi Qian, and Rose Qingyang Hu: Security for 5G Mobile Wireless Networks. IEEE Access Spec. Sect. on Trust. Comput. Retrieved from 10.1109/ACCESS.2017.2779146.Google ScholarGoogle Scholar
  11. M. N. Asghar, M. Fleury, and S. Makki. 2017. Interoperable conditional access with video selective encryption for portable devices. Multimed. Tools Applic. 76, 11 (2017), 13139--13152.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y. Chen, H. Jia, K. Huang, J. Lan, and X. Yan. 2016. A secure network coding based on broadcast encryption in SDN. Math. Prob. Eng. 2016, 7145138 (2016).Google ScholarGoogle Scholar
  13. F. Ongaro, E. Cerqueira, L. Foschini, A. Corradi, and M. Gerla. 2015. Enhancing the quality level support for real-time multimedia applications in software-defined networks. In Proceedings of the International Conference on Computing, Networking and Communications (ICNC’15). 505--509.Google ScholarGoogle Scholar
  14. Olatunde Awobuluyi, James Nightingale, Qi Wang, and Jose M. Alcaraz-Calero. 2015. Video quality in 5G networks context-aware QoE management in the SDN control plane. In Proceedings of the IEEE International Conference on Computer and Information Technology. 1657--1662Google ScholarGoogle Scholar
  15. Pengcheng Liu et al. 2018. Secure video streaming with lightweight cipher PRESENT in an SDN testbed. Comput. Mater. Contin. 57, 3 (2018), 353--363. DOI:10.32604/cmc.2018.04142Google ScholarGoogle ScholarCross RefCross Ref
  16. Hassan Noural et al. 2018. One round cipher algorithm for multimedia IoT devices. Multimed. Tools Applic. DOI: https://doi.org/10.1007/s11042-018-5660-yGoogle ScholarGoogle Scholar
  17. Federico Alvarez et al. 2019. An edge-to-cloud virtualized multimedia service platform for 5G networks. IEEE Trans. Broadcast. 65, 2 (2019).Google ScholarGoogle Scholar
  18. Teerawut Banchuen, Kiattikun Kawila, and Kultida Rojviboonchai. 2018. An SDN framework for video conference in inter-domain network. In Proceedings of the International Conference on Advanced Communications Technology (ICACT’20).Google ScholarGoogle Scholar
  19. Ling Xing, Qiang Ma, Honghai Wu, and Ping Xie. 2018. General multimedia trust authentication framework for 5G networks. Wirel. Commun. Mob. Comput. 8974802 (2018). DOI:https://doi.org/10.1155/2018/8974802Google ScholarGoogle Scholar
  20. Sufyan Almajali, Dhiah el Diehn I. Abou-Tair, Haythem Bany Salameh, et al. 2019. A distributed multi-layer MEC-cloud architecture for processing large scale IoT-based multimedia applications. Multimed. Tools Applic. 78 (2019), 24617--24638. DOI:https://doi.org/10.1007/s11042-018-7049-3Google ScholarGoogle ScholarCross RefCross Ref
  21. Xiaoyu Duan and Xianbin Wang. 2016. Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer. In Proceedings of the IEEE Communication and Information Systems Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  22. Subhan Ullah, Lucio Marcenaro, and Bernhard Rinner. 2019. Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications, Sensors 19 (2019), 327.Google ScholarGoogle ScholarCross RefCross Ref
  23. Ihsan Mert Ozcelik and Cem Ersoy. 2019. Chunk duration–aware SDN-assisted DASH. ACM Trans. Multimed. Comput. Commun. Applic. 15, 3 (2019).Google ScholarGoogle Scholar
  24. Prabhakar Krishnan, Karthik Raghunath, and Krishnashree Achuthan. 2018. Managing network functions in stateful application aware SDN. In Proceedings of the 6th International Symposium on Security in Computing and Communications.Google ScholarGoogle Scholar
  25. Prabhakar Krishnan, Jisha S. Najeem, and Krishnashree Achuthan. 2017. SDN framework for securing IoT networks. In Proceedings of the International Conference on Ubiquitous Communications and Network Computing. Springer, Cham, 116--129.Google ScholarGoogle Scholar
  26. Shuai Zhao et al. 2018. Smooth streaming with MPEG-DASH using SDN-based application-aware networking. In Proceedings of the Workshop on Computing, Networking and Communications.Google ScholarGoogle Scholar
  27. Ugur Acar et al. 2018. Programming tools for rapid NFV-based media application development in 5G networks. In Proceedings of the IEEE Conference on Network Function Virtualization/Software Defined Networks.Google ScholarGoogle Scholar
  28. Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, and Konstantinos Rantos. 2014. Lightweight cryptography for embedded systems—A comparative analysis. In Data Privacy Management and Autonomous Spontaneous Security. Springer, Berlin, 333--349.Google ScholarGoogle Scholar
  29. A. Biryukov and L. Perrin. 2017. State of the art in lightweight symmetric cryptography. IACR Cryptology ePrint Archive. Retrieved from https://eprint.iacr.org/2017/511.pdf.Google ScholarGoogle Scholar
  30. George Hatzivasilis, Konstantinos Fysarakis, Ioannis Papaefstathiou, and Charalampos Manifavas. 2018. A review of lightweight block ciphers. J. Cryptog. Eng. 8 (2018), 141--184. DOI:https://doi.org/10.1007/s13389-017-0160-yGoogle ScholarGoogle ScholarCross RefCross Ref
  31. Navid Nikaein, Mahesh K. Marina, Saravana Manickam, Alex Dawson, Raymond Knopp, and Christian Bonnet. 2014. OpenAirInterface: A flexible platform for 5G research. SIGCOMM Comput. Commun. Rev. 44, 5 (October 2014), 33--38. DOI:https://doi.org/10.1145/2677046.2677053Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Muhammad Reza Z'aba et al. 2014. I-PRESENT: An involutive lightweight block cipher. J. Inf. Sec. 5 (2014), 114--122.Google ScholarGoogle Scholar
  33. Z. Gong, S. Nikova, and Y. W. Law. 2011. KLEIN—A new family of lightweight block ciphers. RFID. Security and Privacy (Lecture Notes in Computer Science, Vol. 7055). Springer-Verlag, Berlin, 1--18.Google ScholarGoogle Scholar
  34. WenTao Zhang, ZhenZhen Bao, DongDai Lin, et al. 2015. RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58 (2015), 1--15. DOI:https://doi.org/10.1007/s11432-015-5459-7Google ScholarGoogle ScholarCross RefCross Ref
  35. Elena Dubrova and Martin Hell. 2017. Espresso: A stream cipher for 5G wireless communication systems. Cryptog. Commun. 9, 2 (2017), 273--289.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. J. Daemen and V. Rijmen. 2002. The Design of Rijndael, AES—The advanced Encryption Standard. Springer-Verlag, Berlin.Google ScholarGoogle Scholar
  37. C. Blondeau and K. Nyberg. 2013. New links between differential and linear cryptanalysis. In Advances in Cryptology—EUROCRYPT 2013, T. Johansson and P. Q. Nguyen (Eds.). EUROCRYPT 2013. Lecture Notes in Computer Science, Vol. 7881. Springer, Berlin, Heidelberg. DOI:https://doi.org/10.1007/978-3-642-38348-9_24Google ScholarGoogle Scholar
  38. A. Bogdanov and K. Shibutani. 2012. Generalized Feistel networks revisited. Des., Codes Cryptog. 66 (2012), 75--97.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. F. Chabaud and S. Vaudenay. 1995. Links between differential and linear cryptanalysis. In Advances in Cryptology—EUROCRYPT'94. A. De Santis (Ed.). EUROCRYPT 1994. Lecture Notes in Computer Science, Vol. 950. Springer, Berlin, Heidelberg. DOI:https://doi.org/10.1007/BFb0053450Google ScholarGoogle Scholar
  40. P. Shantharama et al. 2018. LayBack: SDN management of MEC for network access services and radio resource sharing. IEEE Access. DOI:https://doi.org/10.1109/ACCESS.2018.2873984Google ScholarGoogle Scholar
  41. J. Son and R. Buyya. 2019. Latency-aware virtualized network function provisioning for distributed edge clouds. J. Syst. Softw. 152 (2019), 24--31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Prabhakar Krishnan, Subhasri Duttagupta, and Krishnashree Achuthan. 2019. SDNFV based threat monitoring and security framework for multi-access edge computing infrastructure. Mobile. Netw. Appl. 24 (2019), 1896--1923. DOI:https://doi.org/10.1007/s11036-019-01389-2Google ScholarGoogle ScholarCross RefCross Ref
  43. Prabhakar Krishnan et al. 2019. VARMAN: Multi-plane security framework for software defined networks. Comput. Commun. DOI:10.1016/j.comcom.2019.09.014Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. SDN Enabled QoE and Security Framework for Multimedia Applications in 5G Networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!