Abstract
The technologies for real-time multimedia transmission and immersive 3D gaming applications are rapidly emerging, posing challenges in terms of performance, security, authentication, data privacy, and encoding. The communication channel for these multimedia applications must be secure and reliable from network attack vectors and data-contents must employ strong encryption to preserve privacy and confidentiality. Towards delivering secure multimedia application environment for 5G networks, we propose an SDN/NFV (Software-Defined-Networking/Network-Function-Virtualization) framework called STREK, which attempts to deliver highly adaptable Quality-of-Experience (QoE), Security, and Authentication functions for multi-domain Cloud to Edge networks. The STREK architecture consists of a holistic SDNFV dataplane, NFV service-chaining and network slicing, a lightweight adaptable hybrid cipher scheme called TREK, and an open RESTful API for applications to deploy custom policies at runtime for multimedia services. For multi-domain/small-cell deployments, the key-generation scheme is dynamic at flow/session-level, and the handover authentication scheme uses a novel method to exchange security credentials with the Access Points (APs) of neighborhood cells. This scheme is designed to improve authentication function during handover with low overhead, delivering the 5G ultra-low latency requirements. We present the experiments with both software and hardware-based implementations and compare our solution with popular lightweight cryptographic solutions, standard open source software, and SDN-based research proposals for 5G multimedia. In the microbenchmarks, STREK achieves smaller hardware, low overhead, low computation, higher attack resistance, and offers better network performance for multimedia streaming applications. In real-time multimedia use-cases, STREK shows greater level of quality distortion for multimedia contents with minimal encryption bitrate overhead to deliver data confidentiality, immunity to common cryptanalysis, and significant resistance to communication channel attacks, in the context of low-latency 5G networks.
- C. Singhal and Swades De. 2016. Energy-Efficient and QoE-Aware: TV broadcast in next-generation heterogeneous networks. IEEE Commun. Mag. 2016, 54 (2016), 142--150.Google Scholar
Digital Library
- Cisco. 2020. Cisco VNI Forecast and Methodology, 2015--2020. http://www.cisco.com/c/dam/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.pdf.Google Scholar
- Merly Annie Philip, V. Vaithiyanathan, and Kurunandan Jain. 2018. Implementation analysis of rectangle cipher and its variant. In Proceedings of the 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT’18).Google Scholar
Cross Ref
- J. M. Batalla et al. 2017. Efficient media streaming with collaborative terminals for the smart city environment. IEEE Commun. Mag. 2017, 55 (2017), 98--104.Google Scholar
Digital Library
- Y. Jin and Y. Wen. 2017. When cloud media meets network function virtualization: Challenges and applications. IEEE Multimed. 24, 3 (2017).Google Scholar
- S. Rizou et al. 2018. A service platform architecture enabling programmable edge-to-cloud virtualization for the 5G media industry. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. 1--6.Google Scholar
Cross Ref
- S. A. Alvi, B. Afzal, G. A. Shah, L. Atzori, and W. Mahmood. 2015. Internet of multimedia things: Vision and challenges. Ad Hoc Netw 33 (2015), 87--111Google Scholar
Digital Library
- ETSI. Mobile Edge Computing (MEC); Framework and Reference Architecture. ETSIGSMEC003V1.1.1 (2016-03). Retrieved from https://www.etsi.org/deliver/etsi_gs/MEC/001_099/003/01.01.01_60/gs_MEC003v010101p.pdf.Google Scholar
- N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. 2008. OpenFlow: Enabling Innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38, 2 (2008).Google Scholar
Digital Library
- Dongfeng Fang, Yi Qian, and Rose Qingyang Hu: Security for 5G Mobile Wireless Networks. IEEE Access Spec. Sect. on Trust. Comput. Retrieved from 10.1109/ACCESS.2017.2779146.Google Scholar
- M. N. Asghar, M. Fleury, and S. Makki. 2017. Interoperable conditional access with video selective encryption for portable devices. Multimed. Tools Applic. 76, 11 (2017), 13139--13152.Google Scholar
Digital Library
- Y. Chen, H. Jia, K. Huang, J. Lan, and X. Yan. 2016. A secure network coding based on broadcast encryption in SDN. Math. Prob. Eng. 2016, 7145138 (2016).Google Scholar
- F. Ongaro, E. Cerqueira, L. Foschini, A. Corradi, and M. Gerla. 2015. Enhancing the quality level support for real-time multimedia applications in software-defined networks. In Proceedings of the International Conference on Computing, Networking and Communications (ICNC’15). 505--509.Google Scholar
- Olatunde Awobuluyi, James Nightingale, Qi Wang, and Jose M. Alcaraz-Calero. 2015. Video quality in 5G networks context-aware QoE management in the SDN control plane. In Proceedings of the IEEE International Conference on Computer and Information Technology. 1657--1662Google Scholar
- Pengcheng Liu et al. 2018. Secure video streaming with lightweight cipher PRESENT in an SDN testbed. Comput. Mater. Contin. 57, 3 (2018), 353--363. DOI:10.32604/cmc.2018.04142Google Scholar
Cross Ref
- Hassan Noural et al. 2018. One round cipher algorithm for multimedia IoT devices. Multimed. Tools Applic. DOI: https://doi.org/10.1007/s11042-018-5660-yGoogle Scholar
- Federico Alvarez et al. 2019. An edge-to-cloud virtualized multimedia service platform for 5G networks. IEEE Trans. Broadcast. 65, 2 (2019).Google Scholar
- Teerawut Banchuen, Kiattikun Kawila, and Kultida Rojviboonchai. 2018. An SDN framework for video conference in inter-domain network. In Proceedings of the International Conference on Advanced Communications Technology (ICACT’20).Google Scholar
- Ling Xing, Qiang Ma, Honghai Wu, and Ping Xie. 2018. General multimedia trust authentication framework for 5G networks. Wirel. Commun. Mob. Comput. 8974802 (2018). DOI:https://doi.org/10.1155/2018/8974802Google Scholar
- Sufyan Almajali, Dhiah el Diehn I. Abou-Tair, Haythem Bany Salameh, et al. 2019. A distributed multi-layer MEC-cloud architecture for processing large scale IoT-based multimedia applications. Multimed. Tools Applic. 78 (2019), 24617--24638. DOI:https://doi.org/10.1007/s11042-018-7049-3Google Scholar
Cross Ref
- Xiaoyu Duan and Xianbin Wang. 2016. Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer. In Proceedings of the IEEE Communication and Information Systems Security Symposium.Google Scholar
Cross Ref
- Subhan Ullah, Lucio Marcenaro, and Bernhard Rinner. 2019. Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications, Sensors 19 (2019), 327.Google Scholar
Cross Ref
- Ihsan Mert Ozcelik and Cem Ersoy. 2019. Chunk duration–aware SDN-assisted DASH. ACM Trans. Multimed. Comput. Commun. Applic. 15, 3 (2019).Google Scholar
- Prabhakar Krishnan, Karthik Raghunath, and Krishnashree Achuthan. 2018. Managing network functions in stateful application aware SDN. In Proceedings of the 6th International Symposium on Security in Computing and Communications.Google Scholar
- Prabhakar Krishnan, Jisha S. Najeem, and Krishnashree Achuthan. 2017. SDN framework for securing IoT networks. In Proceedings of the International Conference on Ubiquitous Communications and Network Computing. Springer, Cham, 116--129.Google Scholar
- Shuai Zhao et al. 2018. Smooth streaming with MPEG-DASH using SDN-based application-aware networking. In Proceedings of the Workshop on Computing, Networking and Communications.Google Scholar
- Ugur Acar et al. 2018. Programming tools for rapid NFV-based media application development in 5G networks. In Proceedings of the IEEE Conference on Network Function Virtualization/Software Defined Networks.Google Scholar
- Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, and Konstantinos Rantos. 2014. Lightweight cryptography for embedded systems—A comparative analysis. In Data Privacy Management and Autonomous Spontaneous Security. Springer, Berlin, 333--349.Google Scholar
- A. Biryukov and L. Perrin. 2017. State of the art in lightweight symmetric cryptography. IACR Cryptology ePrint Archive. Retrieved from https://eprint.iacr.org/2017/511.pdf.Google Scholar
- George Hatzivasilis, Konstantinos Fysarakis, Ioannis Papaefstathiou, and Charalampos Manifavas. 2018. A review of lightweight block ciphers. J. Cryptog. Eng. 8 (2018), 141--184. DOI:https://doi.org/10.1007/s13389-017-0160-yGoogle Scholar
Cross Ref
- Navid Nikaein, Mahesh K. Marina, Saravana Manickam, Alex Dawson, Raymond Knopp, and Christian Bonnet. 2014. OpenAirInterface: A flexible platform for 5G research. SIGCOMM Comput. Commun. Rev. 44, 5 (October 2014), 33--38. DOI:https://doi.org/10.1145/2677046.2677053Google Scholar
Digital Library
- Muhammad Reza Z'aba et al. 2014. I-PRESENT: An involutive lightweight block cipher. J. Inf. Sec. 5 (2014), 114--122.Google Scholar
- Z. Gong, S. Nikova, and Y. W. Law. 2011. KLEIN—A new family of lightweight block ciphers. RFID. Security and Privacy (Lecture Notes in Computer Science, Vol. 7055). Springer-Verlag, Berlin, 1--18.Google Scholar
- WenTao Zhang, ZhenZhen Bao, DongDai Lin, et al. 2015. RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58 (2015), 1--15. DOI:https://doi.org/10.1007/s11432-015-5459-7Google Scholar
Cross Ref
- Elena Dubrova and Martin Hell. 2017. Espresso: A stream cipher for 5G wireless communication systems. Cryptog. Commun. 9, 2 (2017), 273--289.Google Scholar
Digital Library
- J. Daemen and V. Rijmen. 2002. The Design of Rijndael, AES—The advanced Encryption Standard. Springer-Verlag, Berlin.Google Scholar
- C. Blondeau and K. Nyberg. 2013. New links between differential and linear cryptanalysis. In Advances in Cryptology—EUROCRYPT 2013, T. Johansson and P. Q. Nguyen (Eds.). EUROCRYPT 2013. Lecture Notes in Computer Science, Vol. 7881. Springer, Berlin, Heidelberg. DOI:https://doi.org/10.1007/978-3-642-38348-9_24Google Scholar
- A. Bogdanov and K. Shibutani. 2012. Generalized Feistel networks revisited. Des., Codes Cryptog. 66 (2012), 75--97.Google Scholar
Digital Library
- F. Chabaud and S. Vaudenay. 1995. Links between differential and linear cryptanalysis. In Advances in Cryptology—EUROCRYPT'94. A. De Santis (Ed.). EUROCRYPT 1994. Lecture Notes in Computer Science, Vol. 950. Springer, Berlin, Heidelberg. DOI:https://doi.org/10.1007/BFb0053450Google Scholar
- P. Shantharama et al. 2018. LayBack: SDN management of MEC for network access services and radio resource sharing. IEEE Access. DOI:https://doi.org/10.1109/ACCESS.2018.2873984Google Scholar
- J. Son and R. Buyya. 2019. Latency-aware virtualized network function provisioning for distributed edge clouds. J. Syst. Softw. 152 (2019), 24--31.Google Scholar
Digital Library
- Prabhakar Krishnan, Subhasri Duttagupta, and Krishnashree Achuthan. 2019. SDNFV based threat monitoring and security framework for multi-access edge computing infrastructure. Mobile. Netw. Appl. 24 (2019), 1896--1923. DOI:https://doi.org/10.1007/s11036-019-01389-2Google Scholar
Cross Ref
- Prabhakar Krishnan et al. 2019. VARMAN: Multi-plane security framework for software defined networks. Comput. Commun. DOI:10.1016/j.comcom.2019.09.014Google Scholar
Digital Library
Index Terms
SDN Enabled QoE and Security Framework for Multimedia Applications in 5G Networks
Recommendations
SDN and NFV for QoE-driven multimedia services delivery: The road towards 6G and beyond networks
AbstractThe concept for developing the future mobile communication systems has been explored in recent years with a vision towards 5G and 6G systems. Meeting performance targets such as higher data rate transmission, lower end-to-end latency, ...
Delegation of signing rights for emerging 5G networks
5G mobile networks are promising to offer mobile users unrivaled experiences with infinite networking capability at any period and from anywhere. However, it appears unnecessary and impractical for the customers and servers to be connected permanently ...
5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges
AbstractThe increasing consumption of multimedia services and the demand of high-quality services from customers has triggered a fundamental change in how we administer networks in terms of abstraction, separation, and mapping of forwarding, ...






Comments