There has been a rapidly increasing interest in NFV Current NFV trending

There has been a rapidly increasing interest in nfv

This preview shows page 2 - 5 out of 8 pages.

resiliency in NFV, automated recovery from failures should be enabled [16]. There has been a rapidly increasing interest in NFV. Current NFV trending research topics include secure, reliable, energy efficient NFV architectures, and performance optimization for NFV. There are many use cases for NFV, such as virtualization of mobile core network and IMS, virtualization of home and enterprise networks, virtualization of content delivery networks, and fixed access NFV [17]. Cloud computing and industry standard high volume servers contribute to the realization of NFV. Software Defined Networking (SDN) is another approach that aims at improving networking flexibility by separating the forwarding function and routing function into different planes. NFV and SDN are highly complementary at building a software-based solution to networking for more scalable, agile, and innovative networks, but they are different from each other.
Image of page 2

Subscribe to view the full document.

International Journal of Research in Engineering and Applied Sciences (IJREAS) Vol. 7Issue 5, May - 2017 ISSN(O): 2249-3905, ISSN(P): 2349-6525 | Impact Factor: 7.196 International Journal of Research in Engineering & Applied Sciences Email:- [email protected], An open access scholarly, online, peer-reviewed, interdisciplinary, monthly, and fully refereed journals 136 Fig. 1. NFV architectural framework. 3. SECURITY CHALLENGES AND SOLUTIONS FOR NFV NFV brings great opportunities such as reduced cost and less operational influence. However, there are challenges accompanying opportunities [18], [19]. Underlying areas of concern in NFV security include user/tenant authentication and authorization [10]. Security in NFV is discussed in [11] under three situations: security inside VNFs, security between VNFs, and security outside VNFs. Security and software management are the major challenges to NFV [12]. How to overcome the security problems from hypervisor, data communication, and APIs remains a challenge for applying NFV into telecommunication networks and mobile networks [5]. A. Security challenges from NFV infrastructure The NFV infrastructure (NFVI) is constituted by compute domain, hypervisor domain, and network domain. The compute domain includes the generic servers and storage, the hypervisor domain moves the resources from the hardware to the virtual machines, and the network domain manages the VNFs. NFVI suffers from both internal and external security threats. Internal threats result from inappropriate operations of people and it can be avoided by following strict operational procedures. External threats exist because of design or implementation vulnerabilities. To solve this problem, the NFVI devices should have a security certification process to eliminate possible threats. The security of the NFVI should be ensured by the NFV framework. In addition, NFVI should adopt standard security mechanisms for authentication, authorization, encryption and validation [20], [21], [22].
Image of page 3
International Journal of Research in Engineering and Applied Sciences (IJREAS) Vol. 7Issue 5, May - 2017 ISSN(O): 2249-3905, ISSN(P): 2349-6525 | Impact Factor: 7.196 International Journal of Research in Engineering & Applied Sciences Email:- [email protected], An open access scholarly, online, peer-reviewed, interdisciplinary, monthly, and fully refereed journals 137 B. Security challenges from standard interface definition
Image of page 4

Subscribe to view the full document.

Image of page 5
  • Spring '16

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes