Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Software-defined mobile networks security
Chen M., Qian Y., Mao S., Tang W., Yang X.  Mobile Networks and Applications 21 (5): 729-743, 2016. Type: Article
Date Reviewed: May 12 2017

The tremendous success of mobile devices and their applications raises a lot of questions regarding security, quality of service (QoS), and user satisfaction. It is therefore very important to address these challenges and provide cost-effective architectural solutions. One of them is software-defined mobile networks (SDMN), an extension of software-defined networking (SDN) that involves cloud computing and network function virtualization (NFV). The separation of the data layer from the control and application layers improves flexibility and scalability among several performance parameters, leading to an increased capacity for data traffic. However, there are challenges, the most important being posed by the security threats.

This paper addresses the research on the security challenge of SDMN by reviewing many research papers that discuss specific security threats and propose adequate countermeasures. The concepts of SDMN and OpenFlow as the main protocol are clearly defined at the beginning of the paper, allowing the reader to understand the architecture and easily follow the authors’ presentation. The paper is logically well structured, addressing the threats at all layers of the architecture and the communication protocols. For example, the authors discuss first the security problems associated with SDN that are inherited by SDMN, and then review the open security issues specific to SDMN. The list of references is comprehensive.

This paper can be recommended as a good starting point for researchers in the area of SDMN, or to fifth generation (5G) system designers.

Reviewer:  D. Grigoras Review #: CR145278 (1707-0455)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Mobile Processors (C.1.4 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (D.2.0 )
 
 
Computer-Communication Networks (C.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Mobile Processors": Date
AndroZoo: collecting millions of Android apps for the research community
Allix K., Bissyandé T., Klein J., Le Traon Y.  MSR 2016 (Proceedings of the 13th International Conference on Mining Software Repositories, Austin, Texas,  May 14-22, 2016) 468-471, 2016. Type: Proceedings
Aug 5 2020
Impact of GC design on power and performance for Android
Hussein A., Payer M., Hosking A., Vick C.  SYSTOR 2015 (Proceedings of the 8th ACM International Systems and Storage Conference, Haifa, Israel,  May 26-28, 2015) 1-12, 2015. Type: Proceedings
Aug 18 2015
CellSs: making it easier to program the cell broadband engine processor
Perez J., Bellens P., Badia R., Labarta J.  IBM Journal of Research and Development 51(5): 593-604, 2007. Type: Article
Apr 30 2008
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy