Securing VNF communication in NFVI

Shankar Lal, Aapo Kalliola, Ian Oliver, Kimmo Ahola, Tarik Taleb

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    13 Citations (Scopus)

    Abstract

    In a modern telco cloud, network functions are performed by groups of single or interconnected virtual machines (VMs), which form virtualized network functions (VNFs). Securing these VNFs is both important and challenging, since the VNFs might be performing some mission critical operations and exchanging sensitive information among each other. The problem lies in the implementation of current cloud infrastructure where security of traffic is not considered at large. The exchanged traffic among VNFs is mostly unencrypted and subject to eavesdropping. In this paper, we present possible approaches along with the implementation setup to solve the problem of securing communication among VNFs. We also discuss performance overhead measurements of our testbed setup along with relevant challenges and directions for future work.

    Original languageEnglish
    Title of host publication2017 IEEE Conference on Standards for Communications and Networking, CSCN 2017
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages187-192
    Number of pages6
    ISBN (Electronic)978-1-5386-3070-9
    DOIs
    Publication statusPublished - 2017
    MoE publication typeA4 Article in a conference publication
    Event2017 IEEE Conference on Standards for Communications and Networking, CSCN 2017 - Helsinki, Finland
    Duration: 18 Sept 201720 Sept 2017

    Conference

    Conference2017 IEEE Conference on Standards for Communications and Networking, CSCN 2017
    Country/TerritoryFinland
    CityHelsinki
    Period18/09/1720/09/17

    Keywords

    • cloud computing
    • virtual private networks
    • servers
    • bridges
    • cryptography
    • tools

    Fingerprint

    Dive into the research topics of 'Securing VNF communication in NFVI'. Together they form a unique fingerprint.

    Cite this