Security in Intent-Based Networking: Challenges and Solutions

Ijaz Ahmad, Jere Malinen, Filippos Christou, Pawani Porambage, Andreas Kirstädter, Jani Suomalainen

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

1 Citation (Scopus)

Abstract

Intent-Based Networking (IBN) aims to automate administrative and management tasks in future communications networks. By leveraging networking concepts such as network abstractions and data-plane programmability and using artificial intelligence (AI), IBN improves the overall efficiency of communications networks. IBN employs a closed-loop architecture to monitor and optimize real-time network performance, reduce human intervention, and enhance resilience. However, the paradigm and the technological enablers introduce security challenges. This article studies the security gains and challenges in IBN from the aspect of enabling concepts and technologies. Furthermore, the article highlights potential solutions to existing challenges, outlines the standardization efforts, and summarizes the most important research gaps to advance future research in this direction.
Original languageEnglish
Title of host publication2023 IEEE Conference on Standards for Communications and Networking (CSCN)
PublisherIEEE Institute of Electrical and Electronic Engineers
Pages296-301
Number of pages6
ISBN (Electronic)979-8-3503-9539-6
DOIs
Publication statusPublished - 8 Nov 2023
MoE publication typeA4 Article in a conference publication
Event2023 IEEE Conference on Standards for Communications and Networking (CSCN) - Munich, Germany
Duration: 6 Nov 20238 Nov 2023

Conference

Conference2023 IEEE Conference on Standards for Communications and Networking (CSCN)
Period6/11/238/11/23

Keywords

  • Complexity theory
  • Security
  • Communication networks
  • Artificial intelligence
  • Task analysis
  • Standards
  • Resilience
  • 6G
  • IBN Security
  • IBN
  • Intents

Fingerprint

Dive into the research topics of 'Security in Intent-Based Networking: Challenges and Solutions'. Together they form a unique fingerprint.

Cite this