Javascript must be enabled to continue!
Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks
View through CrossRef
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, security, storage, etc., through software-based virtual machines. As a result, NFV reduces equipment costs. Due to the increase in applications on Industrial Internet of Things (IoT)-based networks, security threats have also increased. The communication links between people and people or from one machine to another machine are insecure. Usually, critical data are exchanged over the IoE, so authentication and confidentiality are significant concerns. Asymmetric key cryptosystems increase computation and communication overheads. This paper proposes a lightweight and certificateless end-to-end secure communication scheme to provide security services against replay attacks, man-in-the-middle (MITM) attacks, and impersonation attacks with low computation and communication overheads. The system is implemented on Linux-based Lubuntu 20.04 virtual machines using Java programming connected to NFV-based large-scale hybrid IPv4-IPv6 virtual networks. Finally, we compare the performance of our proposed security scheme with existing schemes based on the computation and communication costs. In addition, we measure and analyze the performance of our proposed secure communication scheme over NFV-based virtualized networks with regard to several parameters like end-to-end delay and packet loss. The results of our comparison with existing security schemes show that our proposed security scheme reduces the computation cost by 38.87% and the communication cost by 26.08%.
Title: Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks
Description:
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV).
NFV provides networking services like routing, security, storage, etc.
, through software-based virtual machines.
As a result, NFV reduces equipment costs.
Due to the increase in applications on Industrial Internet of Things (IoT)-based networks, security threats have also increased.
The communication links between people and people or from one machine to another machine are insecure.
Usually, critical data are exchanged over the IoE, so authentication and confidentiality are significant concerns.
Asymmetric key cryptosystems increase computation and communication overheads.
This paper proposes a lightweight and certificateless end-to-end secure communication scheme to provide security services against replay attacks, man-in-the-middle (MITM) attacks, and impersonation attacks with low computation and communication overheads.
The system is implemented on Linux-based Lubuntu 20.
04 virtual machines using Java programming connected to NFV-based large-scale hybrid IPv4-IPv6 virtual networks.
Finally, we compare the performance of our proposed security scheme with existing schemes based on the computation and communication costs.
In addition, we measure and analyze the performance of our proposed secure communication scheme over NFV-based virtualized networks with regard to several parameters like end-to-end delay and packet loss.
The results of our comparison with existing security schemes show that our proposed security scheme reduces the computation cost by 38.
87% and the communication cost by 26.
08%.
Related Results
Mengapa Ipv6 Gagal ?
Mengapa Ipv6 Gagal ?
ABSTRACTIPv6 was introduced to replace IPv4 as the main IP address. However, despite being more than 15 years since itsstandardization, IPv6 failed to achieve any meaningful diffus...
IPv6 implementation strategies: Insights from the telecommunication and finance sectors
IPv6 implementation strategies: Insights from the telecommunication and finance sectors
The transition from IPv4 to IPv6 is a critical evolution in network infrastructure, driven by the exhaustion of IPv4 addresses and the growing demand for enhanced connectivity. Thi...
Toward All-IP networks : IP and wireless networks convergence
Toward All-IP networks : IP and wireless networks convergence
In this thesis the state of the art for IP networks and the two most predominant wireless access networks, UMTS and Wireless LANs, has been reviewed with respect to the enhancement...
Implementasi Network Monitoring Dengan Ntop Pada Jaringan DualStack
Implementasi Network Monitoring Dengan Ntop Pada Jaringan DualStack
Untukbisa terhubung ke internet, maka dibutuhkan komponen penting dalam jaringan komputer yaitu Internet Protocol (IP). Seiring dengan perkembangan teknologi, IP terbagi menjadi 2 ...
Future-Proof Networks: NFV’S Role In 5g and Beyond
Future-Proof Networks: NFV’S Role In 5g and Beyond
Riding the wave of the multifaceted rapid change in communication technologies and universal deployment of 5G, Network Functions Virtualization, or NFV, has emerged as a disruptive...
Contribution to the system architecture design for electromagnetic nano-network communications
Contribution to the system architecture design for electromagnetic nano-network communications
(English) A nano-network is a communication network at the nano-scale between nano-devices. Nanodevices face certain challenges in functionalities, because of limitations in their ...
Introducción a IPv6
Introducción a IPv6
Introducción a IPv6
Introduction to IPv6
Edwin Salazar Vega
Universidad Nacional de Piura
DOI: https://doi.org/10.33017/RevECIPeru2011.0023/
RESUMEN
Como es de conocimiento p...
Securing Virtual Architecture of Smartphones based on Network Function Virtualization
Securing Virtual Architecture of Smartphones based on Network Function Virtualization
One of the most difficult parts of Network Function Virtualization (NFV) installations is security. The NFV environment is a large-scale, software-driven one with a variety of comp...

