Virtual Security as a Service for 5G Verticals

Yacine Khettab, Miloud Bagaa, Diego Cadette Dutra, Tarik Taleb, Nassima Toumi

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

24 Citations (Scopus)
370 Downloads (Pure)


The future 5G systems ought to meet diverse requirements of new industry verticals, such as Massive Internet of Things (IoT), broadband access in dense networks and ultra-reliable communications. Network slicing is an important concept that is expected to support these 5G verticals and cope with the conflicting requirements of their respective services. Network slicing allows the deployment of multiple virtual networks, or slices, over the same physical infrastructure as well as supporting on-demand resource allocation to those slices. In this paper, we propose an architecture that will explore how both Network Function Virtualization (NFV) and Software Defined Networking (SDN) may be leveraged to secure a network slice on-demand, addressing the new security concerns imposed to the network management by the flexibility and elasticity support. Our proposed framework aims to ensure an optimal resource allocation that manages the slice security strategy in an efficient way. Moreover, experimental performance evaluations are presented to evaluate the security overhead in virtualized environments.
Original languageEnglish
Title of host publicationIEEE Wireless Communications and Networking Conference, WCNC 2018
Number of pages6
ISBN (Print)978-1-5386-1734-2
Publication statusPublished - 2018
MoE publication typeA4 Article in a conference publication
EventIEEE Wireless Communications and Networking Conference - Barcelona, Spain
Duration: 15 Apr 201818 Apr 2018

Publication series

NameIEEE Wireless Communications and Networking Conference
ISSN (Print)1525-3511
ISSN (Electronic)1558-2612


ConferenceIEEE Wireless Communications and Networking Conference
Abbreviated titleWCNC


  • security
  • Computer architecture
  • Internet of Things
  • Cloud computing
  • 5G mobile communication
  • Monitoring
  • Network slicing
  • Resource management


Dive into the research topics of 'Virtual Security as a Service for 5G Verticals'. Together they form a unique fingerprint.

Cite this