Abstract
VNE algorithm is always the key problem in NV technology. At present, the research in this field still has the following problems. The traditional way to solve VNE problem is to use heuristic algorithm. However, this method relies on manual embedding rules, which does not accord with the actual situation of VNE. In addition, as the use of intelligent learning algorithm to solve the problem of VNE has become a trend, this method is gradually outdated. At the same time, there are some security problems in VNE. However, there is no intelligent algorithm to solve the security problem of VNE. For this reason, this chapter proposes a security aware VNE algorithm based on RL. In the training phase, we use a policy network as a learning agent and take the extracted attributes of the substrate nodes to form a feature matrix as input. The learning agent is trained in this environment to get the mapping probability of each substrate node. In the test phase, we map nodes according to the mapping probability and use the breadth-first strategy (BFS) to map links. For the security problem, we add security requirements level constraint for each virtual node and security level constraint for each substrate node. Virtual nodes can only be embedded on substrate nodes that are not lower than the level of security requirements. Experimental results show that the proposed algorithm is superior to other typical algorithms in terms of long-term average return, long-term revenue consumption ratio, and VNR acceptance rate.
â’¸ [2020] IEEE. Reprinted, with permission, from ref. [4].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
X. Fu, F.R. Yu, J. Wang, Q. Qi, J. Liao, Service function chain embedding for NFV-enabled IoT based on deep reinforcement learning. IEEE Commun. Mag. 57(1), 102–108 (2019)
J. Du, C. Jiang, Z. Han, H. Zhang, S. Mumtaz, Y. Ren, Contract mechanism and performance analysis for data transaction in mobile social networks. IEEE Trans. Netw. Sci. Eng. 6(2), 103–115 (2019)
P. Zhang, H. Yao, M. Li, Y. Liu, Virtual network embedding based on modified genetic algorithm. Peer-to-Peer Netw. Appl. 2, 1–12 (2017)
P. Zhang, C. Wang, C. Jiang, A. Benslimane, Security-aware virtual network embedding algorithm based on reinforcement learning. IEEE Trans. Netw. Sci. Eng. 1–1 (2020)
P. Zhang, H. Yao, Y. Liu, Virtual network embedding based on computing, network, and storage resource constraints. IEEE Int. Things J. 5(5), 3298–3304 (2018)
H. Cao, S. Wu, Y. Hu, Y. Liu, L. Yang, A survey of embedding algorithm for virtual network embedding. China Commun. 16(12), 1–33 (2019)
C. Jiang, X. Ma, C. Chen, J. Ma, Y. Ren, On searching available channels with asynchronous MAC-layer spectrum sensing. IEICE Trans. Commun. E93-B(8), 2113–2125 (2010)
B. Deng, C. Jiang, H. Yao, S. Guo, S. Zhao, The next generation heterogeneous satellite communication networks: integration of resource management and deep reinforcement learning. IEEE Wirel. Commun. 27(2), 105–111 (2020)
Y. Liu, B. Zhao, P. Zhao, P. Fan, H. Liu, A survey: typical security issues of software-defined networking. China Commun. 16(7), 13–31 (2019)
P. Zhang, C. Wang, Z. Qin, H. Cao, A multidomain virtual network embedding algorithm based on multiobjective optimization for Internet of Drones architecture in Industry 4.0. Softw. Pract. Expert. 1–19 (2020). https://doi.org/10.1002/spe.2815
X. Zhu, C. Jiang, L. Kuang, Z. Zhao, S. Guo, Two-layer game based resource allocation in cloud based integrated terrestrial-satellite networks. IEEE Trans. Cogn. Commun. Netw. 6(2), 509–522 (2020)
P. Zhang, Incorporating energy and load balance into virtual network embedding process. Comput. Commun. 129, 80–88 (2018)
J. Wang, C. Jiang, H. Zhang, Y. Ren, K-C. Chen, L. Hanzo, Thirty years of machine learning: the road to Pareto-Optimal Wireless Networks. IEEE Commun. Surv. Tutorials 22(3), 1472–1514 (2020)
C. Jiang, H. Zhang, Y. Ren, Z. Han, K. Chen, L. Hanzo, Machine learning paradigms for next-generation wireless networks. IEEE Wirel. Commun. 24(2), 98–105 (2017)
S. Xu, Overview of deep reinforcement learning. Comput. Knowl. Technol. 15(3), 193–194 (2019)
K.T.D. Nguyen, C. Huang, An intelligent parallel algorithm for online virtual network embedding, in 2019 International Conference on Computer, Information and Telecommunication Systems (CITS) (2019), pp. 1–5
P. Zhang, H. Li, Y. Ni, F. Gong, M. Wang, F. Wang, Security aware virtual network embedding algorithm using information entropy TOPSIS. J. Netw. Syst. Manag. 28(1), 35–57 (2020)
N.M.M.K. Chowdhury, M.R. Rahman, R. Boutaba, Virtual network embedding with coordinated node and link mapping, in Proceedings of the IEEE INFOCOM[C], Rio de Janeiro (2009), pp. 783–791
S. Shanbhag, A.R. Kandoor, C. Wang, et al., VHub: single-stage virtual network mapping through hub location. Comput. Netw. 77, 169–180 (2015)
M. Yu, Y. Yi, J. Rexford, M. Chiang, Rethinking virtual network embedding: substrate support for path splitting and migration. ACM Sigcomm. Comput. Commun. 38(2), 17–29 (2008)
X. Liu, B. Wang, S. Liu, Z. Yang, Z. Zhao, Heuristic algorithm for secure virtual network embedding. Syst. Eng. Elect. 40(3), 676–681 (2018)
P. Zhang, C. Jiang, X. Pang, Y. Qian, STEC-IoT: a security tactic by virtualizing edge computing on IoT. IEEE Internet Things J. 8(4), 2459–2467 (2021)
S. Gong, J. Chen, C. Huang, Q. Zhu, Trust-aware secure virtual network embedding algorithm. J. Commun. 36(11), 1–10 (2015)
S. Haeri, L. Trajkovic, Virtual network embedding via Monte Carlo tree search. IEEE Trans. Cybern. 48(2), 510–521 (2018)
R. Mijumbi, J.L. Gorricho, J. Serrat, Neural network-based autonomous allocation of resources in virtual networks, in Networks and Communications (EuCNC), 2014 European Conference (2014), pp. 1–6
Y. Kawamoto, H. Takagi, H. Nishiyama, Efficient resource allocation utilizing Q-learning in multiple UA communications. IEEE Trans. Netw. Sci. Eng. (2018) Y. Kawamoto, H. Takagi, H. Nishiyama, N. Kato, Efficient Resource Allocation Utilizing Q-Learning in Multiple UA Communications, IEEE Trans. Netw. Sci. Eng. 6(3), 293–302 (2019). https://doi.org/10.1109/TNSE.2018.2842246
H. Yao, X. Chen, M. Li, P. Zhang, L. Wang, A novel reinforcement learning algorithm for virtual network embedding. Neurocomputing 284, 1–9 (2018)
Q. Li, C. Li, J. Zhang, H. Chen, S. Wang, A review of deep neural network compression. Comput. Sci. 46(9), 1–14 (2019)
J. Du, E. Gelenbe, C. Jiang, H. Zhang, Y. Ren, Contract design for traffic offloading and resource allocation in software defined ultra-dense networks. IEEE J. Select. Areas Commun. 35(11), 2457–2467 (2017)
S. Messaoud, A. Bradai, E. Moulay, Online GMM clustering and mini-batch gradient descent based optimization for industrial IoT 4.0. IEEE Trans. Indust. Inform. 16(2), 1427–1435 (2020)
M. Thomas, E.W. Zegura, Generation and analysis of random graphs to model internetworks. Coll. Comput 63(4), 413–442 (1994)
P. Zhang, S. Wu, M. Wang, H. Yao, Y. Liu, Topology based reliable virtual network embedding from a QoE perspective. China Commun. 15(10), 38–50 (2018)
Q. Yang, T. Jiang, N.C. Beaulieu, J. Wang, C. Jiang, S. Mumtaz, Z. Zhou, Heterogeneous semi-blind interference alignment in finite-snr networks with fairness consideration. IEEE Trans. Wirel. Commun. 19(4), 2472–2488 (2020)
H. Yao, H. Liu, P. Zhang, S. Wu, C. Jiang, S. Guo, A learning-based approach to intra-domain QoS routing. IEEE Trans. Veh. Technol. 69(6), 6718–6730 (2020)
M. Abadi, P. Barham, J. Chen, et al., Tensorflow: a system for large-scale machine learning. OSDI 16, 265–283 (2016)
X. Cheng, S. Su, Z. Zhang, H. Wang, F. Yang, Y. Luo, J. Wang, Virtual network embedding through topology-aware node ranking. ACM SIGCOMM Comput. Commun. 41(2), 38–47 (2011)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Jiang, C., Zhang, P. (2021). Security Aware Virtual Network Embedding Algorithm Based on Reinforcement Learning. In: QoS-Aware Virtual Network Embedding. Springer, Singapore. https://doi.org/10.1007/978-981-16-5221-9_4
Download citation
DOI: https://doi.org/10.1007/978-981-16-5221-9_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5220-2
Online ISBN: 978-981-16-5221-9
eBook Packages: Computer ScienceComputer Science (R0)