Abstract
5G has become an important driving force for the digital transformation of the power industry. Especially today, with the increasing security risk of big data, the safe and available power 5G business plays an important role in improving power business innovation and user experience. This paper analyzes the demand level differences of different businesses for big data security in the application scenario of power 5G business, and establishes the SLA classification and classification model. On this basis, the power 5G business objective is divided into three processes: business perception, business execution and business SLA evaluation, which are assigned to the corresponding slices respectively. A power 5G slice perception collaborative optimization model is proposed and solved iteratively by multi-objective particle swarm optimization algorithm. Simulation experiments show that compared with the traditional 5G application mode, the proposed scheme can search and optimize the network resource allocation through the cooperation between slices, effectively schedule the slice resources and improve the operation efficiency and performance of power 5G service.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jain, S., Gupta, S., Sreelakshmi, K.K., et al.: Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures. Clust. Comput. 25(2), 1111–1154 (2022)
Soleymani, S.A., Anisi, M.H., Abdullah, A.H., et al.: An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Science China Inf. Sci. 63(12), 220305 (2020)
Behrad, S., Bertin, E., Crespi, N.: A survey on authentication and access control for mobile networks: from 4G to 5G. Ann. Telecommun. 74(9), 593–603 (2019)
Aggarwal, S., Kumar, N.: Fog computing for 5G-enabled tactile Internet: research issues, challenges, and future research directions. Mob. Netw. Appl. (2019)
Sankar, S.P., Subash, T.D., Vishwanath, N., et al.: Security improvement in block chain technique enabled peer to peer network for beyond 5G and Internet of Things. Peer-to-Peer Network. Appl. 14(1), 392–402 (2021)
Chu, Y., Pan, L., Leng, K., et al.: Research on key technologies of service quality optimizationfor industrial IoT 5G network for intelligent manufacturing. Int. J. Adv. Manuf. Technol. 107(3), 1071–1080 (2020)
Benslimen, Y., Sedjelmaci, H., Manenti, A.-C.: Attacks and failures prediction framework for a collaborative 5G mobile network. Computing 103(6), 1165–1181 (2021). https://doi.org/10.1007/s00607-020-00893-8
Lindgren, P., Wuropulos, K.: Secure persuasive business models and business model innovation in a world of 5G. Wirel. Pers. Commun. 96(3), 3569–3583 (2017)
Ji, X., Huang, K., Jin, L., et al.: Overview of 5G security technology. Science China Inf. Sci. 61(8), 081301 (2018)
Sharma, A., Jha, R.K.: A comprehensive survey on security issues in 5G wireless communication network using beamforming approach. Wirel. Pers. Commun. 119(4), 3447–3501 (2021)
Fourati, H., Maaloul, R., Chaari, L.: A survey of 5G network systems: challenges and machine learning approaches. Int. J. Mach. Learn. Cybern. 12(2), 385–431 (2021)
Chochliouros, I.P., Spiliopoulou, A.S., Kostopoulos, A., et al.: Security threat analysis of the 5G ESSENCE platform. Wirel. Pers. Commun. 120(3), 2409–2426 (2021)
Jorquera Valero, J.M., Sánchez Sánchez, P.M., Lekidis, A., et al.: Design of a security and trust framework for 5G multi-domain scenarios. J. Netw. Syst. Manag. 30(1), 7 (2021)
AlQahtani, S.A., Alhomiqani, W.A.: A multi-stage analysis of network slicing architecture for 5G mobile networks. Telecommun. Syst. 73(2), 205–221 (2020)
Luo, M., Wu, J., Li, X.: Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings. Telecommun. Syst. 74(4), 437–449 (2020)
Liu, T., Wu, F., Li, X., et al.: A new authentication and key agreement protocol for 5G wireless networks. Telecommun. Syst. 78(3), 317–329 (2021)
De Dutta, S., Prasad, R.: Security for smart grid in 5G and beyond networks. Wirel. Pers. Commun. 106(1), 261–273 (2019)
Nayak Manjeshwar, A., Jha, P., Karandikar, A., et al.: VirtRAN: an SDN/NFV-based framework for 5G RAN slicing. J. Indian Inst. Sci. 100(2), 409–434 (2020)
Mumtaz, T., Muhammad, S., Aslam, M.I., et al.: Inter-slice resource management for 5G radio access network using markov decision process. Telecommun. Syst. 79(4), 541–557 (2022)
Kotulski, Z., Nowak, T.W., Sepczuk, M., et al.: Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018(1), 2 (2018)
AlQahtani, S.A., Altamrah, A.S.: Supporting QoS requirements provisions on 5G network slices using an efficient priority-based polling technique. Wireless Netw. 25(7), 3825–3838 (2019)
Maman, M., Calvanese-Strinati, E., Dinh, L.N., et al.: Beyond private 5G networks: applications, architectures, operator models and technological enablers. EURASIP J. Wirel. Commun. Netw. 2021(1), 195 (2021)
Mathew, A.: Network slicing in 5G and the security concerns. In: Proceedings of the 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), F 11–13 March 2020 (2020)
Sattar, D., Matrawy, A.: Towards secure slicing: using slice isolation to mitigate DDoS attacks on 5G core network slices. In: Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), F 10–12 June 2019 (2019)
Kapassa, E., Touloupou, M., Stavrianos, P., et al.: Dynamic 5G slices for IoT applications with diverse requirements. In: Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, F 15–18 October 2018 (2018)
Grønsund, P., Gonzalez, A., Mahmood, K., et al.: 5G service and slice implementation for a military use case. In: Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), F 7–11 June 2020 (2020)
Mahmood, K., Mahmoodi, T., Trivisonno, R., et al.: On the integration of verticals through 5G control plane. In: Proceedings of the 2017 European Conference on Networks and Communications (EuCNC), F 12–15 June 2017 (2017)
Bega, D., Gramaglia, M., Banchs, A., et al.: Optimising 5G infrastructure markets: the business of network slicing. In: Proceedings of the IEEE Infocom-IEEE Conference on Computer Communications, F (2017)
Caballero, P., Banchs, A., Veciana, G.D., et al.: Network slicing games: enabling customization in multi-tenant mobile networks. IEEE/ACM Trans. Network. 27(2), 662–675 (2019)
Zhang, N., Liu, Y.F., Farmanbar, H., et al.: Network slicing for service-oriented networks under resource constraints. IEEE J. Sel. Areas Commun. 35(11), 2512–2521 (2017)
Guan, W., Wen, X., Wang, L., et al.: A service-oriented deployment policy of end-to-end network slicing based on complex network theory. IEEE Access 6(19), 691–701 (2018)
Kotulski Z, Nowak T, Sepczuk M, et al.: On end-to-end approach for slice isolation in 5G networks. Fundamental challenges. In: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), F 3–6 September 2017 (2017)
Acknowledgement
This publication is supported by the science and technology project of State Grid Jiangsu Electric Power Co., Ltd. (Project No.: J2021125).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhu, D., Guo, Y., Wei, L., Sun, Y., Liu, W. (2023). Multi Slice SLA Collaboration and Optimization of Power 5G Big Data Security Business. In: Tian, Y., Ma, T., Jiang, Q., Liu, Q., Khan, M.K. (eds) Big Data and Security. ICBDS 2022. Communications in Computer and Information Science, vol 1796. Springer, Singapore. https://doi.org/10.1007/978-981-99-3300-6_33
Download citation
DOI: https://doi.org/10.1007/978-981-99-3300-6_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3299-3
Online ISBN: 978-981-99-3300-6
eBook Packages: Computer ScienceComputer Science (R0)