Skip to main content

A Study on Firewall Services with Edge Computers of vEPC in 5G Networks

  • Conference paper
  • First Online:
  • 1333 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 773))

Abstract

Following the fast development of 5G networks and Internet of Things (IoT) techniques, in the future, billions of User Equipment (UE) and IoT devices will connect to networks and send data to backend servers for situation monitoring or required processes. Since mobile devices roam to everywhere in the world, firewalls which are designed to protect fixed-position devices cannot be used to secure mobile users. In this study, we would like to use firewall to protect mobile devices, even though they are roaming in the networks other than their home networks. UEs are secured in data layer with firewalls, distributed topology storage (DT storage) and SDN controller, in which firewalls are installed in the vEPC’s edge computers. We also develop the corresponding processing algorithms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. W.K., The 5G Core Network Revolution When SDN Meet NFV, March 2016 (in Chinese). http://www.2cm.com.tw/technologyshow_content.asp?sn=1603030019

  2. Nguyen, V.-G., Brunstrom, A., Grinnemo, K.-J.: SDN/NFV-based mobile packet core network architectures: a survey. IEEE Commun. Surv. Tutor. 19, 1567–1602 (2017)

    Article  Google Scholar 

  3. Arins, A.: Firewall as a service in SDN OpenFlow network. In: IEEE Workshop on Advances Information, Electronic and Electrical Engineering, Riga, Latvia, pp. 1–5 (2015)

    Google Scholar 

  4. Cliou, Y.C., Tsai, I.S., Yang, R.S.: Edge computing based on device relay communication, August 2015 (in Chinese). https://ictjournal.itri.org.tw/content/Messagess/contents.aspx?&MmmID=654304432061644411&CatID=654313611231473607&MSID=654526020703022212

  5. Zope, N., Pawar, S., Saquib, Z.: Firewall and load balancing as an application of SDN. In: Conference on Advances in Signal Processing, Pune, India, pp. 354–359, June 2016

    Google Scholar 

  6. Gray, N., Lorenz, C., Müssig, A.: A priori state synchronization for fast failover of stateful firewall VNFs. In: International Conference on Networked Systems, Gottingen, Germany, pp. 1–6 (2017)

    Google Scholar 

  7. Guoa, Z., Liub, R., Xuc, Y., Gushchind, A., Walide, A., Chaoc, H.J.: STAR: preventing flow-table overflow in software-Defined networks. Comput. Netw. 125, 15–25 (2017)

    Article  Google Scholar 

  8. Abdrabou, M.A., Eldien Elbayoumy, A.D., Abd El-Wanis, E.: LTE authentication protocol (EPS-AKA) weaknesses solution. In: IEEE Seventh International Conference on Intelligent Computing and Information Systems, Cairo, Egypt, pp. 434–441, December 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fang-Yie Leu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Leu, FY., Chou, PH. (2019). A Study on Firewall Services with Edge Computers of vEPC in 5G Networks. In: Barolli, L., Xhafa, F., Javaid, N., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2018. Advances in Intelligent Systems and Computing, vol 773. Springer, Cham. https://doi.org/10.1007/978-3-319-93554-6_56

Download citation

Publish with us

Policies and ethics