信息网络安全 ›› 2020, Vol. 20 ›› Issue (5): 21-28.doi: 10.3969/j.issn.1671-1122.2020.05.003

• 技术研究 • 上一篇    下一篇

基于熵权VIKOR的安全虚拟网络映射算法

孟相如, 徐江*(), 康巧燕, 韩晓阳   

  1. 空军工程大学信息与导航学院,西安 710077
  • 收稿日期:2020-03-02 出版日期:2020-05-10 发布日期:2020-06-05
  • 通讯作者: 徐江 E-mail:carlxj@yeah.net
  • 作者简介:孟相如(1963—),男,陕西,教授,博士,主要研究方向为下一代网络、网络安全|徐江(1990—),男,陕西,硕士研究生,主要研究方向为虚拟网路、网络安全;|康巧燕(1980—),女,福建,副教授,博士,主要研究方向为可生存性通信技术|韩晓阳(1986—),男,河南,博士研究生,主要研究方向为下一代网路、网络安全
  • 基金资助:
    国家自然科学基金(61873077)

Secure Virtual Network Embedding Algorithm Based on Entropy Weight VIKOR

MENG Xiangru, XU Jiang*(), KANG Qiaoyan, HAN Xiaoyang   

  1. Information and Navigation College, Air Force Engineering University, Xi’an 710077, China
  • Received:2020-03-02 Online:2020-05-10 Published:2020-06-05
  • Contact: Jiang XU E-mail:carlxj@yeah.net

摘要:

近年来,虚拟网络映射技术作为网络虚拟化的关键技术,成为学术界与工业界研究的重点之一。针对安全虚拟网络映射中因节点安全感知不全面、匹配不合理导致的映射性能较低问题,文章提出了一种基于熵权折衷排序法(VIKOR)的安全虚拟网络映射算法。该算法首先将安全虚拟网络映射问题构建为混合整数线性规划模型,设计了节点安全优先度指标,实现了虚拟网络节点与底层网络节点安全联合感知;其次在映射过程中综合考虑节点资源属性、拓扑属性和安全属性,采用熵权VIKOR进行节点排序;最后按照节点排序结果依次进行映射,其中链路映射采用k最短路径算法。仿真结果表明,在满足节点各项约束的前提下,文章算法提高了虚拟网络映射成功率和收益开销比。

关键词: 虚拟网络, 网络安全, 折衷排序法, 映射算法

Abstract:

In recent years, as the key technology of network virtualization, virtual network embedding technology has become one of the focuses of academic and industrial research. In order to solve the problem of low embedding performance caused by incomplete security awareness and unreasonable matching of nodes, this paper proposes a secure virtual network embedding algorithm based on entropy weight VIKOR. Firstly, a mixed integer linear programming model for secure virtual network embedding problems is designed, and the node security priority indicators are designed to realize the joint security awareness of virtual nodes and physical nodes. Secondly, the node resource attributes, topological attributes and security attributes are considered in the embedding process, and the entropy weight VIKIOR method is used to rank the nodes. Finally, the nodes are sequentially embedded according to the results of node ranking, and the k-shortest path algorithm is used for link embedding. The simulation results show that the algorithm can improve the acceptance ratio of virtual network embedding and the revenue to cost ratio while satisfying the node security constraints.

Key words: virtual network, network security, VIKOR, embedding algorithm

中图分类号: