We use cookies to ensure that we give you the best experience on our website. By continuing to browse this repository, you give consent for essential cookies to be used. You can read more about our Privacy and Cookie Policy.

Durham Research Online
You are in:

Embedding Security Awareness for Virtual Resource Allocation in 5G Hetnets Using Reinforcement Learning

Cao, Haotong and Aujla, Gagangeet Singh and Garg, Sahil and Kaddoum, Georges and Yang, Longxiang (2021) 'Embedding Security Awareness for Virtual Resource Allocation in 5G Hetnets Using Reinforcement Learning.', IEEE Communications Standards Magazine, 5 (2). pp. 20-27.


n the 5G era, heterogeneous networks (Het-Nets) are designed for achieving data rates and customized service demands. To realize this, virtualization technologies are widely accepted as enablers for implementing 5G HetNets, aimed at managing and scheduling virtualized physical resources in a flexible manner. However, the major focus of the existing research lies in the effective allocation of virtual resources and maximizing the number of implemented network services, ignoring the virtual resource security issues. However, the security threats and vulnerabilities due to the complexity of virtualization can lead to major performance outbreaks and information leakage. Therefore, this article attempts to tackle the security issues in 5G HetNets virtual resource allocation. The article starts from modeling the major security attacks for virtual resource allocation through comprehensive discussion on the typical types of security attacks. Following the attack model, a novel secure framework (VRA-RL-SecAwa) based on the emerging reinforcement learning approach, is presented. The proposed VRA-RL-SecAwa framework works in different phases, 1. Reinforcement-learning-based preliminary security preparation 2. Greedy-approach-based secure virtual node resource allocation embedding 3. Secure and shortest path virtual link resource allocation scheme 4. Network reconfiguration and update The proposed VRA-RL-SecAwa framework is evaluated through extensive simulations in order to demonstrate its efficiency and effectiveness. The results obtained validate the superiority of the proposed framework in contrast to existing variants of its category.

Item Type:Article
Full text:(AM) Accepted Manuscript
Download PDF
Publisher Web site:
Publisher statement:© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Date accepted:No date available
Date deposited:20 September 2021
Date of first online publication:25 June 2021
Date first made open access:20 September 2021

Save or Share this output

Look up in GoogleScholar