Packet Forwarding Authentication Mechanism Based on Cipher Identification in Software-defined Network

被引:1
|
作者
Qin Xi [1 ]
Tang Guodong [1 ]
Chang Chaowen [1 ]
Wang Ruiyun [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450001, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Software-Defined Network (SDN); Cipher identification; Data source authentication; Conditional privacy;
D O I
10.11999/JEIT171226
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To deal with the lack of a secure and efficient data source authentication mechanism in Software-Defined Network (SDN), a packet forwarding authentication mechanism based on cipher identification is proposed. Firstly, a packet forwarding authentication model based on cipher identification is established, where the cipher identification is identified as a passport of IP packets entering and leaving the network. Secondly, the SDN batch anonymous authentication protocol is designed to decentralize the authentication function of the SDN controller to the SDN switch. The SDN switch performs user authentication and cipher identification verification, and quickly filters forgery, falsification, and other illegal packets to improve the unified authentication and management efficiency of the SDN controller, while providing users with the conditions of privacy protection. Thirdly, a scheme for sampling and verifying packets based on cipher identification in any node is proposed, where any attacker can not bypass the packet detection by inferring the sample, to ensure the authenticity of the packet while reducing its processing delay. Finally, safety analysis and performance evaluation are conducted. The results show that this mechanism can quickly detect packet falsification and tampering and resist ID analysis attacks, but at the same time it introduces about 9.6% forwarding delay and less than 10% communication overhead.
引用
收藏
页码:2042 / 2049
页数:8
相关论文
共 19 条
  • [1] Chen Yue, 2013, Journal on Communications, V34, P171, DOI 10.3969/j.issn.1000-436x.2013.01.019
  • [2] SPHINX: Detecting Security Attacks in Software-Defined Networks
    Dhawan, Mohan
    Poddar, Rishabh
    Mahajan, Kshiteej
    Mann, Vijay
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [3] Dong Ping, 2007, Acta Electronica Sinica, V35, P599
  • [4] FARINACCI D, 2011, LOCATOR ID SEPARATIO
  • [5] Guang Yao, 2011, 2011 19th IEEE International Conference on Network Protocols, P7, DOI 10.1109/ICNP.2011.6089085
  • [6] KIM H, 2014, ACM C SIGCOMM CHIC U, P271
  • [7] Li D, 2014, IEEE INFOCOM SER, P1743, DOI 10.1109/INFOCOM.2014.6848112
  • [8] [李杰 Li Jie], 2012, [计算机学报, Chinese Journal of Computers], V35, P85
  • [9] Source Address Validation in Software Defined Networks
    Liu, Bingyang
    Bi, Jun
    Zhou, Yu
    [J]. PROCEEDINGS OF THE 2016 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION (SIGCOMM '16), 2016, : 595 - 596
  • [10] zUpdate: Updating Data Center Networks with Zero Loss
    Liu, Hongqiang Harry
    Wu, Xin
    Zhang, Ming
    Yuan, Lihua
    Wattenhofer, Roger
    Maltz, David A.
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) : 411 - 422