SDN-based automated rekey of IPsec security associations: Design and practical validations

被引:3
|
作者
Parra-Espin, Jose Antonio [1 ]
Marin-Lopez, Rafael [1 ]
Lopez-Millan, Gabriel [1 ]
Pereniguez-Garcia, Fernando [2 ]
Canovas, Oscar [3 ]
机构
[1] Univ Murcia, Dept Informat & Commun Engn, Murcia 30100, Spain
[2] Univ Def Ctr, Spanish Air Force Acad, Dept Engn & Appl Technol, Murcia 30720, Spain
[3] Univ Murcia, Dept Comp Engn, Murcia 30100, Spain
关键词
IPsec; Key management; SDN; Rekey; NETCONF; YANG;
D O I
10.1016/j.comnet.2023.109905
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The standard Request for Comments (RFC) 9061 defines a framework to autonomously manage IPsec security associations (SAs) in SDN environments. The standard describes two cases: the IKE case, in which the nodes use the Internet Key Exchange (IKEv2) protocol to negotiate IPsec SAs, and the IKE-less case, in which IKEv2 is not shipped in the network devices, and the SDN controller is in charge of distributing the IPsec SAs with all the information needed to secure the communications (cryptographic material, traffic selectors, algorithms, etc.). In both cases, for security reasons, the IPsec protocol requires the periodic renovation of the keys used by the IPsec SAs in a process named rekey. The IKE case already has an automatic rekey mechanism, the IKEv2 protocol, however the IKE-less case requires the definition of a rekey method, which is implemented by the controller. The use of the IKE-less case has been recognized useful in scenarios such as datacenters, with thousands of nodes requiring the management of SAs, or Internet of Things, with constrained devices that may not have enough resources to use IKEv2. Therefore, the definition of a suitable rekey process is a keystone for the IKE-less case. This work presents the design, implementation and validation of four different algorithms to perform a rekey process in the IKE-less case from the IPsec standard, taking to account performance, security and packet loss. We have also analyzed each algorithm's behavior in representative network scenarios based on mesh or star topologies.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Establishment of IPsec Security Associations with Diffie-Hellman following a SDN-based framework: Analysis and practical validation
    Parra-Espin, Jose Antonio
    Marin-Lopez, Rafael
    Lopez-Millan, Gabriel
    [J]. COMPUTER NETWORKS, 2024, 253
  • [2] Analysis and practical validation of a standard SDN-based framework for IPsec management
    Lopez-Millan, Gabriel
    Marin-Lopez, Rafael
    Pereniguez-Garcia, Fernando
    Canovas, Oscar
    Espin, Jose Antonio Parra
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 83
  • [3] SDN-based Security Mechanism
    Aneci, Mihai-Nicolae
    Gheorghe, Laura
    Carabas, Mihai
    Soriga, Stefan
    Somcsan, Raluca-Andrcca
    [J]. 2015 14TH ROEDUNET INTERNATIONAL CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET NER), 2015, : 12 - 17
  • [4] Towards a standard SDN-based IPsec management framework
    Lopez-Millan, Gabriel
    Marin-Lopez, Rafael
    Pereniguez-Garcia, Fernando
    [J]. COMPUTER STANDARDS & INTERFACES, 2019, 66
  • [5] SDN-based Access Authentication and Automatic Configuration for IPSec
    Li, Yunchun
    Mao, Jutao
    [J]. PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 996 - 999
  • [6] Design of the Security Audit Function for SDN-Based Home Router
    Wang, Yu
    Li, Wei
    Li, Zhou-Jun
    [J]. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (07): : 743 - 749
  • [7] Explainable Security in SDN-Based IoT Networks
    Sarica, Alper Kaan
    Angin, Pelin
    [J]. SENSORS, 2020, 20 (24) : 1 - 30
  • [8] A Framework for Security Enhancement in SDN-based Datacenters
    Ammar, Moustafa
    Rizk, Mohamed
    Abdel-Hamid, Ayman
    Aboul-Seoud, Ahmed K.
    [J]. 2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [9] A Practical SDN-Based Data Offloading Framework
    Lee, Hyukjoon
    Kim, Hwasung
    Kim, Younghan
    [J]. 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 604 - 607
  • [10] Synaptic: a Formal Checker for SDN-based Security Policies
    Schnepf, Nicolas
    Badonnel, Remi
    Lahmadi, Abdelkader
    Merz, Stephan
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,