Study on authentication protocol of SDN trusted domain

被引:8
|
作者
Zhou, Ruikang [1 ]
Liu, Zenghui [2 ]
Lai, Yingxu [1 ]
Liu, Jing [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci, Beijing, Peoples R China
[2] Beijing Polytech, Automat Engn Inst, Beijing, Peoples R China
关键词
SDN; trusted technology; AVISPA security analysis system;
D O I
10.1109/ISADS.2015.29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently Software Define Network (SDN) architecture has become a hot topic. Aiming at the authentication security issues of SDN network architecture, we introduce an authentication protocol based on SDN network architecture without any trusted third party between trusted domains. By applying AVISPA security analysis system of network interaction protocol, we can guarantee protocol security and provide complete safety tests. Our work fill the gap of mutual trust between different trusted domains and provide security foundation for interaction between different trusted domains.
引用
收藏
页码:281 / 284
页数:4
相关论文
共 50 条
  • [1] A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet
    Zhang, Tiantian
    Zhang, Zhiyong
    Zhao, Kejing
    Gupta, Brij B.
    Arya, Varsha
    [J]. INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2023, 19 (01)
  • [2] Trusted Inter-Domain Fast Authentication Protocol in Split Mechanism Network
    Zheng, Lijuan
    Hu, Yingxin
    Han, Zhen
    Ma, Fei
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (11) : 2728 - 2731
  • [3] An Authentication Protocol Without Trusted Third Party
    Shieh, Shiuh-Pyng
    Yang, Wen-Her
    Sun, Hun-Min
    [J]. IEEE COMMUNICATIONS LETTERS, 1997, 1 (03) : 87 - 89
  • [4] An access authentication protocol for trusted handoff in wireless mesh networks
    Xiao, Peng
    He, Jingsha
    Fu, Yingfang
    [J]. COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) : 480 - 488
  • [5] An efficient quantum deniable authentication protocol without a trusted center
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    Zhang, Xin-Lan
    Zhang, Jan-Biao
    [J]. OPTIK, 2016, 127 (16): : 6484 - 6489
  • [6] Design and analysis on trusted network equipment access authentication protocol
    Lai, Yingxu
    Chen, Yinong
    Zou, Qichen
    Liu, Zenghui
    Yang, Zhen
    [J]. SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 : 157 - 169
  • [7] An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment
    Ma, Zhuo
    Ma, Jianfeng
    Moon, SangJae
    Li, Xinghua
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 430 - 437
  • [8] A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
    Zhou, Ruikang
    Lai, Yingxu
    Liu, Zenghui
    Chen, Yinong
    Yao, Xiangzhen
    Gong, Jiezhong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [9] An authentication protocol to address the problem of the trusted 3rd party authentication Protocols
    Kirsal, Y.
    Gemikonakli, O.
    [J]. INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 523 - 526
  • [10] WSN node access authentication protocol based on trusted computing
    Liu, Jing
    Liu, Lihui
    Liu, Zenghui
    Lai, Yingxu
    Qin, Hua
    Luo, Shiyao
    [J]. SIMULATION MODELLING PRACTICE AND THEORY, 2022, 117