Study on authentication protocol of SDN trusted domain

被引:8
|
作者
Zhou, Ruikang [1 ]
Liu, Zenghui [2 ]
Lai, Yingxu [1 ]
Liu, Jing [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci, Beijing, Peoples R China
[2] Beijing Polytech, Automat Engn Inst, Beijing, Peoples R China
关键词
SDN; trusted technology; AVISPA security analysis system;
D O I
10.1109/ISADS.2015.29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently Software Define Network (SDN) architecture has become a hot topic. Aiming at the authentication security issues of SDN network architecture, we introduce an authentication protocol based on SDN network architecture without any trusted third party between trusted domains. By applying AVISPA security analysis system of network interaction protocol, we can guarantee protocol security and provide complete safety tests. Our work fill the gap of mutual trust between different trusted domains and provide security foundation for interaction between different trusted domains.
引用
收藏
页码:281 / 284
页数:4
相关论文
共 50 条
  • [21] Study on the model and algorithm of Internet trusted identity authentication system
    Liu, Yao
    Chai, Yueting
    Liu, Yi
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2015, : 417 - 419
  • [22] Cross-domain authentication and the key agreement protocol in VANETs
    Li, Xiaowei
    Yang, Dengqi
    Zheng, Xin
    Zhu, Xingwen
    Chen, Benhui
    Zhang, Yuqing
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 141 - 148
  • [23] Trusted Computing Strengthens Cloud Authentication
    Ghazizadeh, Eghbal
    Zamani, Mazdak
    Ab Manan, Jamalul-Lail
    Alizadeh, Mojtaba
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [24] Study on RFID Authentication Protocol Theory
    Qi Yong
    Yao Qingsong
    Chen Ying
    Zhong Xiao
    [J]. CHINA COMMUNICATIONS, 2011, 8 (01) : 65 - 71
  • [25] Multi-domain Security Authentication Protocol for Hybrid Cloud
    Zhang Qikun
    Zhang Lei
    Gan Yong
    Duan Zhaolei
    Zheng Jun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 323 - 336
  • [26] Master-slave chain based trusted cross-domain authentication mechanism in IoT
    Guo, Shaoyong
    Wang, Fengning
    Zhang, Neng
    Qi, Feng
    Qiu, Xuesong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 172
  • [27] Authentication, Identification and Trusted Third Parties
    Arnaud, Michel
    [J]. HERMES, 2009, (53): : 129 - +
  • [28] TATA: Towards anonymous trusted authentication
    Quercia, Daniele
    Hailes, Stephen
    Capra, Licia
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 313 - 323
  • [29] Information Hiding for Pervasive Trusted Authentication
    Liu, Wenjuan
    Fu, Xiufen
    Ouyang, Shaocong
    Lin, Jinchuan
    Teng, Shaohua
    [J]. JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 653 - 656
  • [30] An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6
    Lu, Yiqin
    Wang, Meng
    Huang, Pengsen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,