Study on authentication protocol of SDN trusted domain

被引:8
|
作者
Zhou, Ruikang [1 ]
Liu, Zenghui [2 ]
Lai, Yingxu [1 ]
Liu, Jing [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci, Beijing, Peoples R China
[2] Beijing Polytech, Automat Engn Inst, Beijing, Peoples R China
关键词
SDN; trusted technology; AVISPA security analysis system;
D O I
10.1109/ISADS.2015.29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently Software Define Network (SDN) architecture has become a hot topic. Aiming at the authentication security issues of SDN network architecture, we introduce an authentication protocol based on SDN network architecture without any trusted third party between trusted domains. By applying AVISPA security analysis system of network interaction protocol, we can guarantee protocol security and provide complete safety tests. Our work fill the gap of mutual trust between different trusted domains and provide security foundation for interaction between different trusted domains.
引用
收藏
页码:281 / 284
页数:4
相关论文
共 50 条
  • [41] Blockchain-based cross-domain authentication strategy for trusted access to mobile devices in the IoT
    Dong, Shuai
    Yang, Hui
    Yuan, Jiaqi
    Jiao, Libin
    Yu, Ao
    Zhang, Jie
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1610 - 1612
  • [42] Inter-domain Alliance Authentication Protocol Based on Blind Signature
    Zhang Jie
    Zhang Qi-kun
    Gan Yong
    Yin Yifeng
    Tan Yu-an
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 211 - 220
  • [43] Fast re-authentication protocol for inter-domain roaming
    Komarova, Maryna
    Riguidel, Michel
    Hecker, Artur
    [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 1960 - 1964
  • [44] Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups
    Zhang, Qikun
    Zheng, Jun
    YuanTan
    Wang, Ruifang
    Li, Yuanzhang
    [J]. JOURNAL OF COMPUTERS, 2011, 6 (04) : 650 - 656
  • [45] Signal Authentication in Trusted Satellite Navigation Receivers
    Kuhn, Markus G.
    [J]. TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 331 - 348
  • [46] Lightweight RFID authentication protocol: An experimental study
    Belcher, Brandon
    El-Said, Mostafa
    Nezlek, George
    [J]. PROCEEDINGS OF THE ITI 2008 30TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2008, : 583 - +
  • [47] A Study on Authentication Protocol for Secure RFID Tag
    Jung, Yong-hoon
    Kim, Jung-jae
    Jun, Moon-Seog
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 685 - 692
  • [48] A Novel Trusted Transmission Protocol
    Liu Minmin
    Sun Shixin
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL I, 2010, : 211 - 214
  • [49] FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers
    Sousa, Bruno
    Goncalves, Carolina
    [J]. COMPUTER NETWORKS, 2024, 239
  • [50] Research of Trusted Authentication in Wireless Mesh Networks
    Zhai Peng
    Cao Manman
    Zhang Liping
    Han Ke
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 277 - 280