On Achieving Trustworthy Service Function Chaining

被引:4
|
作者
Pattaranantakul, Montida [1 ]
Song, Qipeng [2 ]
Tian, Yanmei [3 ]
Wang, Licheng [3 ]
Zhang, Zonghua [4 ,5 ,6 ]
Meddahi, Ahmed [4 ]
Vorakulpipat, Chalee [1 ]
机构
[1] Natl Elect & Comp Technol Ctr, Commun & Network Res Grp, Informat Secur Res Team, Pathum Thani 12120, Thailand
[2] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[4] Inst Mines Telecom, IMT Lille Douai, F-59650 Villeneuve Dascq, France
[5] SAMOVAR Lab, CNRS, UMR 5157, F-91000 Evry, France
[6] Huawei France Res Ctr, F-92100 Paris, France
关键词
Security; Control systems; Tools; Service function chaining; Proposals; Probes; Optimized production technology; Network functions virtualization (NFV); software-defined networking (SDN); service function chaining (SFC); aggregate signatures; identity-based signatures; pairings;
D O I
10.1109/TNSM.2021.3081014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service Function Chaining (SFC) has recently received considerable attentions from both industry and academia, due to its potential for improving the flexibility of provisioning and composition of Virtualized Network Functions (VNFs) to suit application-specific needs. From a security perspective, there is a gap between high-level SFC policy specification and its enforcement in the data plane. It cannot guarantee that the deployed VNFs are always chained in an expected manner, or the packet flows of a particular service chain are sequentially forwarded to the intended and legitimate VNFs strictly compliant with the specified SFC policy. This lack of assurance leaves the door open for attackers to maliciously manipulate the service chain by evading from security functions such as firewall, Deep Packet Inspection (DPI), etc., or deviating the packet flows from their original service function path, ultimately leading to the violation of SFC policy. It is therefore important to have an efficient self-checking mechanism in place, ensuring the SFC to be implemented in a secure and dependable way. This paper presents a new security primitive - Lite Identity-based Ordered Multisignature scheme (ChainSign in short), which enforces all intended VNFs in a particular service chain to sequentially sign the packet received. Then the last hop of the chain will verify the signature, so as to validate whether all of them work as expected and have not been compromised, while satisfying the security properties of concern (i.e., the consistency in VNF chaining, their authenticities and sequences in a service chain). In addition to the implementation, we leverage the IETF Network Service Header (NSH) to carry the signature generated from our proposed scheme. The experiments show that ChainSign can preserve all identified security properties with minimal overhead.
引用
收藏
页码:3140 / 3153
页数:14
相关论文
共 50 条
  • [1] Optimal Placement of Service Function in Service Function Chaining
    Ko, Haneul
    Suh, Dongeun
    Baek, Hosung
    Pack, Sangheon
    Kwak, Jiyoung
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 102 - 105
  • [2] Distributed Service Function Chaining
    Ghaznavi, Milad
    Shahriar, Nashid
    Kamali, Shahin
    Ahmed, Reaz
    Boutaba, Raouf
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (11) : 2479 - 2489
  • [3] A survey on service function chaining
    Bhamare, Deval
    Jain, Raj
    Samaka, Mohammed
    Erbad, Aiman
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 138 - 155
  • [4] Distributed Service Function Failover Mechanism in Service Function Chaining
    Suh, Dongeun
    Baek, Hosung
    Jang, Seokwon
    Han, Sol
    Pack, Sangheon
    [J]. 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 148 - 150
  • [5] Service Function Chaining in Wildfire Scenarios
    Sousa, Bruno Miguel
    Silva, Henrique M. Simoes
    Godinho, Noe
    Curado, Marilia
    [J]. PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 388 - 394
  • [6] Fault Tolerant Service Function Chaining
    Ghaznavi, Milad
    Jalalpour, Elaheh
    Wong, Bernard
    Boutaba, Raouf
    Mashtizadeh, Ali Jose
    [J]. SIGCOMM '20: PROCEEDINGS OF THE 2020 ANNUAL CONFERENCE OF THE ACM SPECIAL INTEREST GROUP ON DATA COMMUNICATION ON THE APPLICATIONS, TECHNOLOGIES, ARCHITECTURES, AND PROTOCOLS FOR COMPUTER COMMUNICATION, 2020, : 198 - 210
  • [7] Bounding Reliability in Service Function Chaining
    Engelmann, Anna
    Bziuk, Wolfgang
    Jukan, Admela
    [J]. 2020 43RD INTERNATIONAL CONVENTION ON INFORMATION, COMMUNICATION AND ELECTRONIC TECHNOLOGY (MIPRO 2020), 2020, : 413 - 418
  • [8] Service Chaining for Hybrid Network Function
    Huang, Huawei
    Guo, Song
    Wu, Jinsong
    Li, Jie
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (04) : 1082 - 1094
  • [9] Live Migration for Service Function Chaining
    Zhao, Dongcheng
    Sun, Gang
    Liao, Dan
    Iqbal, Rahat
    Chang, Victor
    [J]. IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, : 149 - 156
  • [10] Traffic Steering for Service Function Chaining
    Hantouti, Hajar
    Benamar, Nabil
    Taleb, Tarik
    Laghrissi, Abdelquoddous
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 487 - 507