Software-defined security controller-based group management and end-to-end security management

被引:0
|
作者
Enrique Festijo
Younchan Jung
Marnel Peradilla
机构
[1] Technological Institute of the Philippines,Department of Electrical Engineering
[2] The Catholic University of Korea,School of Information, Communications, and Electronics Engineering
[3] De La Salle University,College of Computer Studies
关键词
Group key management; Network independent rekeying; Packet key management; Software-defined security controller; Scalable group management;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes group management and end-to-end security management based on the horizontal model suitable for group based private systems. The software-defined security controller (SDSC), which is located at the center of the control layer, functions as software-defined networking controller responsible for group management and end-to-end security management. The proposed group key rekeying feature uses the unicast method for distributing the signaling messages among the group members which belong to various heterogeneous networks. This network independent and centralized architecture for group key rekeying is advantageous for the dynamic members to constitute secure group. While the group key management is responsible for securing control signaling messages within the group members, the purpose of the end-to-end security management is to protect the end-to-end data traffic within them. To achieve end-to-end security, this paper uses packet key scheme that collaborates with the group key management. Then, the members of the group-based private system are allowed to receive packet key based security service for their end-to-end data traffic. The packet key scheme is based on the idea that the very short lifetime of the packet key with a relatively small key size can provide high level of security and satisfy the latency requirements especially for real-time applications. Because SDSC handles most of the burden in terms of communication and computational load, the workload for group key and end-to-end security management are dramatically reduced from each group member view point. The additional feature of subgroup key management enables each group member to sustain less workload, which solves the scalability issue for the big size private group.
引用
收藏
页码:3365 / 3382
页数:17
相关论文
共 50 条
  • [1] Software-defined security controller-based group management and end-to-end security management
    Festijo, Enrique
    Jung, Younchan
    Peradilla, Marnel
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) : 3365 - 3382
  • [2] Software-defined security controller-based end-to-end packet key security management
    Jung, Younchan
    Peradilla, Marnel
    Agulto, Ronnel
    [J]. 16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 89 - 96
  • [3] A Security Controller-based Software Defined Security Architecture
    Qiu, Xiaofeng
    Cheng, Fangyuan
    Wang, Weijia
    Zhang, Gang
    Qiu, Yangjun
    [J]. PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 191 - 195
  • [4] Energy-Efficient End-to-End Security for Software-Defined Vehicular Networks
    Raja, Gunasekaran
    Anbalagan, Sudha
    Vijayaraghavan, Geetha
    Dhanasekaran, Priyanka
    Al-Otaibi, Yasser D.
    Bashir, Ali Kashif
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) : 5730 - 5737
  • [5] DEVICE IDENTITY MANAGEMENT AND END-TO-END SECURITY
    Latour, Jacques
    D'Souza, Natasha
    [J]. IEEE NETWORK, 2021, 35 (05): : 8 - 9
  • [6] An End-to-End Security Approach for Digital Document Management
    Diego Munoz-Hernandez, Mario
    Morales-Sandoval, Miguel
    Juan Garcia-Hernandez, Jose
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1076 - 1090
  • [7] Exposing End-to-End Delay in Software-Defined Networking
    Zhang, Ting
    Liu, Bin
    [J]. INTERNATIONAL JOURNAL OF RECONFIGURABLE COMPUTING, 2019, 2019
  • [8] Enhancing Security Management at Software-Defined Exchange Points
    Kumar, Himal
    Gharakheili, Hassan Habibi
    Russell, Craig
    Sivaraman, Vijay
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (04): : 1479 - 1492
  • [9] A Software-Defined Networking Security Controller Architecture
    Shang, Fengjun
    Fu, Qiang
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 229 - 234
  • [10] End-to-End Security Formalization and Alignment for Federated Workflow Management
    Dickinson, Matthew
    Debroy, Saptarshi
    Calyam, Prasad
    Valluripally, Samaikya
    Zhang, Yuanxun
    Joshi, Trupti
    Xu, Dong
    [J]. PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 59 - 67