Authentication Mechanism to Secure Communication between Wireless SDN Planes

被引:0
作者
Mahboob, Tahira [1 ]
Arshad, Iqra [1 ]
Batool, Aqsa [1 ]
Nawaz, Maryam [1 ]
机构
[1] Fatima Jinnah Women Univ, Dept Software Engn, The Mall, Rawalpindi, Pakistan
来源
PROCEEDINGS OF 2019 16TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST) | 2019年
关键词
SDN; wireless networks; security; authentication; cryptographic hash-function; SHA-256;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Software-defined networking (SDN) is the propitious step towards the future. Data Plane decoupling from control plane makes the networking environment more flexible and programmable. Cost effectiveness, flexibility, programmability makes SDN the favorite choice for todays industry. SDN architecture can also provide numerous benefits in wireless scenario. However, there are some open research issues related to security that need researcher's and academia's attention. Attack plane is introduced due to the fact that control logic is separated from tje data forwarding plane. This paper presents a simple authentication mechanism using hash table, cryptographic hash function and REST API for access points (APs) and applications to secure the communications. The unauthorized applications are not allowed to access network resources. Additionally, unauthorized access points are not allowed to communicate with other network elements. The wireless topology is emulated and tje proposed application is tested to validate the results. The application generates the report about total authorized and unauthorized access points in the topology. The application is allowed to run at all times in the network and alert the administrator about malicious device. This malicious device and application is not allowed to communicate with other network element or access network resources. Performance evaluation has been carried out by measruing the time required to run the application for varying number of Access Points (APs).
引用
收藏
页码:582 / 588
页数:7
相关论文
共 14 条
[1]  
[Anonymous], P IEEE CAN C EL COMP
[2]   AuthFlow: authentication and access control mechanism for software defined networking [J].
Ferrazani Mattos, Diogo Menezes ;
Muniz Bandeira Duarte, Otto Carlos .
ANNALS OF TELECOMMUNICATIONS, 2016, 71 (11-12) :607-615
[3]  
Hu H., 2014, Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN'14), P97
[4]  
Kang J. W., 2015, 2015 24 INT C COMPUT
[5]  
Kim K, 2012, PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON APAC 2011
[6]  
Kreutz D., 2013, Proc. Second ACM SIGCOMM Work. Hot Top. Softw. Defin. Netw. - HotSDN'13, DOI DOI 10.1145/2491185.2491199
[7]  
Oktian YE, 2015, INT CONF UBIQ FUTUR, P919, DOI 10.1109/ICUFN.2015.7182679
[8]   OperationCheckpoint:SDN Application Control [J].
Scott-Hayward, Sandra ;
Kane, Christopher ;
Sezer, Sakir .
2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2014, :618-623
[9]  
Shaikh N., 2018, U. S. Patent, Patent No. [9,948,606, 9948606]
[10]   Security in Software-Defined Networking: Threats and Countermeasures [J].
Shu, Zhaogang ;
Wan, Jiafu ;
Li, Di ;
Lin, Jiaxiang ;
Vasilakos, Athanasios V. ;
Imran, Muhammad .
MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05) :764-776