On Achieving Trustworthy Service Function Chaining

被引:7
作者
Pattaranantakul, Montida [1 ]
Song, Qipeng [2 ]
Tian, Yanmei [3 ]
Wang, Licheng [3 ]
Zhang, Zonghua [4 ,5 ,6 ]
Meddahi, Ahmed [4 ]
Vorakulpipat, Chalee [1 ]
机构
[1] Natl Elect & Comp Technol Ctr, Commun & Network Res Grp, Informat Secur Res Team, Pathum Thani 12120, Thailand
[2] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[4] Inst Mines Telecom, IMT Lille Douai, F-59650 Villeneuve Dascq, France
[5] SAMOVAR Lab, CNRS, UMR 5157, F-91000 Evry, France
[6] Huawei France Res Ctr, F-92100 Paris, France
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 03期
关键词
Security; Control systems; Tools; Service function chaining; Proposals; Probes; Optimized production technology; Network functions virtualization (NFV); software-defined networking (SDN); service function chaining (SFC); aggregate signatures; identity-based signatures; pairings;
D O I
10.1109/TNSM.2021.3081014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service Function Chaining (SFC) has recently received considerable attentions from both industry and academia, due to its potential for improving the flexibility of provisioning and composition of Virtualized Network Functions (VNFs) to suit application-specific needs. From a security perspective, there is a gap between high-level SFC policy specification and its enforcement in the data plane. It cannot guarantee that the deployed VNFs are always chained in an expected manner, or the packet flows of a particular service chain are sequentially forwarded to the intended and legitimate VNFs strictly compliant with the specified SFC policy. This lack of assurance leaves the door open for attackers to maliciously manipulate the service chain by evading from security functions such as firewall, Deep Packet Inspection (DPI), etc., or deviating the packet flows from their original service function path, ultimately leading to the violation of SFC policy. It is therefore important to have an efficient self-checking mechanism in place, ensuring the SFC to be implemented in a secure and dependable way. This paper presents a new security primitive - Lite Identity-based Ordered Multisignature scheme (ChainSign in short), which enforces all intended VNFs in a particular service chain to sequentially sign the packet received. Then the last hop of the chain will verify the signature, so as to validate whether all of them work as expected and have not been compromised, while satisfying the security properties of concern (i.e., the consistency in VNF chaining, their authenticities and sequences in a service chain). In addition to the implementation, we leverage the IETF Network Service Header (NSH) to carry the signature generated from our proposed scheme. The experiments show that ChainSign can preserve all identified security properties with minimal overhead.
引用
收藏
页码:3140 / 3153
页数:14
相关论文
共 42 条
[1]  
[Anonymous], 2017, P IEEE C NETW SOFTW
[2]  
[Anonymous], 2012, OpenFlow switch specification, version 1.3
[3]  
[Anonymous], 2009, XOR CIPHER
[4]  
[Anonymous], 2017, SERVICE FUNCTION CHA
[5]  
[Anonymous], 2020, OPENDAYLIGHT PROJECT
[6]  
Barker E., 2016, Recommendation for key management, part 1: General, 2016-01-28
[7]   New Multiparty Signature Schemes for Network Routing Applications [J].
Boldyreva, Alexandra ;
Gentry, Craig ;
O'Neill, Adam ;
Yum, Dae Hyun .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (01)
[8]  
Boldyreva A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P276
[9]  
Brockners F., 2019, IETF INTERNET DR MAR
[10]  
Chi Po-Wen, 2015, NETSOFT, P1