FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN

被引:4
作者
Lian, Weichen [1 ]
Li, Zhaobin [1 ]
Guo, Chao [1 ]
Wei, Zhanzhen [1 ]
Peng, Xingyuan [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Elect & Commun Engn, Beijing 100070, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2021年 / 15卷 / 01期
关键词
SDN; Data Forwarding Security; Blockchain; Flow Rules; BigchainDB; ARCHITECTURE; TREE;
D O I
10.3837/tiis.2021.01.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the next-generation network architecture, software-defined networking (SDN) has great potential. But how to forward data packets safely is a big challenge today. In SDN, packets are transferred according to flow rules which are made and delivered by the controller. Once flow rules are modified, the packets might be redirected or dropped. According to related research, we believe that the key to forward data flows safely is keeping the consistency of flow rules. However, existing solutions place little emphasis on the safety of flow rules. After summarizing the shortcomings of the existing solutions, we propose FRChain to ensure the security of SDN data forwarding. FRChain is a novel scheme that uses blockchain to secure flow rules in SDN and to detect compromised nodes in the network when the proportion of malicious nodes is less than one-third. The scheme places the flow strategies into blockchain in form of transactions. Once an unmatched flow rule is detected, the system will issue the problem by initiating a vote and possible attacks will be deduced based on the results. To simulate the scheme, we utilize BigchainDB, which has good performance in data processing, to handle transactions. The experimental results show that the scheme is feasible, and the additional overhead for network performance and system performance is less than similar solutions. Overall, FRChain can detect suspicious behaviors and deduce malicious nodes to keep the consistency of flow rules in SDN.
引用
收藏
页码:264 / 284
页数:21
相关论文
共 32 条
[1]  
Al-Shaer E., 2010, P 3 ACM WORKSHOP ASS, P37, DOI DOI 10.1145/1866898.1866905
[2]  
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[3]  
Antikainen Markku, 2014, Secure IT Systems 19th Nordic Conference, NordSec 2014. Proceedings: LNCS 8788, P229, DOI 10.1007/978-3-319-11599-3_14
[4]   A Review of Dietary Ziziphus jujuba Fruit (Jujube): Developing Health Food Supplements for Brain Protection [J].
Chen, Jianping ;
Liu, Xiaoyan ;
Li, Zhonggui ;
Qi, Airong ;
Yao, Ping ;
Zhou, Zhongyu ;
Dong, Tina T. X. ;
Tsim, Karl W. K. .
EVIDENCE-BASED COMPLEMENTARY AND ALTERNATIVE MEDICINE, 2017, 2017
[5]  
Chi PW, 2015, 2015 1st IEEE Conference on Network Softwarization (NetSoft)
[6]   SPHINX: Detecting Security Attacks in Software-Defined Networks [J].
Dhawan, Mohan ;
Poddar, Rishabh ;
Mahajan, Kshiteej ;
Mann, Vijay .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[7]   Distributed Audit System of SDN Controller Based on Blockchain [J].
Guan, Zhenyu ;
Lyu, Hanzheng ;
Zheng, Haibin ;
Li, Dawei ;
Liu, Jianwei .
SMART BLOCKCHAIN, SMARTBLOCK 2019, 2019, 11911 :21-31
[8]  
Hong S, 2015, INT CONF BIG DATA, P87, DOI 10.1109/35021BIGCOMP.2015.7072816
[9]   Cochain-SC: An Intra- and Inter-Domain Ddos Mitigation Scheme Based on Blockchain Using SDN and Smart Contract [J].
Houda, Zakaria Abou El ;
Hafid, Abdelhakim Senhaji ;
Khoukhi, Lyes .
IEEE ACCESS, 2019, 7 :98893-98907
[10]   Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks [J].
Kang, Jiawen ;
Yu, Rong ;
Huang, Xumin ;
Wu, Maoqiang ;
Maharjan, Sabita ;
Xie, Shengli ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4660-4670