An SDN-Based Wireless Authentication and Access Control Security Solution

被引:0
|
作者
Han, Yanyan [1 ]
Li, Guohao [1 ,2 ]
Feng, Binbin [1 ]
机构
[1] Beijing Elect Sci Inst, 7 Fufeng Rd, Beijing, Peoples R China
[2] Xidian Univ, 2 Taibai South Rd, Xian, Shannxi, Peoples R China
来源
FRONTIERS IN CYBER SECURITY | 2018年 / 879卷
关键词
Software-defined network; RBAC; Wireless authentication; Access control;
D O I
10.1007/978-981-13-3095-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networking (SDN) is a relatively new approach in network management that proposes to separate the network control (Control plane) and the forwarding process (Data plane) to optimize the network infrastructure and improve network performance, controllability, manageability and flexibility. However, like every emerging technology, SDN has brought its own new challenges in terms of security. The security of SDN is the premise of its large-scale deployment and implementation. In this paper, we propose a wireless authentication and access control security framework under the SDN architecture which provides an optimal and secure network access with low latency. Considering the ability of SDN to handle authentication and access control in a wireless environment, we installed wireless authentication modules into the Ryu controller. Meanwhile, we added the concept of management unit to the RBAC model to achieve hierarchical authorization in the wireless authentication environment. We have implemented and tested our architecture to show its performance.
引用
收藏
页码:179 / 189
页数:11
相关论文
共 50 条
  • [21] A Hybrid Entropy and Blockchain Approach for Network Security Defense in SDN-Based IIoT
    Su Jian
    Jiang Mengnan
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (03) : 531 - 541
  • [22] SDN-based wireless body area network routing algorithm for healthcare architecture
    Cicioglu, Murtaza
    Calhan, Ali
    ETRI JOURNAL, 2019, 41 (04) : 452 - 464
  • [23] Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography
    Usman, Muhammad
    Amin, Rashid
    Aldabbas, Hamza
    Alouffi, Bader
    ELECTRONICS, 2022, 11 (07)
  • [24] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [25] Access control method of network security authentication information based on fuzzy reasoning algorithm
    Zhang, Ruihong
    Hu, Zhihua
    MEASUREMENT, 2021, 185
  • [26] Voice Authentication Embedded Solution for Secured Access Control
    Galka, Jakub
    Masior, Mariusz
    Salasa, Michal
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2014, 60 (04) : 653 - 661
  • [27] Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
    Ndibanje, Bruce
    Lee, Hoon-Jae
    Lee, Sang-Gon
    SENSORS, 2014, 14 (08): : 14786 - 14805
  • [28] Improving HBQ Authentication and Access Control in Wireless Sensor Network
    Nouri-Moghaddam, Babak
    Naji, Hamid Reza
    2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2013, : 82 - 87
  • [29] Resource management and switch migration in SDN-based multi-access edge computing environments
    Guo, Jingjing
    Li, Chunlin
    Luo, Youlong
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (13) : 15532 - 15566
  • [30] ESD-WSN: An Efficient SDN-Based Wireless Sensor Network Architecture for IoT Applications
    Zhang, Zhiwei
    Zhang, Zhiyong
    Wang, Rui
    Jia, Zhiping
    Lei, Haijun
    Cai, Xiaojun
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 735 - 745