Towards Trusted Security Context Exchange Protocol for SDN Based Low Latency Networks

被引:0
作者
Ghafoor, Abdul [1 ,2 ]
Abbasi, A. Qudus [3 ]
Khan, Zaheer [4 ]
机构
[1] Sch Elect Engn & Comp Sci, Islamabad, Pakistan
[2] RISE AB, Isafjordsgatan 22, S-16440 Kista, Sweden
[3] Quaid I Azam Univ, Dept Informat Technol, Islamabad, Pakistan
[4] Univ West England, Frenchay Campus, Bristol, Avon, England
来源
COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019 | 2019年 / 11698卷
关键词
Trust; Verifiable identities; SDN; Context; Security attributes; VANET; ARCHITECTURE; CHALLENGES;
D O I
10.1007/978-3-030-26601-1_20
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To overcome the latency issue in real-time communication, a number of research based solutions and architectures are being proposed. In all these, security is not considered an important factor since it causes extra delay in the communication and introduces overhead. Therefore, a design decision is needed to assess tradeoff between efficiency and security mechanisms. In this respect, we designed a security approach in Software Defined Networks (SDN) based Vehicular Autonomous Ad hoc Network (VANET) where low latency and security are essential elements. VNAET provides a system of systems approach where various hybrid solutions are integrated and installed on number of network nodes managed by SDN. In such networks, our novel approach exchanges security context in a synchronized manner to serve as a baseline for network nodes to dynamically adopt security features as per security requirements of these nodes. Hence, various security contexts are designed and categorized based on the nature of information exchange between nodes, mainly, to offer authentication, secure and trustworthy communication services. These well-designed security contexts enable devices of different capabilities to securely communicate by using predefined security parameters and cryptographic functions. This eliminates the need to negotiate any secure communication parameters and hence results in less communication overhead. In addition, our approach is integrated with verifiable identities (Veidblock) concept which addresses privacy issues through anonymity. These security contexts are verified by using scyther by demonstrating that the trustworthiness is achieved by countering nonrepudiation, impersonation, tampering, eavesdropping and replay attacks.
引用
收藏
页码:286 / 298
页数:13
相关论文
共 29 条
[1]   VeidBlock: Verifiable Identity using Blockchain and Ledger in a Software Defined Network [J].
Abbasi, Abdul Ghafoor ;
Khan, Zaheer .
COMPANION PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC'17 COMPANION), 2017, :173-179
[2]  
Accenture Consulting, TACT INT EN PERV NET
[3]   The Tactile Internet for Industries: A Review [J].
Aijaz, Adnan ;
Sooriyabandara, Mahesh .
PROCEEDINGS OF THE IEEE, 2019, 107 (02) :414-435
[4]  
Al-Rabanah Yousef, 2015, INT J SCI APPL RES, P50, DOI DOI 10.48550/ARXIV.1712.04263
[5]  
[Anonymous], 2012, COMMUN MOBILE COMPUT, DOI 10.1186/2192-1121-1-9
[6]   Towards the trillion sensors market [J].
Bogue, Robert .
SENSOR REVIEW, 2014, 34 (02) :137-142
[7]   DATA-DRIVEN COMPUTING AND CACHING IN 5G NETWORKS: ARCHITECTURE AND DELAY ANALYSIS [J].
Chen, Min ;
Qian, Yongfeng ;
Hao, Yixue ;
Li, Yong ;
Song, Jeungeun .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (01) :70-75
[8]  
Costa-Requena J, 2015, 2015 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), P154, DOI 10.1109/EuCNC.2015.7194059
[9]  
ETSI, Network functions virtualisation (NFV)
[10]  
architectural frame-work