A Scalable SDN Architecture for Underwater Networks Security Authentication

被引:3
作者
Chen, Qiuli [1 ]
He, Ming [1 ,2 ]
Zheng, Xiang [1 ]
Dai, Fei [1 ]
Feng, Yuntian [1 ]
机构
[1] Army Engn Univ PLA, Nanjing 210007, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
基金
中国博士后科学基金;
关键词
software-defined underwater acoustic sensor networks; nodes mobility; identity authentication; Autonomous Underwater Vehicle;
D O I
10.1587/transinf.2017EDP7359
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networking (SDN) is recognized as the next-generation networking paradigm. The software-defined architecture for underwater acoustic sensor networks (SDUASNs) has become a hot topic. However, the current researches on SDUASNs is still in its infancy, which mainly focuses on network architecture, data transmission and routing. There exists some shortcomings that the scale of the SDUASNs is difficult to expand, and the security maintenance is seldom dabble. Therefore, a scalable software-definition architecture for underwater acoustic sensor networks (SSDUASNs) is introduced in this paper. It realizes an organic combination of the knowledge level, control level, and data level. The new nodes can easily access the network, which could be conducive to large-scale deployment. Then, the basic security authentication mechanism called BSAM is designed based on our architecture. In order to reflect the advantages of flexible and programmable in SSDUASNs, security authentication mechanism with pre-push (SAM-PP) is proposed in the further. In the current UASNs, nodes authentication protocol is inefficient as high consumption and long delay. In addition, it is difficult to adapt to the dynamic environment. The two mechanisms can effectively solve these problems. Compared to some existing schemes, BSAM and SAM-PP can effectively distinguish between legal nodes and malicious nodes, save the storage space of nodes greatly, and improve the efficiency of network operation. Moreover, SAM-PP has a further advantage in reducing the authentication delay.
引用
收藏
页码:2044 / 2052
页数:9
相关论文
共 16 条
[11]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426
[12]   Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks [J].
Shen, Jian ;
Gui, Ziyuan ;
Ji, Sai ;
Shen, Jun ;
Tan, Haowen ;
Tang, Yi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 106 :117-123
[13]  
Verma Seema, 2015, International Journal of Computer Network and Information Security, V7, P54, DOI 10.5815/ijcnis.2015.09.07
[14]   On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks [J].
Wang, Qiu ;
Dai, Hong-Ning ;
Li, Xuran ;
Wang, Hao ;
Xiao, Hong .
SENSORS, 2016, 16 (05)
[15]  
Zhang Xing, 2011, Journal of Southeast University (Natural Science Edition), V41, P227, DOI 10.3969/j.issn.1001-0505.2011.02.003
[16]   A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes [J].
Zhang, Ying ;
Chen, Wei ;
Liang, Jixing ;
Zheng, Bingxin ;
Jiang, Shengming .
SENSORS, 2015, 15 (12) :29958-29969