Abstract
Software Defined Network (SDN) architecture has been widely used in various application domains. Aiming at the authentication and security issues of SDN architecture in autonomous decentralized system (ADS) applications, securing the mutual trust among the autonomous controllers, we combine trusted technology and SDN architecture, and we introduce an authentication protocol based on SDN architecture without any trusted third party between trusted domains in autonomous systems. By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. Our work fills the gap of mutual trust between different trusted domains and provides security foundation for interaction between different trusted domains.
Highlights
Autonomous decentralized systems (ADS) have been extended and applied to a variety of domains [1,2,3,4,5,6]
As shown in Boxes 3 and 4, the authentication protocol passed OFMC security test and ATSE security test, and the authentication protocol is not attacked by DY model, so we can conclude that the authentication protocol is secure
We introduced and demonstrated a security authentication protocol of Software Defined Network (SDN) trusted domain in ADS applications and designed the trusted domain network architecture to solve the credential problem of SDN architecture
Summary
Autonomous decentralized systems (ADS) have been extended and applied to a variety of domains [1,2,3,4,5,6]. Based on Software Defined Network (SDN) and OpenFlow protocol, researchers implemented network management and security functions mainly in the aspects of control, traffic forwarding, and load balancing. (2) Based on the new architecture with trusted function modules, we propose a trusted domain authentication protocol that protects controllers’ credibility among entire network architecture when communicating with a nontrusted third party. Trusted function modules, such as Trusted Measurement Module (TMM) and TCG Software Stack (TSS), could provide a set of services to ensure authentication protocol’s security, for example, encryption, decryption, digital sign, or key management.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have