Abstract

Software Defined Network (SDN) architecture has been widely used in various application domains. Aiming at the authentication and security issues of SDN architecture in autonomous decentralized system (ADS) applications, securing the mutual trust among the autonomous controllers, we combine trusted technology and SDN architecture, and we introduce an authentication protocol based on SDN architecture without any trusted third party between trusted domains in autonomous systems. By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. Our work fills the gap of mutual trust between different trusted domains and provides security foundation for interaction between different trusted domains.

Highlights

  • Autonomous decentralized systems (ADS) have been extended and applied to a variety of domains [1,2,3,4,5,6]

  • As shown in Boxes 3 and 4, the authentication protocol passed OFMC security test and ATSE security test, and the authentication protocol is not attacked by DY model, so we can conclude that the authentication protocol is secure

  • We introduced and demonstrated a security authentication protocol of Software Defined Network (SDN) trusted domain in ADS applications and designed the trusted domain network architecture to solve the credential problem of SDN architecture

Read more

Summary

Introduction

Autonomous decentralized systems (ADS) have been extended and applied to a variety of domains [1,2,3,4,5,6]. Based on Software Defined Network (SDN) and OpenFlow protocol, researchers implemented network management and security functions mainly in the aspects of control, traffic forwarding, and load balancing. (2) Based on the new architecture with trusted function modules, we propose a trusted domain authentication protocol that protects controllers’ credibility among entire network architecture when communicating with a nontrusted third party. Trusted function modules, such as Trusted Measurement Module (TMM) and TCG Software Stack (TSS), could provide a set of services to ensure authentication protocol’s security, for example, encryption, decryption, digital sign, or key management.

Security Authentication Protocol for ADS Applications
BAN Logic Security Analysis
Protocol Security Testing
Security Test
Performance Analysis
Taccess
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call