Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016 (2016), Article ID 1708970, 12 pages
http://dx.doi.org/10.1155/2016/1708970
Research Article

Securing SDN Southbound and Data Plane Communication with IBC

Department of Ubiquitous IT, Division of Computer & Information Engineering, Dongseo University, Busan 617-716, Republic of Korea

Received 21 March 2016; Revised 22 June 2016; Accepted 4 July 2016

Academic Editor: Juan C. Cano

Copyright © 2016 JunHuy Lam et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Dixit, F. Hao, S. Mukherjee, T. V. Lakshman, and R. Kompella, “Towards an elastic distributed SDN controller,” in Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN '13), pp. 7–12, Hong Kong, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. M. F. Bari, S. R. Chowdhury, R. Ahmed, and R. Boutaba, “PolicyCop: an autonomic QoS policy enforcement framework for software defined networks,” in Proceedings of the Workshop on Software Defined Networks for Future Networks and Services (SDN4FNS '13), pp. 1–7, Trento, Italy, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. R. Skowyra, S. Bahargam, and A. Bestavros, “Software-Defined IDS for securing embedded mobile devices,” in Proceedings of the 2013 IEEE High Performance Extreme Computing Conference (HPEC '13), pp. 1–7, Waltham, Mass, USA, September 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using NOX/OpenFlow,” in Proceedings of the 35th Annual IEEE Conference on Local Computer Networks (LCN '10), pp. 408–415, Denver, Colo, USA, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. J. R. Ballad, I. Rae, and A. Akella, “Extensible and scalable network monitoring using openSAFE,” in Proceedings of the Internet Network Management Conference on Research on Enterprise Networking (INM/WREN '10), p. 8, 2010.
  6. C. Yu, C. Lumezanu, Y. Zhang, V. Singh, G. Jiang, and H. V. Madhyastha, “FlowSense: monitoring network utilization with zero measurement cost,” in Proceedings of the 14th International Conference on Passive and Active Measurement (PAM '13), vol. 7799, pp. 31–41, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  7. J. H. Lam, S.-G. Lee, H.-J. Lee, and Y. E. Oktian, “TLS channel implementation for ONOS's east/west-bound communication,” in Electronics, Communications and Networks V, vol. 382 of Lecture Notes in Electrical Engineering, pp. 397–403, Springer, Singapore, 2016. View at Publisher · View at Google Scholar
  8. OpenFlow, https://www.opennetworking.org/sdn-resources/technical-library.
  9. “Cisco Application Centric Infrastructure: Use ACI as a Technology-Based Catalyst for IT Transformation White Paper,” http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/white-paper-c11-734501.html.
  10. K. Benton, L. J. Camp, and C. Small, “OpenFlow vulnerability assessment,” in Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN '13), pp. 151–152, Hong Kong, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. Open Daylight, “Cross Project: Open Daylight Security Analysis,” https://wiki.opendaylight.org/view/CrossProject:OpenDaylight_Security_Analysis.
  12. HP, HP VAN SDN Controller Administrator Guide, revision 2, 1st edition, 2014, http://h20564.www2.hp.com/hpsc/doc/public/display?docId=c04003114.
  13. ONOS, “Secure OpenFlow connection using TLS/SSL,” https://jira.onosproject.org/browse/ONOS-1319.
  14. Y. Zaki, “Long Term Evolution (LTE),” in Future Mobile Communications: LTE Optimization and Mobile Network Virtualization, vol. 1 of Advanced Studies Mobile Research Center Bremen, pp. 13–33, Springer, Wiesbaden, Germany, 2013. View at Publisher · View at Google Scholar
  15. M. Stasiak, M. Głąbowski, A. Wiśniewski, and P. Zwierzykowski, “Universal mobile telecommunication system,” in Modeling and Dimensioning of Mobile Networks: From GSM to LTE, John Wiley & Sons, Chichester, UK, 2010. View at Publisher · View at Google Scholar
  16. M. D. Aime, G. Calandriello, and A. Lioy, “Dependability in wireless networks: can we rely on WiFi?” IEEE Security & Privacy, vol. 5, no. 1, pp. 23–29, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. S. W. Peters and R. W. Heath Jr., “The future of WiMAX: multihop relaying with IEEE 802.16j,” IEEE Communications Magazine, vol. 47, no. 1, pp. 104–111, 2009. View at Publisher · View at Google Scholar
  18. F. Bari and V. C. M. Leung, “Automated network selection in a heterogeneous wireless network environment,” IEEE Network, vol. 21, no. 1, pp. 34–40, 2007. View at Publisher · View at Google Scholar
  19. C. Peng, Q. Zhang, and C. Tang, “Improved TLS handshake protocols using identitybased cryptography,” in Proceedings of the 2009 International Symposium on Information Engineering and Electronic Commerce (IEEC '09), pp. 135–139, Ternopil, Ukraine, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. N. McKeown, T. Anderson, H. Balakrishnan et al., “OpenFlow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008. View at Publisher · View at Google Scholar
  21. S. J. Vaughan-Nichols, “OpenFlow: the next generation of the network?” IEEE Computer, vol. 44, no. 8, pp. 13–15, 2011. View at Publisher · View at Google Scholar
  22. Standards for M2M and the Internet of Things: oneM2M Release 1 Specifications, http://www.onem2m.org/technical/published-documents.
  23. D. Locke, “MQ Telemetry Transport (MQTT) V3.1 Protocol Specification,” August 2010, http://www.ibm.com/developerworks/webservices/library/ws-mqtt/index.html.
  24. Z. Shelby, K. Hartke, and C. Bormann, “The constrained application protocol (CoAP),” RFC 7252, 2014, https://datatracker.ietf.org/doc/draft-ietf-core-coap/. View at Google Scholar
  25. C. Bormann, A. P. Castellani, and Z. Shelby, “CoAP: an application protocol for billions of tiny internet nodes,” IEEE Internet Computing, vol. 16, no. 2, pp. 62–67, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. R. T. Fielding and R. N. Taylor, “Principled design of the modern Web architecture,” in Proceedings of the ACM 22nd International Conference on Software Engineering (ICSE '00), pp. 407–416, Limerick, Ireland, June 2000. View at Publisher · View at Google Scholar
  27. D. A. Cooper, “A closer look at revocation and key compromise in public key infrastructures,” in Proceedings of the 21st National Information Systems Security Conference, pp. 555–565, October 1998.
  28. D. Boneh, X. Ding, G. Tsudik, and C. M. Wong, “A method for fast revocation of public key certificates and security capabilities,” in Proceedings of the 10th Conference on USENIX Security Symposium, vol. 10, pp. 297–308, Berkeley, Calif, USA, 2001.
  29. X. Ding and G. Tsudik, “Simple identity-based cryptography with mediated RSA,” in Topics in Cryptology—CT-RSA 2003: The Cryptographers' Track at the RSA Conference 2003 San Francisco, CA, USA, April 13–17, 2003 Proceedings, vol. 2612 of Lecture Notes in Computer Science, pp. 193–210, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar
  30. C. Yoon, T. Park, S. Lee, H. Kang, S. Shin, and Z. Zhang, “Enabling security functions with SDN: a feasibility study,” Computer Networks, vol. 85, pp. 19–35, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology: Proceedings of the CRYPTO '84, Section I, pp. 47–53, Springer, 1985. View at Publisher · View at Google Scholar
  32. R. Sakai, K. Ohgishi, and M. Kasahara, “Cryptosystems based on pairing,” in Proceedings of the Symposium on Cryptography and Information Security (SCIS '00), Okinawa, Japan, January 2000.
  33. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Proceedings of the 21st Annual International Cryptology Conference, Santa Barbara, Calif, USA, August 2001. View at Publisher · View at Google Scholar
  34. N. P. Smart, “Identity-based authenticated key agreement protocol based on Weil pairing,” Electronics Letters, vol. 38, no. 13, pp. 630–632, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  35. L. Chen and C. Kudla, “Identity based authenticated key agreemet protocols from pairings,” in Proceedings of the 16th IEEE Computer Security Foundations Workshop, vol. 2, pp. 219–233, Pacific Grove, Calif, USA, July 2003. View at Publisher · View at Google Scholar
  36. M. A. S. Santos, B. A. A. Nunes, K. Obraczka, T. Turletti, B. T. De Oliveira, and C. B. Margi, “Decentralizing SDN's control plane,” in Proceedings of the 39th Annual IEEE Conference on Local Computer Networks (LCN '14), pp. 402–405, Edmonton, Canada, September 2014. View at Publisher · View at Google Scholar · View at Scopus
  37. L. Chen, Z. Cheng, and N. P. Smart, “Identity-based key agreement protocols from pairings,” International Journal of Information Security, vol. 6, no. 4, pp. 213–241, 2007. View at Publisher · View at Google Scholar
  38. S. Chatterjee, D. Hankerson, and A. Menezes, “On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings,” in Arithmetic of Finite Fields: Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27–30, 2010. Proceedings, vol. 6087 of Lecture Notes in Computer Science, pp. 114–134, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  39. N. P. Smart, V. Rijmen, B. Warinschi et al., “Algorithms, Key Sizes and Parameter Report—2013 recommendations,” European Union Agency for Network and Information Security (ENISA), version 1.0, October 2013.
  40. J.-H. Lam, S.-G. Lee, H.-J. Lee, and Y. E. Oktian, “Securing distributed SDN with IBC,” in Proceedings of the 7th International Conference on Ubiquitous and Future Networks (ICUFN '15), pp. 921–925, Sapporo, Japan, July 2015. View at Publisher · View at Google Scholar · View at Scopus
  41. Wireshark, https://www.wireshark.org/.