Constant-Size Credential-Based Packet Forwarding Verification in SDN

被引:1
|
作者
Wu, Ping [1 ,2 ]
Chang, Chao-Wen [1 ,2 ]
Ma, Ying-Ying [1 ,2 ]
Zuo, Zhi-Bin [3 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Henan, Peoples R China
[2] Henan Key Lab Informat Secur, Zhengzhou 450001, Henan, Peoples R China
[3] Henan Univ Technol, Zhengzhou 450001, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Compendex;
D O I
10.1155/2022/2270627
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging software-defined networking (SDN) technology lacks tools to proactively ensure that policies will be followed or to inspect the behavior of the network. The network is vulnerable to sophisticated attacks against packets, such as alteration, injection, dropping, and hijacking attacks. Accurate and efficient network packet forwarding verification is a critical issue to ensure the correctness of packet forwarding when confronting with malicious attacks, while most of the existing packet forwarding verification solutions were implemented by inserting linear-scale cryptographic tags that increased with path length, which introduced significant communication overhead. In this paper, we propose a constant-size credential based packet forwarding verification mechanism in SDN. In the scheme, the ingress switch of a flow embeds a tag credential of constant-size which is independent of the packet forwarding path, each downstream switch verifies packets basing on the constant-size credential, and the controller periodically acquires node forwarding statistics along the path and localizes anomaly. The header space communication overhead of the proposed scheme is less than existing linear-scale mechanisms. We further prototype and evaluate the proposed scheme. Experiments demonstrate that the scheme achieves efficient forwarding and effective anomaly localization with less than 11% of additional forwarding delays and no more than 10% of throughput degradation.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Progressive Image Restoration Based on CP-ABE With Constant-Size Ciphertext and Constant Bilinear Calculation
    Sun, Huaibo
    Luo, Hong
    Sun, Yan
    IEEE ACCESS, 2019, 7 : 167032 - 167054
  • [32] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
    Chen, Cheng
    Zhang, Zhenfeng
    Feng, Dengguo
    PROVABLE SECURITY, 2011, 6980 : 84 - 101
  • [33] ABKS-CSC: attribute-based keyword search with constant-size ciphertexts
    Yang, Ye
    Han, Jinguang
    Susilo, Willy
    Yuen, Tsz Hon
    Li, Jiguo
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5003 - 5015
  • [34] Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Attrapadung, Nuttapong
    Libert, Benoit
    de Panafieu, Elie
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 90 - +
  • [35] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827
  • [36] An efficient index-based checkpointing protocol with constant-size control information on messages
    Tsai, JC
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (04) : 287 - 296
  • [37] Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
    Susilo, Willy
    Yang, Guomin
    Guo, Fuchun
    Huang, Qiong
    INFORMATION SCIENCES, 2018, 429 : 349 - 360
  • [38] Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext
    Zhao, Yang
    Ruan, Ankang
    Dan, Guohang
    Huang, Jicheng
    Ding, Yi
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [40] ID-based deniable ring signature with constant-size signature and its extention
    Hu, Chengyu
    Liu, Pengtao
    Journal of Computational Information Systems, 2010, 6 (11): : 3549 - 3558