An SDN-Based Approach to Enhance the End-to-End Security: SSL/TLS Case Study

被引:0
|
作者
Ranjbar, Alireza [1 ]
Komu, Miika [1 ]
Salmela, Patrik [1 ]
Aura, Tuomas [2 ]
机构
[1] Ericsson Res, Helsinki, Finland
[2] Aalto Univ, Espoo, Finland
关键词
Software-Defined Networking; SSL/TLS; Centralized policy management; Handshake analysis; Flow verification;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
End-to-end encryption is becoming the norm for many applications and services. While this improves privacy of individuals and organizations, the phenomenon also raises new kinds of challenges. For instance, with the increase of devices using encryption, the volumes of outdated, exploitable encryption software also increases. This may create some distrust amongst the users against security unless its quality is enforced in some ways. Unfortunately, deploying new mechanisms at the end-points of the communication is challenging due to the sheer volume of devices, and modifying the existing services may not be feasible either. Hence, we propose a novel method for improving the quality of the secure sessions in a centralized way based on the SDN architecture. Instead of inspecting the encrypted traffic, our approach enhances the quality of secure sessions by analyzing the plaintext handshake messages exchanged between a client and server. We exploit the fact that many of today's security protocols negotiate the security parameters such as the protocol version, encryption algorithms or certificates in plaintext in a protocol handshake before establishing a secure session. By verifying the negotiated information in the handshake, our solution can improve the security level of SSL/TLS sessions. While the approach can be extended to many other protocols, we focus on the SSL/TLS protocol in this paper because of its wide-spread use. We present our implementation for the OpenDaylight controller and evaluate its overhead to SSL/TLS session establishment in terms of latency.
引用
收藏
页码:281 / 288
页数:8
相关论文
共 50 条
  • [31] Hybrid End-to-End VPN Security Approach for Smart IoT Objects
    Juma, Mazen
    Monem, Azza Abdel
    Shaalan, Khaled
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 158
  • [32] Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
    Sahraoui, Somia
    Bilami, Azeddine
    COMPUTER NETWORKS, 2015, 91 : 26 - 45
  • [33] Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach
    Hellaoui, Hamed
    Koudil, Mouloud
    Bouabdallah, Abdelmadjid
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07) : 6589 - 6602
  • [34] An End-to-End Tree Based Approach for Instance Segmentation
    Manohar, K., V
    Niitani, Yusuke
    COMPUTER VISION - ECCV 2018 WORKSHOPS, PT V, 2019, 11133 : 521 - 527
  • [35] Design of SDN based End-to-end Routing over Multiple Domains for Mobility Management
    Hata, Misumi
    Soylu, Mustafa
    Izumi, Satoru
    Abe, Toru
    Suganuma, Takuo
    2017 13TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2017,
  • [36] Research on end-to-end computing power network architecture based on SDN and MIH technology
    Cui, Fang
    Gu, Jianhua
    Wang, Hengjiang
    Ni, Mao
    Zhou, Ting
    International Journal of Computational Systems Engineering, 2024, 8 (07) : 1 - 13
  • [37] TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE
    Hossain, M. Shamim
    Muhammad, Ghulam
    Rahman, Sk Md Mizanur
    Abdul, Wadood
    Alelaiwi, Abdulhameed
    Alamri, Atif
    IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 44 - 51
  • [38] Sizzle: A standards based end-to-end security architecture for the embedded Internet
    Gupta, V
    Millard, M
    Fung, S
    Zhu, Y
    Gura, N
    Eberle, H
    Shantz, SC
    Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 247 - 256
  • [39] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [40] An efficient identity-based cryptosystem for end-to-end mobile security
    Hwu, Jing-Shyang
    Chen, Rong-Jaye
    Lin, Yi-Bing
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) : 2586 - 2593