Softwarized IoT Network Immunity Against Eavesdropping With Programmable Data Planes

被引:22
|
作者
Liu, Gang [1 ]
Quan, Wei [1 ]
Cheng, Nan [2 ]
Gao, Deyun [1 ]
Lu, Ning [3 ]
Zhang, Hongke [1 ,4 ]
Shen, Xuemin [5 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
[4] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen 518040, Peoples R China
[5] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Cryptography; Eavesdropping; Protocols; Encryption; Internet of Things; Classification algorithms; Payloads; Eavesdropping attacks; network immune scheme; programming protocol-independent packet processors (P4); three lines of defenses; THE-MIDDLE ATTACKS; AUTHENTICATION; CHALLENGES; ENCRYPTION; SECURITY; INTERNET;
D O I
10.1109/JIOT.2020.3048842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
State-of-the-art mechanisms against eavesdropping first encrypt all packet payloads in the application layer and then split the packets into multiple network paths. However, versatile eavesdroppers could simultaneously intercept several paths to intercept all the packets, classify the packets into streams using transport fields, and analyze the streams by brute-force. In this article, we propose a programming protocol-independent packet processors (P4)-based network immune scheme (P4NIS) against the intractable eavesdropping. Specifically, P4NIS is equipped with three lines of defenses to provide a softwarized network immunity. Packets are successively processed by the third, second, and first line of defenses. The third line basically encrypts all packet payloads in the application layer using cryptographic mechanisms. Additionally, the second line re-encrypts all packet headers in the transport layer to distribute the packets from one stream into different streams, and disturbs eavesdroppers to classify the packets correctly. Besides, the second line adopts a programmable design for dynamically changing encryption algorithms. Complementally, the first line uses programmable forwarding policies which could split all the double-encrypted packets into different network paths disorderly. Using a paradigm of programmable data planes-P4, we implement P4NIS and evaluate its performances. Experimental results show that P4NIS can increase difficulties of eavesdropping and transmission throughput effectively compared with state-of-the-art mechanisms. Moreover, if P4NIS and state-of-the-art mechanisms have the same level of defending eavesdropping, P4NIS can decrease the encryption cost by 69.85%-81.24%.
引用
收藏
页码:6578 / 6590
页数:13
相关论文
共 50 条
  • [1] P4NIS: Improving network immunity against eavesdropping with programmable data planes
    Liu, Gang
    Quan, Wei
    Cheng, Nan
    Lu, Ning
    Zhang, Hongke
    Shen, Xuemin
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 91 - 96
  • [2] On supporting IoT data aggregation through programmable data planes
    Madureira, Andre Luiz R.
    Araujo, Francisco Renato C.
    Sampaio, Leobino N.
    COMPUTER NETWORKS, 2020, 177
  • [3] Meissa: Scalable Network Testing for Programmable Data Planes
    Zheng, Naiqian
    Liu, Mengqi
    Zhai, Ennan
    Liu, Hongqiang Harry
    Li, Yifan
    Yang, Kaicheng
    Liu, Xuanzhe
    Jin, Xin
    SIGCOMM '22: PROCEEDINGS OF THE 2022 ACM SIGCOMM 2022 CONFERENCE, 2022, : 350 - 364
  • [4] Secure Network Monitoring Using Programmable Data Planes
    Pereira, Fabio
    Neves, Nuno
    Ramos, Fernando M. V.
    2017 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2017, : 286 - 291
  • [5] Adaptive Network Traffic Reduction on the Fly With Programmable Data Planes
    Gyorgyi, Csaba
    Voros, Peter
    Kecskemeti, Karoly
    Szabo, Geza
    Laki, Sandor
    IEEE ACCESS, 2023, 11 : 24935 - 24944
  • [6] In-Network Management of Parallel Data Streams over Programmable Data Planes
    Boughzala, Bochra
    Koldehofe, Boris
    2024 23RD IFIP NETWORKING CONFERENCE, IFIP NETWORKING 2024, 2024, : 41 - 49
  • [7] Securing IoT Uplink Communications Against Eavesdropping
    Iellamo, Stefano
    Guiazon, Raoul
    Coupechoux, Marceau
    Wong, Kai-Kit
    2018 3RD CLOUDIFICATION OF THE INTERNET OF THINGS (CIOT), 2018,
  • [8] Implementing advanced network functions for datacenters with stateful programmable data planes
    Bonola, Marco
    Bifulco, Roberto
    Petrucci, Luca
    Pontarelli, Salvatore
    Tulumello, Angelo
    Bianchi, Giuseppe
    2017 23RD IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (LANMAN), 2017,
  • [9] Network Function Decomposition and Offloading on Heterogeneous Networks with Programmable Data Planes
    Moro, Daniele
    Verticale, Giacomo
    Capone, Antonio
    IEEE Open Journal of the Communications Society, 2021, 2 : 1874 - 1885
  • [10] A Review of P4 Programmable Data Planes for Network Security
    Gao, Ya
    Wang, Zhenling
    MOBILE INFORMATION SYSTEMS, 2021, 2021