Softwarized IoT Network Immunity Against Eavesdropping With Programmable Data Planes

被引:22
|
作者
Liu, Gang [1 ]
Quan, Wei [1 ]
Cheng, Nan [2 ]
Gao, Deyun [1 ]
Lu, Ning [3 ]
Zhang, Hongke [1 ,4 ]
Shen, Xuemin [5 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
[4] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen 518040, Peoples R China
[5] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Cryptography; Eavesdropping; Protocols; Encryption; Internet of Things; Classification algorithms; Payloads; Eavesdropping attacks; network immune scheme; programming protocol-independent packet processors (P4); three lines of defenses; THE-MIDDLE ATTACKS; AUTHENTICATION; CHALLENGES; ENCRYPTION; SECURITY; INTERNET;
D O I
10.1109/JIOT.2020.3048842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
State-of-the-art mechanisms against eavesdropping first encrypt all packet payloads in the application layer and then split the packets into multiple network paths. However, versatile eavesdroppers could simultaneously intercept several paths to intercept all the packets, classify the packets into streams using transport fields, and analyze the streams by brute-force. In this article, we propose a programming protocol-independent packet processors (P4)-based network immune scheme (P4NIS) against the intractable eavesdropping. Specifically, P4NIS is equipped with three lines of defenses to provide a softwarized network immunity. Packets are successively processed by the third, second, and first line of defenses. The third line basically encrypts all packet payloads in the application layer using cryptographic mechanisms. Additionally, the second line re-encrypts all packet headers in the transport layer to distribute the packets from one stream into different streams, and disturbs eavesdroppers to classify the packets correctly. Besides, the second line adopts a programmable design for dynamically changing encryption algorithms. Complementally, the first line uses programmable forwarding policies which could split all the double-encrypted packets into different network paths disorderly. Using a paradigm of programmable data planes-P4, we implement P4NIS and evaluate its performances. Experimental results show that P4NIS can increase difficulties of eavesdropping and transmission throughput effectively compared with state-of-the-art mechanisms. Moreover, if P4NIS and state-of-the-art mechanisms have the same level of defending eavesdropping, P4NIS can decrease the encryption cost by 69.85%-81.24%.
引用
收藏
页码:6578 / 6590
页数:13
相关论文
共 50 条
  • [21] A state consistency framework leveraging packet cloning and piggybacking for programmable network data planes
    Garcia, Hugo
    Magaia, Naercio
    2021 IFIP NETWORKING CONFERENCE AND WORKSHOPS (IFIP NETWORKING), 2021,
  • [22] Dynamic Property Enforcement in Programmable Data Planes
    Neves, Miguel
    Huffaker, Bradley
    Levchenko, Kiri
    Barcellos, Marinho
    2019 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2019,
  • [23] Dynamic Property Enforcement in Programmable Data Planes
    Neves, Miguel
    Huffaker, Bradley
    Levchenko, Kirill
    Barcellos, Marinho
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (04) : 1540 - 1552
  • [24] Dynamic Property Enforcement in Programmable Data Planes
    Neves, Miguel
    Huffakert, Bradley
    Levchenko, Kiri
    Barcellos, Marinho
    2019 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2019,
  • [25] Real-Time Digital Filtering for IoT Data in Programmable Network Switches
    Nauman, Nathaniel
    Wu, Ruochong
    Bagchi, Saurabh
    52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS SUPPLEMENTAL VOLUME (DSN-S 2022), 2022, : 41 - 42
  • [26] A Programmable Data Plane to Support In-network Data Processing in Software-Defined IoT
    Kim, Ki-Wook
    Min, Sung-Gi
    Han, Youn-Hee
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 855 - 860
  • [27] Load balancing inside programmable data planes based on network modeling prediction using a GNN with network behaviors
    Liu, Wai-Xi
    Cai, Jun
    Zhu, Ying-Hao
    Luo, Jun-Ming
    Li, Jin
    COMPUTER NETWORKS, 2023, 227
  • [28] FastReact: In-Network Control and Caching for Industrial Control Networks using Programmable Data Planes
    Vestin, Jonathan
    Kassler, Andreas
    Akerberg, Johan
    2018 IEEE 23RD INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2018, : 219 - 226
  • [29] Novel virtual user scheme to increase data confidentiality against eavesdropping in OCDMA network
    Vishav Jyoti
    R.S.Kaler
    ChineseOpticsLetters, 2011, 9 (12) : 50 - 54
  • [30] Novel virtual user scheme to increase data confidentiality against eavesdropping in OCDMA network
    Jyoti, Vishav
    Kaler, R. S.
    CHINESE OPTICS LETTERS, 2011, 9 (12)