Softwarized IoT Network Immunity Against Eavesdropping With Programmable Data Planes

被引:22
|
作者
Liu, Gang [1 ]
Quan, Wei [1 ]
Cheng, Nan [2 ]
Gao, Deyun [1 ]
Lu, Ning [3 ]
Zhang, Hongke [1 ,4 ]
Shen, Xuemin [5 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
[4] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen 518040, Peoples R China
[5] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Cryptography; Eavesdropping; Protocols; Encryption; Internet of Things; Classification algorithms; Payloads; Eavesdropping attacks; network immune scheme; programming protocol-independent packet processors (P4); three lines of defenses; THE-MIDDLE ATTACKS; AUTHENTICATION; CHALLENGES; ENCRYPTION; SECURITY; INTERNET;
D O I
10.1109/JIOT.2020.3048842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
State-of-the-art mechanisms against eavesdropping first encrypt all packet payloads in the application layer and then split the packets into multiple network paths. However, versatile eavesdroppers could simultaneously intercept several paths to intercept all the packets, classify the packets into streams using transport fields, and analyze the streams by brute-force. In this article, we propose a programming protocol-independent packet processors (P4)-based network immune scheme (P4NIS) against the intractable eavesdropping. Specifically, P4NIS is equipped with three lines of defenses to provide a softwarized network immunity. Packets are successively processed by the third, second, and first line of defenses. The third line basically encrypts all packet payloads in the application layer using cryptographic mechanisms. Additionally, the second line re-encrypts all packet headers in the transport layer to distribute the packets from one stream into different streams, and disturbs eavesdroppers to classify the packets correctly. Besides, the second line adopts a programmable design for dynamically changing encryption algorithms. Complementally, the first line uses programmable forwarding policies which could split all the double-encrypted packets into different network paths disorderly. Using a paradigm of programmable data planes-P4, we implement P4NIS and evaluate its performances. Experimental results show that P4NIS can increase difficulties of eavesdropping and transmission throughput effectively compared with state-of-the-art mechanisms. Moreover, if P4NIS and state-of-the-art mechanisms have the same level of defending eavesdropping, P4NIS can decrease the encryption cost by 69.85%-81.24%.
引用
收藏
页码:6578 / 6590
页数:13
相关论文
共 50 条
  • [31] Introducing packet-level analysis in programmable data planes to advance Network Intrusion Detection
    Doriguzzi-Corin, Roberto
    Knob, Luis Augusto Dias
    Mendozzi, Luca
    Siracusa, Domenico
    Savi, Marco
    COMPUTER NETWORKS, 2024, 239
  • [32] Asynchronous Extern Functions in Programmable Software Data Planes
    Horpacsi, Daniel
    Laki, Sandor
    Voros, Peter
    Tejfel, Mate
    Pongracz, Gergely
    Molnar, Laszlo
    2019 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2019,
  • [33] Building and Testing Modular Programs for Programmable Data Planes
    Zheng, Peng
    Benson, Theophilus A.
    Hu, Chengchen
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (07) : 1432 - 1447
  • [34] Building and Testing Modular Programs for Programmable Data Planes
    Zheng, Peng
    Benson, Theophilus A.
    Hu, Chengchen
    Benson, Theophilus A. (tab@cs.brown.edu), 1600, Institute of Electrical and Electronics Engineers Inc., United States (38): : 1432 - 1447
  • [35] Mitigating TCP Protocol Misuse With Programmable Data Planes
    Laraba, Abir
    Francois, Jerome
    Chowdhury, Shihabur Rahman
    Chrisment, Isabelle
    Boutaba, Raouf
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01): : 760 - 774
  • [36] Secure Network Coding Against the Contamination and Eavesdropping Adversaries
    Zhou Yejun
    Li Hui
    Ma Jianfeng
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (03): : 411 - 416
  • [37] Video Streaming QoE Meets Programmable Data Planes: The Case of In-Network QoE for 360°VR
    Vogt, Francisco Germano
    Cesen, Fabricio Eduardo Rodriguez
    de Castro, Ariel Goes
    Singh, Suneet Kumar
    Luizelli, Marcelo Caggiani
    Rothenberg, Christian Esteve
    Antichi, Gianni
    IEEE NETWORK, 2025, 39 (02): : 176 - 183
  • [38] Signature-Based Traffic Classification and Mitigation for DDoS Attacks Using Programmable Network Data Planes
    Dimolianis, Marinos
    Pavlidis, Adam
    Maglaris, Vasilis
    IEEE ACCESS, 2021, 9 : 113061 - 113076
  • [39] Toward In-Network Event Detection and Filtering for Publish/Subscribe Communication Using Programmable Data Planes
    Vestin, Jonathan
    Kassler, Andreas
    Laki, Sandor
    Pongracz, Gergely
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01): : 415 - 428
  • [40] ProStream: Programmable Underwater IoT Network for Multimedia Streaming
    Gazi, Firoj
    Ahmed, Nurzaman
    Misra, Sudip
    Tiwari, Manoj Kumar
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17417 - 17424