Softwarized IoT Network Immunity Against Eavesdropping With Programmable Data Planes

被引:22
|
作者
Liu, Gang [1 ]
Quan, Wei [1 ]
Cheng, Nan [2 ]
Gao, Deyun [1 ]
Lu, Ning [3 ]
Zhang, Hongke [1 ,4 ]
Shen, Xuemin [5 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 3N6, Canada
[4] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen 518040, Peoples R China
[5] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Cryptography; Eavesdropping; Protocols; Encryption; Internet of Things; Classification algorithms; Payloads; Eavesdropping attacks; network immune scheme; programming protocol-independent packet processors (P4); three lines of defenses; THE-MIDDLE ATTACKS; AUTHENTICATION; CHALLENGES; ENCRYPTION; SECURITY; INTERNET;
D O I
10.1109/JIOT.2020.3048842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
State-of-the-art mechanisms against eavesdropping first encrypt all packet payloads in the application layer and then split the packets into multiple network paths. However, versatile eavesdroppers could simultaneously intercept several paths to intercept all the packets, classify the packets into streams using transport fields, and analyze the streams by brute-force. In this article, we propose a programming protocol-independent packet processors (P4)-based network immune scheme (P4NIS) against the intractable eavesdropping. Specifically, P4NIS is equipped with three lines of defenses to provide a softwarized network immunity. Packets are successively processed by the third, second, and first line of defenses. The third line basically encrypts all packet payloads in the application layer using cryptographic mechanisms. Additionally, the second line re-encrypts all packet headers in the transport layer to distribute the packets from one stream into different streams, and disturbs eavesdroppers to classify the packets correctly. Besides, the second line adopts a programmable design for dynamically changing encryption algorithms. Complementally, the first line uses programmable forwarding policies which could split all the double-encrypted packets into different network paths disorderly. Using a paradigm of programmable data planes-P4, we implement P4NIS and evaluate its performances. Experimental results show that P4NIS can increase difficulties of eavesdropping and transmission throughput effectively compared with state-of-the-art mechanisms. Moreover, if P4NIS and state-of-the-art mechanisms have the same level of defending eavesdropping, P4NIS can decrease the encryption cost by 69.85%-81.24%.
引用
收藏
页码:6578 / 6590
页数:13
相关论文
共 50 条
  • [41] TimeGAN as a Simulator for Reinforcement Learning Training in Programmable Data Planes
    Tavares, Thiago Caproni
    de Almeida, Leandro C.
    Silva, Washington R. D.
    Chiesa, Marco
    Verdi, Fabio L.
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [42] Offloading Machine Learning to Programmable Data Planes: A Systematic Survey
    Parizotto, Ricardo
    Coelho, Bruno Loureiro
    Nunes, Diego Cardoso
    Haque, Israat
    Schaeffer-Filho, Alberto
    ACM COMPUTING SURVEYS, 2024, 56 (01)
  • [43] Offloading Online MapReduce tasks with Stateful Programmable Data Planes
    Bruschi, Valerio
    Faltelli, Marco
    Tulumello, Angelo
    Pontarelli, Salvatore
    Quaglia, Francesco
    Bianchi, Giuseppe
    2020 23RD CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN 2020), 2020, : 17 - 22
  • [44] Catching the Flow with Locality Sensitive Hashing in Programmable Data Planes
    Cao, Zuowei
    Chen, Xiao
    Sheng, Yiqiang
    Nil, Hong
    PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 216 - 220
  • [45] LODGE: LOcal Decisions on Global statEs in programmable data planes
    Sviridov, German
    Bonola, Marco
    Tulumello, Angelo
    Giaccone, Paolo
    Bianco, Andrea
    Bianchi, Giuseppe
    2018 4TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION AND WORKSHOPS (NETSOFT), 2018, : 257 - 261
  • [46] On-the-fly Table Insertions on Programmable Software Data Planes
    Simon, Manuel
    Gallemueller, Sebastian
    Carle, Georg
    2024 20TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT, CNSM 2024, 2024,
  • [47] Optimizing Asynchronous Extern Execution in Programmable Software Data Planes
    Hudoba, Peter
    Kitlei, Robert
    Laki, Sandor
    Voros, Peter
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 3819 - 3824
  • [48] HULA: Scalable Load Balancing Using Programmable Data Planes
    Katta, Naga
    Hira, Mukesh
    Kim, Changhoon
    Sivaraman, Anirudh
    Rexford, Jennifer
    SYMPOSIUM ON SOFTWARE DEFINED NETWORKING (SDN) RESEARCH (SOSR'16), 2016,
  • [49] A coding-based protection scheme against eavesdropping in network
    Zhang, J. (zhangjing_sisu@sohu.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [50] PLS-IoT Enhancement Against Eavesdropping via Spatially Distributed Constellation Obfuscation
    Salman, Hanadi
    Arslan, Huseyin
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (09) : 1508 - 1512