Pan Ruixuan, Niu Chao, Yang Yingjie, Leng Qiang, Li Bowen
{"title":"Research on the Network Access Authentication Technology of Sdn Based on 802.1X","authors":"Pan Ruixuan, Niu Chao, Yang Yingjie, Leng Qiang, Li Bowen","doi":"10.1109/ICMTMA50254.2020.00171","DOIUrl":null,"url":null,"abstract":"Software Defined Network (SDN) is a new type of network architecture at present. While it is developing rapidly, it also brings many security issues. Network access authentication is one of the most important problems in the construction of network defense system. Aimed at the problem, this paper constructs an authentication framework for SDN based on 802.1X, and designs a two-level network access model which users are related to devices. Finally, the effectiveness of the authentication method and model is verified by simulation experiments.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMTMA50254.2020.00171","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Software Defined Network (SDN) is a new type of network architecture at present. While it is developing rapidly, it also brings many security issues. Network access authentication is one of the most important problems in the construction of network defense system. Aimed at the problem, this paper constructs an authentication framework for SDN based on 802.1X, and designs a two-level network access model which users are related to devices. Finally, the effectiveness of the authentication method and model is verified by simulation experiments.