Hongyan Cui, Zunming Chen, Longfei Yu, Kun Xie, Zong-Guo Xia
{"title":"SDN环境下网络应用的认证机制","authors":"Hongyan Cui, Zunming Chen, Longfei Yu, Kun Xie, Zong-Guo Xia","doi":"10.1109/WPMC.2017.8301788","DOIUrl":null,"url":null,"abstract":"Software-defined Networking, a new networking paradigm, provides network programming for third parties by separating control plane from data forwarding plane and opening network capabilities. SDN brings great flexibility and openness to the network, but the original design phase of SDN had not considered designing characteristics regarding security. For this reason, there are many potential vulnerabilities in SDN Environments. One of the most critical security threats arise from the vulnerability of trusting relationship due to the lack of authentication mechanism between the network application and the controller. A specific concern is whether an application can be trusted or not. This paper discusses the authentication mechanism of the network application. At the same time, it implements the application authentication system which addresses the key challenges: how to safely resolve conflicts between untrusted network applications and requests. The paper undergoes system testing in testbed constructed Floodlight architecture. The test results show that the system works well to effectively defend against unauthorized access and provide log history, which verifies the effectiveness of the proposed method to secure the northbound interface by introducing the application authentication system.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Authentication mechanism for network applications in SDN environments\",\"authors\":\"Hongyan Cui, Zunming Chen, Longfei Yu, Kun Xie, Zong-Guo Xia\",\"doi\":\"10.1109/WPMC.2017.8301788\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software-defined Networking, a new networking paradigm, provides network programming for third parties by separating control plane from data forwarding plane and opening network capabilities. SDN brings great flexibility and openness to the network, but the original design phase of SDN had not considered designing characteristics regarding security. For this reason, there are many potential vulnerabilities in SDN Environments. One of the most critical security threats arise from the vulnerability of trusting relationship due to the lack of authentication mechanism between the network application and the controller. A specific concern is whether an application can be trusted or not. This paper discusses the authentication mechanism of the network application. At the same time, it implements the application authentication system which addresses the key challenges: how to safely resolve conflicts between untrusted network applications and requests. The paper undergoes system testing in testbed constructed Floodlight architecture. The test results show that the system works well to effectively defend against unauthorized access and provide log history, which verifies the effectiveness of the proposed method to secure the northbound interface by introducing the application authentication system.\",\"PeriodicalId\":239243,\"journal\":{\"name\":\"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WPMC.2017.8301788\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WPMC.2017.8301788","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication mechanism for network applications in SDN environments
Software-defined Networking, a new networking paradigm, provides network programming for third parties by separating control plane from data forwarding plane and opening network capabilities. SDN brings great flexibility and openness to the network, but the original design phase of SDN had not considered designing characteristics regarding security. For this reason, there are many potential vulnerabilities in SDN Environments. One of the most critical security threats arise from the vulnerability of trusting relationship due to the lack of authentication mechanism between the network application and the controller. A specific concern is whether an application can be trusted or not. This paper discusses the authentication mechanism of the network application. At the same time, it implements the application authentication system which addresses the key challenges: how to safely resolve conflicts between untrusted network applications and requests. The paper undergoes system testing in testbed constructed Floodlight architecture. The test results show that the system works well to effectively defend against unauthorized access and provide log history, which verifies the effectiveness of the proposed method to secure the northbound interface by introducing the application authentication system.