2019
DOI: 10.1109/tnsm.2019.2909116
|View full text |Cite
|
Sign up to set email alerts
|

HiAuth: Hidden Authentication for Protecting Software Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
5

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 48 publications
0
14
0
5
Order By: Relevance
“…It has a network‐wide traffic view to keep track of only a limited number of suspicious flows and applies a set of algorithms to perform Adaptive Correlation Analysis to detect a wide range of DDoS attacks. In another line of work, there have also been proposals for authentication mechanisms to extend OpenFlow communication 70,136,148 …”
Section: Solutions Focused On the Control Planementioning
confidence: 99%
“…It has a network‐wide traffic view to keep track of only a limited number of suspicious flows and applies a set of algorithms to perform Adaptive Correlation Analysis to detect a wide range of DDoS attacks. In another line of work, there have also been proposals for authentication mechanisms to extend OpenFlow communication 70,136,148 …”
Section: Solutions Focused On the Control Planementioning
confidence: 99%
“…However, most of the protocols in the literature are susceptible to various attacks like "Address Resolution Protocol (ARP)" poisoning, "distributed Denial-of-Service (DDoS)", 1,2 insider attacks, impersonation, and replay attacks. [3][4][5] • ARP is a protocol that maps the network addresses to the corresponding hardware addresses, such as "media access control address (MAC address)" and populates the ARP cache with false information to launch DoS or "man-in-the-middle (MITM)" attacks. However, the current implementation of this protocol in SDN is insecure and vulnerable to ARP attack, where an attacker can easily poison the ARP table of the hosts and leads to the MITM attack and DoS attack.…”
Section: Motivationmentioning
confidence: 99%
“…However, most of the protocols in the literature are susceptible to various attacks like ARP poisoning, DDoS, 1 insider attacks, impersonation, and replay attacks. 3,4 In addition, the nature of the SDN controller is a central server, which is a single point of failure and can lead to several data breaches. Therefore, the blockchain-based solution makes a system to be much stronger from the security aspect point of view.…”
Section: Literature Surveymentioning
confidence: 99%
“…We propose a new architecture called ARNAB to provide mobile service continuity. ARNAB stands for: Architecture for transparent service continuity via double-tier migration 3 . The term ARNAB means rabbit in Arabic and it is dubbed for the architecture because it illustrates the behavior of the service hopping through the infrastructure following the user.…”
Section: The Arnab Architecturementioning
confidence: 99%
“…F UTURE wireless networks will soon provide ultra-reliable and low latency services, such as industrial automation, e-health, and entertainment applications. For a delaysensitive service, multi-access edge computing (MEC), network function virtualization (NFV) [1], and software defined networking (SDN) [2] [3] are three key network technologies. First, the MEC reduces end-to-end latency by bringing the services closer to the edge of the network.…”
Section: Introductionmentioning
confidence: 99%