2016 IEEE Global Communications Conference (GLOBECOM) 2016
DOI: 10.1109/glocom.2016.7841954
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Authentication Mechanism for Software Defined Network Using Information Hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…However, almost no attention has been paid to the security requirements of control plane associations and communication between devices. For instance, only recently, the use of secrecy through obscurity has been proposed to protect SDN controllers from DoS attacks [41]. In this case, the switch authentication ID is hidden in a specific field in the IP protocol.…”
Section: Related Workmentioning
confidence: 99%
“…However, almost no attention has been paid to the security requirements of control plane associations and communication between devices. For instance, only recently, the use of secrecy through obscurity has been proposed to protect SDN controllers from DoS attacks [41]. In this case, the switch authentication ID is hidden in a specific field in the IP protocol.…”
Section: Related Workmentioning
confidence: 99%
“…A globally recognized, resilient root-of-trust, could dramatically improve the global security of SDN, since current approaches to achieve trust are ad-hoc and partial [1]. Solving this gap would certainly assist in fostering global mechanisms to ensure trustworthy registration and association between devices, as discussed before, but the benefits would go beyond that.…”
Section: Resilient Roots-of-trustmentioning
confidence: 99%
“…Anchor Anchor The anchor needs two master recovery keys, namely the master recovery encryption key 𝐾𝑒𝑟𝑒𝑐 and master recovery MAC key 𝐾ℎ𝑟𝑒𝑐, fundamental for the post-compromise recovery steps described ahead. However, these two master recovery keys, in possession of the authority overseeing anchor (the system administrator), must never appear in the anchor server (if they are to recover from a possible full server compromise), being securely stored and used only in an offline manner 1 . Due to space constraints, we refer the reader to Appendix C of [74] for more information (including a visual representation) regarding the three phases of anchor, namely setup, normal operation, and recovery.…”
Section: System Roles and Setupmentioning
confidence: 99%
“…F UTURE wireless networks will soon provide ultra-reliable and low latency services, such as industrial automation, e-health, and entertainment applications. For a delaysensitive service, multi-access edge computing (MEC), network function virtualization (NFV) [1], and software defined networking (SDN) [2] [3] are three key network technologies. First, the MEC reduces end-to-end latency by bringing the services closer to the edge of the network.…”
Section: Introductionmentioning
confidence: 99%