2021 11th International Conference on Cloud Computing, Data Science &Amp; Engineering (Confluence) 2021
DOI: 10.1109/confluence51648.2021.9377044
|View full text |Cite
|
Sign up to set email alerts
|

Security-Enhanced SDN Controller Based Kerberos Authentication Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Kerberos is a well-known authentication protocol that often involves PBA, as it verifies the identity of users and hosts using secret keys or passwords [41]. Hamza et al [42] addressed security concerns in the control plane of SDN, particularly those related to host authentication in a scalable network environment. This study proposes a technique that employs the Kerberos authentication protocol to ensure the authenticity of hosts before they communicate with an SDN controller.…”
Section: A Authentication and Authorizationmentioning
confidence: 99%
“…Kerberos is a well-known authentication protocol that often involves PBA, as it verifies the identity of users and hosts using secret keys or passwords [41]. Hamza et al [42] addressed security concerns in the control plane of SDN, particularly those related to host authentication in a scalable network environment. This study proposes a technique that employs the Kerberos authentication protocol to ensure the authenticity of hosts before they communicate with an SDN controller.…”
Section: A Authentication and Authorizationmentioning
confidence: 99%
“…In order to gain access to sensitive information, alter network traffic, or carry out other attacks, an attacker may pose as a controller and send false signals to SDN-enabled network routers or switches. To address this issue, researchers have proposed authentication models to legitimate controller traffic [161] or have proposed using IDSs and ML algorithms to detect these attacks [163]. Controller impersonation attacks necessitate further research efforts in SD-SG network security because an imposter controller can destabilize the network topology and, as a result, the power grid layer itself.…”
Section: Controller Impersonation Attacksmentioning
confidence: 99%
“…Other authentication techniques include the use of certificates which are sent to the server for verification of credentials, albeit it necessitates the use of Hypertext Transfer Protocol Secure (HTTPS) due to the lack of secure communication channels [90], [92]. Alternatively, Kerberos protocols are used to mutually authenticate users in the system using symmetric keys (shared secret between them) [91].…”
Section: Security Framework For Web-based Systemsmentioning
confidence: 99%