2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies 2015
DOI: 10.1109/ngmast.2015.43
|View full text |Cite
|
Sign up to set email alerts
|

Security for Future Software Defined Mobile Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(25 citation statements)
references
References 26 publications
0
25
0
Order By: Relevance
“…Surveys of SDN-based networks' vulnerabilities and related solutions are presented in [67], [68], [72], [75]. Survey in [67] identifies possibilities of security threats and attacks in SDN in relevance with the traditional STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, DoS (Denial of Service), Elevation of privilege) threat model and discusses respective work and proposed solutions.…”
Section: E Sdn Specific Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Surveys of SDN-based networks' vulnerabilities and related solutions are presented in [67], [68], [72], [75]. Survey in [67] identifies possibilities of security threats and attacks in SDN in relevance with the traditional STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, DoS (Denial of Service), Elevation of privilege) threat model and discusses respective work and proposed solutions.…”
Section: E Sdn Specific Security Issuesmentioning
confidence: 99%
“…1) Controller: The logically centralized controller is very critical component of the network. If the controller is compromised, the attacker will have tremendous access over the network [67], [68], [70], [75]. The idea of standby controller, when one of the controller fails, is discussed in [69].…”
Section: E Sdn Specific Security Issuesmentioning
confidence: 99%
“…Mutual authentication mechanisms together with the key distribution algorithms can be applied for securing the channel. Additionally, we can use improved protocols such as the host identity protocol (HIP) and IPsec tunneling to secure the channels between the controllers and the forwarding components [14,44].…”
Section: Communication Protocols Security Issuesmentioning
confidence: 99%
“…The [3] TLS used for encryption benefits to evade eavesdropping as well as spoofed northbound and southbound communications. The shared authentication [7] in order to authenticate the individuality of both module, stopping attackers from linking rogue controllers and switches. The re-routing of the traffic to middle boxes is also explained.…”
Section: Related Workmentioning
confidence: 99%