2020
DOI: 10.1155/2020/6302739
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking

Abstract: Software-defined networking (SDN) decouples the control plane from the data plane, offering flexible network configuration and management. Because of this architecture, some security features are missing. On the one hand, because the data plane only has the packet forwarding function, it is impossible to effectively authenticate the data validity. On the other hand, OpenFlow can only match based on network characteristics, and it is impossible to achieve fine-grained access control. In this paper, we aim to de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
0
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 15 publications
0
0
0
Order By: Relevance
“…In the table, l denotes the number of switches in the forwarding path, and M denotes the computation process of a message authentication code. It can be seen from Table 3 that the extra header overhead and the verification overhead of data packets for SDNsec ( Sasaki et al, 2016 ) grow linearly with l , which will incur large overhead when the forwarding path is long; P4Label ( Zuo et al, 2020 ) introduces large extra header overhead and requires three pairing bilinear operations at the egress switch; Attribute-Guard’s ( Zhu et al, 2020 ) verification overhead of data packets increases linearly with the number of attribute features, when the value of | S Υ | is large, it will cause huge cost to the controller. Compared to related schemes, AISCF incurs less extra header overhead and has smaller and more stable time overhead for data packet verification.…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In the table, l denotes the number of switches in the forwarding path, and M denotes the computation process of a message authentication code. It can be seen from Table 3 that the extra header overhead and the verification overhead of data packets for SDNsec ( Sasaki et al, 2016 ) grow linearly with l , which will incur large overhead when the forwarding path is long; P4Label ( Zuo et al, 2020 ) introduces large extra header overhead and requires three pairing bilinear operations at the egress switch; Attribute-Guard’s ( Zhu et al, 2020 ) verification overhead of data packets increases linearly with the number of attribute features, when the value of | S Υ | is large, it will cause huge cost to the controller. Compared to related schemes, AISCF incurs less extra header overhead and has smaller and more stable time overhead for data packet verification.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…To enable users to flexibly use data streams on demand, Halpern & Pignataro (2015) proposed service function chain (SFC), which built the SDN flow table and controlled and forwarded data streams according to different user needs, but SFC did not analyze the security of the scheme. Zhu et al ’s ( 2020 ) Attribute-Guard used attribute features to classify rules issued by SDN controller into fine-grained categories, improving the drawback of fixed OpenFlow match item categories, and combined digital signature to verify the source of different types of data streams, but the scheme executed signature verification process on switches, introducing large forwarding delay.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Password identification enabled a more accurate representation of the data flow and ensured the integrity of the message. Previous studies [28] introduced an attribute-based group signature algorithm to verify the data packet forwarding process, signed data packets flowing into the network according to the user identity and other attributes, and controlled and forwarded data flows based on user attributes, achieving fine-grained secure data flow forwarding and verification. However, the methods proposed in [27,28] only signed the message load, which could not guarantee the security of the matches as the basis for forwarding and could not defend against network attacks launched by attackers through match tampering or forgery.…”
Section: Related Workmentioning
confidence: 99%
“…Previous studies [28] introduced an attribute-based group signature algorithm to verify the data packet forwarding process, signed data packets flowing into the network according to the user identity and other attributes, and controlled and forwarded data flows based on user attributes, achieving fine-grained secure data flow forwarding and verification. However, the methods proposed in [27,28] only signed the message load, which could not guarantee the security of the matches as the basis for forwarding and could not defend against network attacks launched by attackers through match tampering or forgery. SDNsec [29] added a code containing the transmission path information to the data packet; thus, the switch could verify this field of data packets that pass through the switch in the network, discard those that violated the path rules, and ensure data packet forwarding according to the path specified path in the SDN.…”
Section: Related Workmentioning
confidence: 99%