2022
DOI: 10.1155/2022/7294638
|View full text |Cite
|
Sign up to set email alerts
|

BlockREV: Blockchain-Enabled Multi-Controller Rule Enforcement Verification in SDN

Abstract: Compared with the classical structure with only one controller in software-defined networking (SDN), multi-controller topology structure in SDN provides a new type of cross-domain forwarding network architecture with multiple centralized controllers and distributed forwarding devices. However, when the network includes multiple domains, lack of trust among the controllers remains a challenge how to verify the correctness of cross-domain forwarding behaviors in different domains. In this paper, we propose a nov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…A second controller, which played the role of a flter, was added for receiving the commands of the controller to the switches to validate them. Recently, blockchain has also been considered as an option to secure the control layer, particularly, the communication interface between the controllers, as in [21,31] or [32]. Te controllers' decisions are the subject of a vote among all other controllers to ensure the consistency of the decisions.…”
Section: Malicious Controller In Sdnmentioning
confidence: 99%
See 1 more Smart Citation
“…A second controller, which played the role of a flter, was added for receiving the commands of the controller to the switches to validate them. Recently, blockchain has also been considered as an option to secure the control layer, particularly, the communication interface between the controllers, as in [21,31] or [32]. Te controllers' decisions are the subject of a vote among all other controllers to ensure the consistency of the decisions.…”
Section: Malicious Controller In Sdnmentioning
confidence: 99%
“…r learn ′ � r learn ; (26) if r learn ∈ R Set then (27) while timeout ps do (28) f � wait(fmod); (29) if type(f) � delete then (30) r learn ′ � r learn ′ /f′; (31) else if type(f) � add then (32) r learn ′ � r learn ′ ∪ f; (33) else if type(f) � modify then (34) r learn ′ � r learn ′ /f ′ & r learn ′ � r learn ′ ∪ f; (35) if cons(r learn ′ ) � � � � � � � r learn ′ � r learn then (36) return Fault; (43) while timeout mp do (44) f � wait(fmod); (45) if fmod ∈ R Set then (46) R Set � R Set /fmod (47) else (48) return Fault ALGORITHM 1: Observer Logic.…”
Section: Data Availabilitymentioning
confidence: 99%