2020
DOI: 10.1007/s00607-020-00835-4
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight edge authentication for software defined networks

Abstract: OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN's logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Almaini et al 15 To ensure that only authorized nodes can access the network; the authors offer two authentication methods using the programming language for protocol-independent packet processors (P4). Port knocking is the first technique, while a One-Time Password is the second.…”
Section: Namentioning
confidence: 99%
“…Almaini et al 15 To ensure that only authorized nodes can access the network; the authors offer two authentication methods using the programming language for protocol-independent packet processors (P4). Port knocking is the first technique, while a One-Time Password is the second.…”
Section: Namentioning
confidence: 99%
“…Almaini et al [13] explored the use of a ticketing mechanism in P4 switches using Port Knocking such that the traffic is forwarded only if the sender has a valid ticket. The predefined nodes have a ticket by default, while new nodes can obtain a ticket by completing a successful authentication via port knocking.…”
Section: A Previous State Of the Art Approachesmentioning
confidence: 99%
“…Finally, Bai et al [207] presented P40f, a tool that performs OS fingerprinting on programmable switches, and consequently, applies security policies (e.g., allow, drop, redirect) at line rate. Almaini et al [208] implemented an authentication technique based on One Time Passwords (OTP). The technique follows the Leslie Lamport algorithm [318] in which a chain of successive hash functions are verified for authentication.…”
Section: ) Other Access Controlmentioning
confidence: 99%