2018
DOI: 10.1007/978-3-319-92459-5_7
|View full text |Cite
|
Sign up to set email alerts
|

New SDN-Oriented Authentication and Access Control Mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…In [20] the authors propose a new authentication system for the SDN network, which is used to verify the identity of a host upon connection to the network. The proposed mechanism denies the access of unauthorized hosts and defines different levels of privileges for each user.…”
Section: Firewall Solutions In Sdnmentioning
confidence: 99%
“…In [20] the authors propose a new authentication system for the SDN network, which is used to verify the identity of a host upon connection to the network. The proposed mechanism denies the access of unauthorized hosts and defines different levels of privileges for each user.…”
Section: Firewall Solutions In Sdnmentioning
confidence: 99%
“…Based on the scheme of [4], this paper implements the prototype system and constructs the experimental environment as shown in the following Figure 2.…”
Section: Prototype Implementationmentioning
confidence: 99%
“…At the same time, the node may access and exit continuously, reflecting a strong dynamic. Therefore, SDN-oriented access control mechanism needs to solve dynamic problems such as timely update of access nodes and active adjustment of access rights [4]. Traditional access control models for enclosed environments, such as DAC (Discretionary Access Control), MAC (Mandatory Access Control), RBAC (Role-Based Access Control), require preset node-privilege correspondence and SDN access [5] [6].…”
mentioning
confidence: 99%
“…The authentication functionality is composed of five components: supplicant, OpenFlow-enabled switches, controller, authenticator, and the authentication server, see [5]. The authentication process of comparing the credentials, provided by the user with the predefined authorized users information database to validate the users, is done in the authentication server (RADIUS).…”
Section: Access Control and Policy Enforcement Subsystemmentioning
confidence: 99%
“…In this paper, we extend our previous work in [4,5] and propose a solution that takes the advantages of the programmability and the centralized control with its global view, it consists of two main subsystems. The first subsystem tries to prevent any access attempts from unauthorized users by verifying a host identity upon connection to the network.…”
Section: Introductionmentioning
confidence: 97%