2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI) 2017
DOI: 10.1109/kbei.2017.8325020
|View full text |Cite
|
Sign up to set email alerts
|

Secure northbound interface for SDN applications with NTRU public key infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Finally, in [53], the authors generate an architecture that only provides data to trusted third-party applications. For this purpose, the architecture makes use of the northbound interface with the NSS digital signature implementation and the NTRU encryption algorithm.…”
Section: A Northbound Interface and Application Planementioning
confidence: 99%
See 2 more Smart Citations
“…Finally, in [53], the authors generate an architecture that only provides data to trusted third-party applications. For this purpose, the architecture makes use of the northbound interface with the NSS digital signature implementation and the NTRU encryption algorithm.…”
Section: A Northbound Interface and Application Planementioning
confidence: 99%
“…Behavior-based access control method + IDS [48] API abuse, DoS, Malicious apps Publish/Subscribe model [49] Lack of authentication mechanisms between the app and the Controller Independent mechanism [50] Lack of authentication mechanisms between the app and the Controller Floodlight-based mechanism [51] [52] Nonencrypted communication between app and controller Lack of management over reliability Lack of access control Use of REST-like functions [53] Lack of third-party app authentication NTRU encryption algorithm and NSS digital signatures [54] Malicious apps NTRU encryption algorithm S=spoofing, T=tampering, R=repudiation, I= information disclosure, D=denial of service, E=elevation of privilege…”
Section: B East/westbound Interface and Control Planementioning
confidence: 99%
See 1 more Smart Citation
“…Southbound interface connects the data and the control planes [11]. In addition, there is an application plane that composes of end user applications which interact with the SDN controllers via the northbound interface to perform specific tasks such as mobility management, routing, access control, security, file transfer, and supervising [12], [13], [14].…”
Section: Introductionmentioning
confidence: 99%