Abstract
To overcome the latency issue in real-time communication, a number of research based solutions and architectures are being proposed. In all these, security is not considered an important factor since it causes extra delay in the communication and introduces overhead. Therefore, a design decision is needed to assess tradeoff between efficiency and security mechanisms. In this respect, we designed a security approach in Software Defined Networks (SDN) based Vehicular Autonomous Ad hoc Network (VANET) where low latency and security are essential elements. VNAET provides a system of systems approach where various hybrid solutions are integrated and installed on number of network nodes managed by SDN. In such networks, our novel approach exchanges security context in a synchronized manner to serve as a baseline for network nodes to dynamically adopt security features as per security requirements of these nodes. Hence, various security contexts are designed and categorized based on the nature of information exchange between nodes, mainly, to offer authentication, secure and trustworthy communication services. These well-designed security contexts enable devices of different capabilities to securely communicate by using predefined security parameters and cryptographic functions. This eliminates the need to negotiate any secure communication parameters and hence results in less communication overhead. In addition, our approach is integrated with verifiable identities (Veidblock) concept which addresses privacy issues through anonymity. These security contexts are verified by using scyther by demonstrating that the trustworthiness is achieved by countering non-repudiation, impersonation, tampering, eavesdropping and replay attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, M., Qian, Y., Hao, Y., Li, Y., Song, J.: Data-driven computing and caching in 5G networks: architecture and delay analysis. IEEE Wirel. Commun. 25(1), 70–75 (2018)
IEEE 5G and beyond technology roadmap. https://futurenetworks.ieee.org/images/files/pdf/ieee-5g-roadmap-white-paper.pdf. Accessed 13 June 2019
Accenture Consulting. Tactile Internet enabled by pervasive networks. http://technodocbox.com/Computer_Networking/69821120-Tactile-internet-enabled-by-pervasive-networks.html. Accessed 12 Feb 2019
van Kranenburg, R., Bassi, A.: IoT challenges. mUX: J. Mob. User Exp., 1–9 (2012). https://doi.org/10.1186/2192-1121-1-9
Kreutz, D., Ramos, F., Veríssimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. IEEE. 103(1), 14–76 (2015)
Truong, N.B., Lee, G.M., Ghamri-Doudane, Y.: Software defined networking-based vehicular Adhoc Network with Fog Computing. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada (2015)
Su, Z., Wang, T., Xia, Y., Hamdi, M.: CheetahFlow: towards low latency software-defined network. In: Proceedings of IEEE International Conference on Communications (ICC), Sydney, NSW, Australia (2014)
Requena, J.C., et al.: SDN and NFV integration in generalized mobile network architecture. In: Proceedings of European Conference on Networks and Communications (EuCNC), Paris, France (2015)
Abbasi, A.G., Khan, Z.: VeidBlock: verifiable identity using blockchain and ledger in a software defined network. In: Proceedings of SCCTSA2017 Co-located 10th IEEE/ACM Utility and Cloud Computing Conference, Austin, Texas, USA, pp. 173–179 (2017)
Kirichek, R.: 5G and Tactile Internet. Network and Services Decentralization. https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20160921/Documents/Presentations/S1_2_Ruslan_Kirichek_v3.pdf. Accessed 13 June 2019
Hu, P., Dhelim, S., Ning, H., Qiu, T.: Survey on fog computing: architecture, key technologies, applications and open issues. J. Network Comput. Appl. 98, 27–42 (2017)
Ramel, D.: SDN a game changer but slow out of the gate, survey shows. https://gcn.com/Articles/2015/01/13/SDN-adoption.aspx. Accessed 13 June 2019
ETSI. Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance, https://www.etsi.org/deliver/etsi_gr/NFV-SEC/001_099/003/01.02.01_60/gr_nfv-sec003v010201p.pdf. Accessed 13 June 2019
ETSI. Network Functions Virtualisation (NFV); NFV Security; Problem Statement, http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdf. Accessed 13 June 2019
Wen, X., Chen, Y., Hu, C., Shi, C., Wang, Yi.: Towards a secure controller platform for openflow applications. In: Proceedings of 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2013), Hong Kong, China, pp. 171–172 (2013)
Wasserman, M., Hartman, S., Zhang, D.: Security analysis of the Open Networking Foundation (ONF) OpenFlow Switch Specification. https://tools.ietf.org/id/draft-mrw-sdnsec-openflow-analysis-00.html. Accessed 12 June 2019
Szabo, D., Gulyas, A., Fitzek, F.H., Lucani, D.E.: Towards the tactile internet: decreasing communication latency with network coding and software defined networking. In: Proceedings of 21st European Wireless Conference, Budapest, Hungary, pp. 1–6 (2015)
Liyanage, M., et al.: Enhancing security of software defined mobile networks. IEEE Access 5, 9422–9438 (2017)
Parno, B., Perrig, A.: Challenges in securing vehicular networks. https://netsec.ethz.ch/publications/papers/cars.pdf. Accessed 13 June 2019
Al-Raba’nah, Y., Samara, G.: Security Issues in Vehicular Ad Hoc Networks (VANET): a survey. Int. J. Sci. Appl. Res. 2(4), 50–55 (2015)
Zaidi, K., Rajarajan, M.: Vehicular internet: security & privacy challenges and opportunities. Future Internet 7, 257–275 (2015)
Qu, F., Wu, Z., Wang, F.-Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)
Shrestha, R., Bajarachary, R., Nam, S.Y.: Challenges of future VANET and cloud-based approaches. Hindawi Wirel. Commun. Mob. Comput. 2018, 15 (2018)
Sugumar, R., Rengarajan, A., Jayakumar, C.: Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wirel. Netw. 24(2), 373–382 (2018)
Kaiser, C., Steger, M., Dorri, A., Festl, A., Stocker, A., Fellmann, M., Kanhere, S.: Towards a privacy-preserving way of vehicle data sharing – a case for blockchain technology? In: Dubbert, J., Müller, B., Meyer, G. (eds.) AMAA 2018. LNM, pp. 111–122. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-99762-9_10
Sharma, P.K., Moon, S.Y., Park, J.H.: Block-VN: a distributed blockchain based vehicular network architecture in smart city. J. Inform. Process. Syst. 13(1), 184–195 (2017)
Bogue, R.: Towards the trillion sensors market. Sens. Rev. 34(2), 137–142 (2014)
Aijaz, A., Sooriyabandara, M.: The tactile internet for industries: a review. IEEE 107(2), 414–435 (2018). https://doi.org/10.1109/JPROC.2018.2878265
Varghese, B., Wang, N., Barbhuiya, S., Kilpatrick, P., Nikolopoulos, D.S.: Challenges and opportunities in edge computing. In: IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA (2016). https://doi.org/10.1109/smartcloud.2016.18
Sezer, S., et al.: Are we ready for SDN? implementation challenges for software-defined networks. IEEE Commun. Mag. 51(7), 36–43 (2013)
Acknowledgment
This research activity is partially supported by TOUCHES ICT-TNG project and KP for Cybersecurity at RISE. We are also thankful to prof. Panos for technical discussion on initial topic at KTH.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ghafoor, A., Abbasi, A.Q., Khan, Z. (2019). Towards Trusted Security Context Exchange Protocol for SDN Based Low Latency Networks. In: Romanovsky, A., Troubitsyna, E., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2019. Lecture Notes in Computer Science(), vol 11698. Springer, Cham. https://doi.org/10.1007/978-3-030-26601-1_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-26601-1_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-26600-4
Online ISBN: 978-3-030-26601-1
eBook Packages: Computer ScienceComputer Science (R0)