Skip to main content

Towards Trusted Security Context Exchange Protocol for SDN Based Low Latency Networks

  • Conference paper
  • First Online:
Book cover Computer Safety, Reliability, and Security (SAFECOMP 2019)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11698))

Included in the following conference series:

  • 1539 Accesses

Abstract

To overcome the latency issue in real-time communication, a number of research based solutions and architectures are being proposed. In all these, security is not considered an important factor since it causes extra delay in the communication and introduces overhead. Therefore, a design decision is needed to assess tradeoff between efficiency and security mechanisms. In this respect, we designed a security approach in Software Defined Networks (SDN) based Vehicular Autonomous Ad hoc Network (VANET) where low latency and security are essential elements. VNAET provides a system of systems approach where various hybrid solutions are integrated and installed on number of network nodes managed by SDN. In such networks, our novel approach exchanges security context in a synchronized manner to serve as a baseline for network nodes to dynamically adopt security features as per security requirements of these nodes. Hence, various security contexts are designed and categorized based on the nature of information exchange between nodes, mainly, to offer authentication, secure and trustworthy communication services. These well-designed security contexts enable devices of different capabilities to securely communicate by using predefined security parameters and cryptographic functions. This eliminates the need to negotiate any secure communication parameters and hence results in less communication overhead. In addition, our approach is integrated with verifiable identities (Veidblock) concept which addresses privacy issues through anonymity. These security contexts are verified by using scyther by demonstrating that the trustworthiness is achieved by countering non-repudiation, impersonation, tampering, eavesdropping and replay attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, M., Qian, Y., Hao, Y., Li, Y., Song, J.: Data-driven computing and caching in 5G networks: architecture and delay analysis. IEEE Wirel. Commun. 25(1), 70–75 (2018)

    Article  Google Scholar 

  2. IEEE 5G and beyond technology roadmap. https://futurenetworks.ieee.org/images/files/pdf/ieee-5g-roadmap-white-paper.pdf. Accessed 13 June 2019

  3. Accenture Consulting. Tactile Internet enabled by pervasive networks. http://technodocbox.com/Computer_Networking/69821120-Tactile-internet-enabled-by-pervasive-networks.html. Accessed 12 Feb 2019

  4. van Kranenburg, R., Bassi, A.: IoT challenges. mUX: J. Mob. User Exp., 1–9 (2012). https://doi.org/10.1186/2192-1121-1-9

  5. Kreutz, D., Ramos, F., Veríssimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. IEEE. 103(1), 14–76 (2015)

    Article  Google Scholar 

  6. Truong, N.B., Lee, G.M., Ghamri-Doudane, Y.: Software defined networking-based vehicular Adhoc Network with Fog Computing. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada (2015)

    Google Scholar 

  7. Su, Z., Wang, T., Xia, Y., Hamdi, M.: CheetahFlow: towards low latency software-defined network. In: Proceedings of IEEE International Conference on Communications (ICC), Sydney, NSW, Australia (2014)

    Google Scholar 

  8. Requena, J.C., et al.: SDN and NFV integration in generalized mobile network architecture. In: Proceedings of European Conference on Networks and Communications (EuCNC), Paris, France (2015)

    Google Scholar 

  9. Abbasi, A.G., Khan, Z.: VeidBlock: verifiable identity using blockchain and ledger in a software defined network. In: Proceedings of SCCTSA2017 Co-located 10th IEEE/ACM Utility and Cloud Computing Conference, Austin, Texas, USA, pp. 173–179 (2017)

    Google Scholar 

  10. Kirichek, R.: 5G and Tactile Internet. Network and Services Decentralization. https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20160921/Documents/Presentations/S1_2_Ruslan_Kirichek_v3.pdf. Accessed 13 June 2019

  11. Hu, P., Dhelim, S., Ning, H., Qiu, T.: Survey on fog computing: architecture, key technologies, applications and open issues. J. Network Comput. Appl. 98, 27–42 (2017)

    Article  Google Scholar 

  12. Ramel, D.: SDN a game changer but slow out of the gate, survey shows. https://gcn.com/Articles/2015/01/13/SDN-adoption.aspx. Accessed 13 June 2019

  13. ETSI. Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance, https://www.etsi.org/deliver/etsi_gr/NFV-SEC/001_099/003/01.02.01_60/gr_nfv-sec003v010201p.pdf. Accessed 13 June 2019

  14. ETSI. Network Functions Virtualisation (NFV); NFV Security; Problem Statement, http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdf. Accessed 13 June 2019

  15. Wen, X., Chen, Y., Hu, C., Shi, C., Wang, Yi.: Towards a secure controller platform for openflow applications. In: Proceedings of 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2013), Hong Kong, China, pp. 171–172 (2013)

    Google Scholar 

  16. Wasserman, M., Hartman, S., Zhang, D.: Security analysis of the Open Networking Foundation (ONF) OpenFlow Switch Specification. https://tools.ietf.org/id/draft-mrw-sdnsec-openflow-analysis-00.html. Accessed 12 June 2019

  17. Szabo, D., Gulyas, A., Fitzek, F.H., Lucani, D.E.: Towards the tactile internet: decreasing communication latency with network coding and software defined networking. In: Proceedings of 21st European Wireless Conference, Budapest, Hungary, pp. 1–6 (2015)

    Google Scholar 

  18. Liyanage, M., et al.: Enhancing security of software defined mobile networks. IEEE Access 5, 9422–9438 (2017)

    Article  Google Scholar 

  19. Parno, B., Perrig, A.: Challenges in securing vehicular networks. https://netsec.ethz.ch/publications/papers/cars.pdf. Accessed 13 June 2019

  20. Al-Raba’nah, Y., Samara, G.: Security Issues in Vehicular Ad Hoc Networks (VANET): a survey. Int. J. Sci. Appl. Res. 2(4), 50–55 (2015)

    Google Scholar 

  21. Zaidi, K., Rajarajan, M.: Vehicular internet: security & privacy challenges and opportunities. Future Internet 7, 257–275 (2015)

    Article  Google Scholar 

  22. Qu, F., Wu, Z., Wang, F.-Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)

    Article  Google Scholar 

  23. Shrestha, R., Bajarachary, R., Nam, S.Y.: Challenges of future VANET and cloud-based approaches. Hindawi Wirel. Commun. Mob. Comput. 2018, 15 (2018)

    Google Scholar 

  24. Sugumar, R., Rengarajan, A., Jayakumar, C.: Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wirel. Netw. 24(2), 373–382 (2018)

    Article  Google Scholar 

  25. Kaiser, C., Steger, M., Dorri, A., Festl, A., Stocker, A., Fellmann, M., Kanhere, S.: Towards a privacy-preserving way of vehicle data sharing – a case for blockchain technology? In: Dubbert, J., Müller, B., Meyer, G. (eds.) AMAA 2018. LNM, pp. 111–122. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-99762-9_10

    Chapter  Google Scholar 

  26. Sharma, P.K., Moon, S.Y., Park, J.H.: Block-VN: a distributed blockchain based vehicular network architecture in smart city. J. Inform. Process. Syst. 13(1), 184–195 (2017)

    Google Scholar 

  27. Bogue, R.: Towards the trillion sensors market. Sens. Rev. 34(2), 137–142 (2014)

    Article  Google Scholar 

  28. Aijaz, A., Sooriyabandara, M.: The tactile internet for industries: a review. IEEE 107(2), 414–435 (2018). https://doi.org/10.1109/JPROC.2018.2878265

    Article  Google Scholar 

  29. Varghese, B., Wang, N., Barbhuiya, S., Kilpatrick, P., Nikolopoulos, D.S.: Challenges and opportunities in edge computing. In: IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA (2016). https://doi.org/10.1109/smartcloud.2016.18

  30. Sezer, S., et al.: Are we ready for SDN? implementation challenges for software-defined networks. IEEE Commun. Mag. 51(7), 36–43 (2013)

    Article  Google Scholar 

Download references

Acknowledgment

This research activity is partially supported by TOUCHES ICT-TNG project and KP for Cybersecurity at RISE. We are also thankful to prof. Panos for technical discussion on initial topic at KTH.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdul Ghafoor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghafoor, A., Abbasi, A.Q., Khan, Z. (2019). Towards Trusted Security Context Exchange Protocol for SDN Based Low Latency Networks. In: Romanovsky, A., Troubitsyna, E., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2019. Lecture Notes in Computer Science(), vol 11698. Springer, Cham. https://doi.org/10.1007/978-3-030-26601-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26601-1_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26600-4

  • Online ISBN: 978-3-030-26601-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics