Abstract
With the development of SDN, the problems of low efficiency of file transfer and limited network capacity in traditional network will be solved. However, due to the lack of protection mechanism in SDN application layer, data is easy to be lost and attacked. In this paper, the application layer and blockchain are combined to make full use of the unchangeable characteristics of blockchain data. A method of SDWN attack detection based on blockchain is proposed. The control layer controls the function of data distribution and access control. Then, the existing security problems are analyzed. Through the comparison between the methods in this paper and attack defense methods, several SDWN network security check methods are analyzed. It is found that this paper has better performance in the quality of experience (QoE) and network security performance, which will improve the controllability, flexibility and security of the network.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Liang, W., Fan, Y., Li, C., Zhang, D., Gaudiot, J.-L.: Secure data storage and recovery in industrial blockchain network environments. IEEE Trans. Ind. Inform. 16(10), 6543–6552 (2020). https://doi.org/10.1109/tii.2020.2966069
Liang, W., Xie, S., Long, J., et al.: A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Inf. Sci. 503, 129–147 (2019)
Liang, W., Huang, W., Long, J., Zhang, K., Li, K., Zhang, D.: Deep reinforcement learning for resource protection and real-time detection in loT environment. IEEE Internet Things J. 1 (2020). https://doi.org/10.1109/jiot.2020.2974281
McKeown, N.: Software-defined networking. INFOCOM Keynote Talk 17(2), 30–32 (2009)
Costanzo, S., et al.: Software defined wireless networks: unbridling SDNs. In: 2012 European Workshop on Software Defined Networking. IEEE (2012)
McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)
Kreutz, D., Ramos, F.M.V., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (2013)
Monsanto, C., et al.: Composing software defined networks. In: 10th {USENIX} Symposium on Networked Systems Design and Implementation {NSDI} 2013 (2013)
Wu, J., et al.: Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(1), 27–38 (2018)
Bernardos, C.J., et al.: An architecture for software defined wireless networking. IEEE Wirel. Commun. 21(3), 52–61 (2014)
Zhou, Q., et al.: Network virtualization and resource description in software-defined wireless networks. IEEE Commun. Mag. 53(11), 110–117 (2015)
Liang, C., et al.: Enhancing QoE-aware wireless edge caching with software-defined wireless networks. IEEE Trans. Wirel. Commun. 16(10), 6912–6925 (2017)
Yan, Z., Zhang, P., Vasilakos, A.V.: A security and trust framework for virtualized networks and software-defined networking. Secur. Commun. Netw. 9(16), 3059–3069 (2016)
Shu, Z., et al.: Security in software-defined networking: threats and countermeasures. Mob. Netw. Appl. 21(5), 764–776 (2016)
Graubner, P., et al.: Dynamic role assignment in software-defined wireless networks. In: 2017 IEEE Symposium on Computers and Communications (ISCC). IEEE (2017)
Moura, H., et al.: Ethanol: a software-defined wireless networking architecture for IEEE 802.11 networks. Comput. Commun. 149, 176–188 (2020)
Mao, B., et al.: A novel non-supervised deep-learning-based network traffic control method for software defined wireless networks. IEEE Wirel. Commun. 25(4), 74–81 (2018)
Liang, W., Li, K., Long, J., Kui, X., Zomaya, Y.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Industr. Inf. 16(3), 2063–2071 (2019). https://doi.org/10.1109/TII.2019.2946791
He, D., Chan, S., Guizani, M.: Securing software defined wireless networks. IEEE Commun. Mag. 54(1), 20–25 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xiao, L., Gao, Y., Liu, B., Fang, T. (2020). An Attack Detection and Defense Method for SDWN Oriented Blockchain Network. In: Zheng, Z., Dai, HN., Fu, X., Chen, B. (eds) Blockchain and Trustworthy Systems. BlockSys 2020. Communications in Computer and Information Science, vol 1267. Springer, Singapore. https://doi.org/10.1007/978-981-15-9213-3_19
Download citation
DOI: https://doi.org/10.1007/978-981-15-9213-3_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9212-6
Online ISBN: 978-981-15-9213-3
eBook Packages: Computer ScienceComputer Science (R0)