Towards trusted security context exchange protocol for sdn based low latency networks
2019 (English)In: International Conference on Computer Safety, Reliability, and Security SAFECOMP 2019: Computer Safety, Reliability, and Security, Springer Verlag , 2019, p. 286-298Conference paper, Published paper (Refereed)
Abstract [en]
To overcome the latency issue in real-time communication, a number of research based solutions and architectures are being proposed. In all these, security is not considered an important factor since it causes extra delay in the communication and introduces overhead. Therefore, a design decision is needed to assess tradeoff between efficiency and security mechanisms. In this respect, we designed a security approach in Software Defined Networks (SDN) based Vehicular Autonomous Ad hoc Network (VANET) where low latency and security are essential elements. VNAET provides a system of systems approach where various hybrid solutions are integrated and installed on number of network nodes managed by SDN. In such networks, our novel approach exchanges security context in a synchronized manner to serve as a baseline for network nodes to dynamically adopt security features as per security requirements of these nodes. Hence, various security contexts are designed and categorized based on the nature of information exchange between nodes, mainly, to offer authentication, secure and trustworthy communication services. These well-designed security contexts enable devices of different capabilities to securely communicate by using predefined security parameters and cryptographic functions. This eliminates the need to negotiate any secure communication parameters and hence results in less communication overhead. In addition, our approach is integrated with verifiable identities (Veidblock) concept which addresses privacy issues through anonymity. These security contexts are verified by using scyther by demonstrating that the trustworthiness is achieved by countering non-repudiation, impersonation, tampering, eavesdropping and replay attacks.
Place, publisher, year, edition, pages
Springer Verlag , 2019. p. 286-298
Keywords [en]
Context, SDN, Security attributes, Trust, VANET, Verifiable identities, Cryptography, Network protocols, Security systems, Vehicular ad hoc networks, Network security
National Category
Natural Sciences
Identifiers
URN: urn:nbn:se:ri:diva-40536DOI: 10.1007/978-3-030-26601-1_20Scopus ID: 2-s2.0-85072862847ISBN: 9783030266004 (print)OAI: oai:DiVA.org:ri-40536DiVA, id: diva2:1361933
Conference
International Conference on Computer Safety, Reliability, and Security SAFECOMP 2019: Computer Safety, Reliability, and Securitypp 286-298
Note
Funding text 1: This research activity is partially supported by TOUCHES ICT-TNG project and KP for Cybersecurity at RISE. We are also thankful to prof. Panos for technical discussion on initial topic at KTH.
2019-10-172019-10-172023-05-08Bibliographically approved