Unlock instant, AI-driven research and patent intelligence for your innovation.

SDN-based trusted inter-domain security authentication protocol

A security authentication and trustworthy technology, applied in the field of information security, can solve the problems of insufficient security of OpenFlow, the problem of mutual trust authentication between trusted domains, and the problem of network credibility, so as to avoid security threats and trust problems, The trusted network architecture is simple and the effect of avoiding replay attacks

Active Publication Date: 2017-01-25
BEIJING UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in terms of credibility, these network architectures are rarely mentioned, and the fundamental problem of network credibility is still not solved
[0006] Professor Nick McKeown of Stanford University proposed SDN based on the Clean Slate project, that is, the concept of software-defined network. Based on the concept of SDN, the network structure research was carried out, and key technologies such as OpenFlow and NOX were proposed. The network management and security functions based on OpenFlow mainly focus on the connection In terms of access control, traffic forwarding and load balancing, etc., the security issues in the design of OpenFlow are not enough, especially for the security protection of the controller node and the OpenFlow switch structure, and the mutual trust authentication between trusted domains under a single controller. not yet resolved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SDN-based trusted inter-domain security authentication protocol
  • SDN-based trusted inter-domain security authentication protocol
  • SDN-based trusted inter-domain security authentication protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Such as figure 1 , figure 2 As shown, the present invention designs a trusted network domain architecture model based on SDN, and further proposes a trusted inter-domain security authentication protocol based on SDN trusted domain without a trusted third party. In this design scheme, in order to solve the problem of mutual authentication between trusted domains with the same security level, sensitive information comparison is selected to complete the mutual trust authentication work. Therefore, from the perspective of trusted chain transmission, we can divide the security level, and use the trusted measurement module in the architecture to perform comparison and inspection of integrity measurement, so as to complete the work of mutual authentication. Using the controller communication module can solve the communication problem of controllers in different network domains, and provide the basis for mutual trust authentication. In order to ensure security, the protocol ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information safety and discloses a trusted inter-domain safety certificate protocol based on an SDN. Trusted network thought is fused into an OpenFlow network architecture under the SDN conception, so that the trusted and controllable safety purpose of the network architecture is achieved in the future. On the basis of establishing a trusted domain, the trusted inter-domain safety certification protocol without a trusted third party is provided, a challenge-response mode is adopted for the protocol, firstly, a certification requester getting access to a trusted network enters in an initial state, identity information is sent to a requested person, the requested person responds, own identity information is returned, and the requester and the requested person perform identity registration with each other; Secondly, certification requester and the requested person continue to adopt the challenge-response mode to negotiate trusted sensitive information, and through comparing Hash results of sensitive information PCR values and Hash results of random numbers, mutual trust certification is performed; finally, if the requester and the requested person respectively compare the Hash results, and the trusted requirement is met, certification is successful, and otherwise mutual trust certification fails.

Description

[0001] Technical field: [0002] The invention is a trusted inter-domain security authentication method based on the OpenFlow network architecture under the concept of SDN. It belongs to the field of information security. [0003] Background technique: [0004] With the rapid development of network technology and the continuous emergence of new applications, the Internet has gradually become an important part of the social economy. Under the traditional Internet network architecture, we assume that users are friendly and trustworthy, so the network system is only responsible for data transmission and does not require other control functions. This assumption is obviously no longer applicable to the current network environment. At present, the credibility problems faced by the network are becoming more and more prominent, such as: it is difficult to identify abnormal network behaviors, it is difficult to contain network sabotage activities, and so on. The most fundamental reaso...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 赖英旭周睿康刘静秦华李健
Owner BEIJING UNIV OF TECH