SDN authentication method based on trust management

A technology of trust management and authentication method, applied in the field of software-defined network SDN security authentication, can solve the problems of security destruction, damage, hardware interface attack, etc., to achieve the effect of authentication and use authorization, good security

Active Publication Date: 2017-04-05
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the identity authentication method based on hardware equipment, if the equipment does not use a secure password algorithm to protect user identity information, it is easy to be attacked, stolen and copied by hackers who are familiar with the hardware interface; while identity authentication based on cryptographic technology, if the password is stored in software, The security of the password itself is easily damaged by Trojan horses or viruses, and there is a risk of being copied or maliciously damaged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SDN authentication method based on trust management
  • SDN authentication method based on trust management
  • SDN authentication method based on trust management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0061] Such as figure 2 Shown, a kind of SDN authentication method based on trust management, described method comprises:

[0062] (1) Build an SDN authentication and authorization model based on trust management; figure 1 shown.

[0063] The core idea of ​​the SDN authentication and authorization model is to uniformly manage the user's operations on the SDN server, standardize the SDN authentication and authorization methods for users, and improve the security of the entire system. Considering the looseness and occasionality among the various layers of the SDN network, the SDN authentication and authorization model is a distributed architecture, which is placed in the network area; in order to realize the unified operation and management of the SDN controller by the user.

[0064] Its construction methods include: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a SDN authentication method based on trust management. The method includes the following steps: combining cryptology with hardware devices, establishing a SDN authentication model based on trust management; acquiring access authority through single point sign in; with the proviso of evaluating access safety level and allocating limit session time for a user, establishing a TMUAM mechanism; and authenticating the user. The method can control abnormal behaviors and threats by evaluating the user and terminal behaviors, and addresses the safety hazards of a SDN controller.

Description

technical field [0001] The invention relates to a software-defined network SDN security authentication method, in particular to an SDN authentication method based on trust management. Background technique [0002] Software defined network SDN (software defined network, SDN) decouples the data plane from the control plane, making application upgrades and device updates independent of each other, which is beneficial for users and operators to obtain global information and control the entire network more flexibly. However, the introduction of SDN open interfaces will generate a new round of network attacks, such as controllers sending worms to switches, switches launching Ddos attacks on controllers, illegal users maliciously occupying the entire SDN network bandwidth, and so on. Therefore, it is necessary to propose a framework of secure authentication and access control mechanisms to enable the secure development of SDN networks. [0003] At present, the identity authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0823H04L63/0861H04L63/102
Inventor 黄辉刘川张刚郭经红梁云黄在朝张小建喻强虞跃娄征张增华陈磊王向群姚启桂陶静
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products