An SDN-based intermediate device path authentication method
A technology of intermediate equipment and authentication methods, applied in transmission systems, electrical components, etc., can solve problems such as real-time performance of packet-level detection granularity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0076] The present invention operates in the SDN environment. To build the SDN environment, the present invention adopts Open vSwitch as a switch, OpenDaylight as a controller, and performs simulation operation in Mininet. The intermediate device adopts the most widely used open source IPS / IDS—Snort, and its open source feature facilitates module addition. Before implementing this method, the flowtags application should be installed in the SDN. It should be noted that the mathematical symbols in the following text have been agreed in the "Content of the Invention" section and will not be described here.
[0077] Such as figure 1 As shown, an SDN-based intermediate device path authentication method specifically includes the following steps:
[0078] The S01 controller formulates the path according to user rules, and the adjacent intermediate device M on each path i , M i+1 (1≤ii,i+1 . the last intermediate device M on each path n On, distribute the key key n,e .
[007...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


