SDN security control and forwarding method based on cipher identification

Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identi...

Full description

Saved in:
Bibliographic Details
Main Authors: Xi QIN, Guodong TANG, Chaowen CHANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018022/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539446616358912
author Xi QIN
Guodong TANG
Chaowen CHANG
author_facet Xi QIN
Guodong TANG
Chaowen CHANG
author_sort Xi QIN
collection DOAJ
description Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.
format Article
id doaj-art-9cd8a39baae04b3aab6fe874d71cc90a
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-9cd8a39baae04b3aab6fe874d71cc90a2025-01-14T07:14:13ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-02-0139314259716359SDN security control and forwarding method based on cipher identificationXi QINGuodong TANGChaowen CHANGAimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018022/software defined networkingcipher identificationsecurity control and forwardingflow table matching
spellingShingle Xi QIN
Guodong TANG
Chaowen CHANG
SDN security control and forwarding method based on cipher identification
Tongxin xuebao
software defined networking
cipher identification
security control and forwarding
flow table matching
title SDN security control and forwarding method based on cipher identification
title_full SDN security control and forwarding method based on cipher identification
title_fullStr SDN security control and forwarding method based on cipher identification
title_full_unstemmed SDN security control and forwarding method based on cipher identification
title_short SDN security control and forwarding method based on cipher identification
title_sort sdn security control and forwarding method based on cipher identification
topic software defined networking
cipher identification
security control and forwarding
flow table matching
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018022/
work_keys_str_mv AT xiqin sdnsecuritycontrolandforwardingmethodbasedoncipheridentification
AT guodongtang sdnsecuritycontrolandforwardingmethodbasedoncipheridentification
AT chaowenchang sdnsecuritycontrolandforwardingmethodbasedoncipheridentification