Skip to main content

Secure Communication over Software-Defined Networks

  • Conference paper
  • First Online:
Internet of Things. IoT Infrastructures (IoT360 2014)

Abstract

We report on work in progress towards a practical implementation of a software defined overlay network that provides data delivery services at a freely definable and provably optimized quality of service. Our example implementation establishes transparent secure transmission, where security is in terms of confidentiality, authenticity and availability. Using general techniques from game-theory, we show how to simultaneously optimize several performance indicators of a transmission service, taking care of interdependencies and using security as a showcase application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We deviate from the standard setting in enterprise security, where integrity replaces authenticity. However, since authenticity usually implies integrity on a technical level, we can safely go with our modified “definition” here.

  2. 2.

    Here, we neglect issues of IT administration to properly set up and run the underlying system, which may be far from a trivial task.

  3. 3.

    Actually, a rather simplified version of perfectly secure MPT, which splits a message m into a set of random strings so that their XOR recreates m. Despite there being much better practical protocols, in case of two-path transmissions, our scheme is isomorphic to a one-time pad and thus unbreakable. This security is, however, bought at a higher risk of communication failure in case that one or more packets get lost. Thus, the two goals “confidentiality” and “availability” are somewhat conflicting.

References

  1. Abbas, A.: A hybrid protocol for identification of a maximal set of node disjoint paths. Int. Arab J. Inf. Technol. (IAJIT) 6(4), 344–358 (2009)

    Google Scholar 

  2. Alpcan, T., Başar, T.: Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, New York (2010)

    Book  MATH  Google Scholar 

  3. Djukic, P., Valaee, S.: Reliable packet transmissions in multipath routed wireless networks. IEEE Trans. Mob. Comput. 5, 548–559 (2006). http://doi.ieeecomputersociety.org/10.1109/TMC.2006.72

    Article  Google Scholar 

  4. Finley, K.: Online security is a total pain, but that may soon change (2014). http://www.wired.com/2014/06/usable-security/

  5. Fitzi, M., Franklin, M., Garay, J., Vardhan, S.H.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 311–322. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Kotzanikolaou, P., Mavropodi, R., Douligeris, C.: Secure multipath routing for mobile ad hoc networks. In: International Conference on Wireless on Demand Network Systems and Service, pp. 89–96. IEEE Computer Society, Los Alamitos (2005).doi:http://doi.ieeecomputersociety.org/10.1109/WONS.2005.31

  7. Li, Z., Kwok, Y.K.: A new multipath routing approach to enhancing TCP security in ad hoc wireless networks. In: International Conference Workshops on Parallel Processing, pp. 372–379 (2005). doi: 10.1109/ICPPW.2005.11

  8. Nunes, B., Mendonca, M., Nguyen, X., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. In: Communications Surveys Tutorials, vol. (99), pp. 1–18. IEEE (2014). doi:10.1109/SURV.2014.012214.00180

  9. Rass, S.: On game-theoretic network security provisioning. J. Netw. Syst. Manage. 21(1), 47–64 (2013). http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s10922-012-9229-1

    Article  Google Scholar 

  10. Rass, S., Rainer, B., Vavti, M., Schauer, S.: A network modeling and analysis tool for perfectly secure communication. In: Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, pp. 267–275. IEEE Computer Society Press (2013, in press)

    Google Scholar 

  11. Rass, S., Schartner, P.: Multipath authentication without shared secrets andwith applications in quantum networks. In: Proceedings of the International Conference on Security and Management (SAM), vol. 1, pp. 111–115. CSREA Press (2010)

    Google Scholar 

  12. Sela, A.: Fictitious play in one-against-all multi-player games. Economic Theory 14, 635–651 (1999). doi:10.1007/s001990050345

  13. Singh, V., Ahsan, S., Ott, J.: MPRTP: multipath considerations for real-time media. ACM Multimedia Systems Conference (2013)

    Google Scholar 

  14. Voorneveld, M.: Pareto-optimal security strategies as minimax strategies of a standard matrix game. J. Optim. Theory Appl. 102(1), 203–210 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  15. Wen, H., Lin, C., Yang, H., Ren, F., Yue, Y.: Modeling the reliability of packet group transmission in wireless network (2007). http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.483

  16. Zhao, L., Delgado-Frias, J.: Multipath routing based secure data transmission in ad hoc networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communication, pp. 17–23 (2006). doi:http://doi.ieeecomputersociety.org/10.1109/WIMOB.2006.1696359

Download references

Acknowledgements

This work was supported by the Austrian Research Promotion Agency (FFG) under project grant no. 836287.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Rass .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Rass, S., Rainer, B., Vavti, M., Göllner, J., Peer, A., Schauer, S. (2015). Secure Communication over Software-Defined Networks. In: Giaffreda, R., Cagáňová, D., Li, Y., Riggio, R., Voisard, A. (eds) Internet of Things. IoT Infrastructures. IoT360 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 151. Springer, Cham. https://doi.org/10.1007/978-3-319-19743-2_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19743-2_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19742-5

  • Online ISBN: 978-3-319-19743-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics