Mobile Networks and Applications

, Volume 20, Issue 1, pp 105–110 | Cite as

Secure Communication over Software-Defined Networks

  • Stefan RassEmail author
  • Benjamin Rainer
  • Matthias Vavti
  • Johannes Göllner
  • Andreas Peer
  • Stefan Schauer


We report on work in progress towards a practical implementation of a software defined overlay network that provides data delivery services at a freely definable and provably optimized quality of service. Our example implementation establishes transparent secure transmission, where security is in terms of confidentiality, authenticity and availability. Using general techniques from game-theory, we show how to simultaneously optimize several performance indicators of a transmission service, taking care of interdependencies and using security as a showcase application.


Communication Security Pareto-optimality Game theory 



This work was supported by the Austrian Research Promotion Agency (FFG) under project “RSB”, grant no. 836287.


  1. 1.
    Abbas A (2009) A hybrid protocol for identification of a maximal set of node disjoint paths. Int Arab J Inform Technol (IAJIT) 6(4):344–358Google Scholar
  2. 2.
    Alpcan T, Başar T (2010) Network security: a decision and game theoretic approach. Cambridge University PressGoogle Scholar
  3. 3.
    Djukic P, Valaee S (2006) Reliable packet transmissions in multipath routed wireless networks. IEEE Trans Mob Comput 5:548–559. doi: 10.1109/TMC.2006.72 CrossRefGoogle Scholar
  4. 4.
    Finley K (2014) Online security is a total pain, but that may soon change. [online]
  5. 5.
    Fitzi M, Franklin MK, Garay J, Vardhan SH (2007) Towards optimal and efficient perfectly secure message transmission. In: Vadhan S (ed) 4th Theory of cryptography conference (TCC), Lecture Notes in Computer Science LNCS 4392. Springer, pp 311–322Google Scholar
  6. 6.
    Kotzanikolaou P, Mavropodi R, Douligeris C (2005) Secure multipath routing for mobile ad hoc networks. In: International conference on wireless on demand network systems and service. IEEE Computer Society, Los Alamitos, pp 89–96Google Scholar
  7. 7.
    Li Z, Kwok YK (2005) A new multipath routing approach to enhancing TCP security in ad hoc wireless networks. In: International conference workshops on parallel processing, pp 372–379Google Scholar
  8. 8.
    Nunes B, Mendonca M, Nguyen X, Obraczka K, Turletti T (2014) A survey of software-defined networking: past, present, and future of programmable networks. Commun Surv Tutorials, IEEE PP(99):1–18. doi: 10.1109/SURV.2014.012214.00180 Google Scholar
  9. 9.
    Rass S (2013) On game-theoretic network security provisioning. Springer J Netw Syst Manag 21(1):47–64. doi: 10.1007/s10922-012-9229-1 CrossRefGoogle Scholar
  10. 10.
    Rass S, Rainer B, Vavti M, Schauer S (2013) A network modeling and analysis tool for perfectly secure communication. In: Proceedings of the 27th IEEE international conference on advanced information networking and applications, pp. 267–275. IEEE Computer Society Press. (in press)Google Scholar
  11. 11.
    Rass S, Schartner P (2010) Multipath authentication without shared secrets and with applications in quantum networks. In: Proceedings of the international conference on security and management (SAM), vol. 1. CSREA Press, pp 111–115Google Scholar
  12. 12.
    Sela A (1999) Fictitious play in ’one-against-all’ multi-player games. Economic Theory 14:635–651. doi: 10.1007/s001990050345 CrossRefzbMATHMathSciNetGoogle Scholar
  13. 13.
    Singh V, Ahsan S, Ott J (2013) Mprtp: Multipath considerations for real-time media. ACM multimedia systems conferenceGoogle Scholar
  14. 14.
    Voorneveld M (1999) Pareto-optimal security strategies as minimax strategies of a standard matrix game. J. Optim. Theory Appl. 102(1):203–210CrossRefzbMATHMathSciNetGoogle Scholar
  15. 15.
    Wen H, Lin C, Yang H, Ren F, Yue Y (2007) Modeling the reliability of packet group transmission in wireless networkGoogle Scholar
  16. 16.
    Zhao L, Delgado-Frias J (2006) Multipath routing based secure data transmission in ad hoc networks. IEEE Int Conf Wirel Mob Comput Netw Commun 17–23. doi: 10.1109/WIMOB.2006.1696359

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • Stefan Rass
    • 1
    Email author
  • Benjamin Rainer
    • 1
  • Matthias Vavti
    • 1
  • Johannes Göllner
    • 2
  • Andreas Peer
    • 2
  • Stefan Schauer
    • 3
  1. 1.Alpen-Adria-Universität KlagenfurtKlagenfurtAustria
  2. 2.National Defence Academy of the Austrian Federal Ministry of Defence and SportsWienAustria
  3. 3.AIT Austrian Institute of Technology GmbHKlagenfurtAustria

Personalised recommendations