Skip to main content

Research of the Influence of Compromise Probability in Secure Based Traffic Engineering Model in SDN

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 83))

Abstract

The paper is devoted to the research of the influence the probability of compromise in Secure Based Traffic Engineering Model in software-defined networks. The flow-based mathematical model under investigation is a further development of the classical Traffic Engineering model. The novelty of the secure based model is the modification of the load balancing conditions for obtaining the routing solution in the software-defined network data plane, which considers not only the network topology, traffic characteristics, and bandwidth of communication links, but also the probability of compromise the network links. As a result, the obtained routing solutions reduced the load on communication links, which have a high probability of compromise, by redirecting traffic to more secure ones. Comparison of Traffic Engineering and secure based Traffic Engineering solutions with different variants of functional dependence of weighting coefficients on the probability of compromise has been performed. The numerical example demonstrates the efficiency of the advanced secure based load balancing model and the adequacy of the obtained order of routing.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gupta, S.: Security and QoS in Wireless Sensor Networks. 1st edn. eBooks2go Inc. (2018)

    Google Scholar 

  2. Kiser, Q.: Computer Networking and Cybersecurity: A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security Threats. Kindle Edition (2020)

    Google Scholar 

  3. Revathi, S., Geetha, A.: A survey of applications and security issues in software defined networking. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(3), 21–28 (2017). https://doi.org/10.5815/ijcnis.2017.03.03

    Article  Google Scholar 

  4. Lemeshko, O.V., Yevseyeva, O.Y., Garkusha, S.V.: A tensor model of multipath routing based on multiple QoS metrics. In: 2013 International Siberian Conference on Control and Communications (SIBCON) Proceedings, pp. 1–4. IEEE (2013). https://doi.org/10.1109/SIBCON.2013.6693645

  5. Yeremenko, O., Lemeshko, O., Persikov, A.: Secure routing in reliable networks: proactive and reactive approach. In: Shakhovska, N., Stepashko, V. (eds.) CSIT 2017. AISC, vol. 689, pp. 631–655. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-70581-1_44

    Chapter  Google Scholar 

  6. Shaik, M.S., Mira, F.: A comprehensive mechanism of MANET network layer based security attack prevention. Int. J. Wirel. Microw. Technol. (IJWMT) 10(1), 38–47 (2020). https://doi.org/10.5815/ijwmt.2020.01.04

    Article  Google Scholar 

  7. Shashi, R.K., Siddesh, G.K.: QoS oriented cross-synch routing protocol for event driven, mission-critical communication over MANET: Q-CSRPM. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(11), 18–30 (2018). https://doi.org/10.5815/ijcnis.2018.11.03

    Article  Google Scholar 

  8. Palani, U., Amuthavalli, G., Alamelumangai, V.: Secure and load-balanced routing protocol in wireless sensor network or disaster management. IET Inf. Secur. 14(5), 513–520 (2020). https://doi.org/10.1049/iet-ifs.2018.5057

    Article  Google Scholar 

  9. Patil, M.V., Jadhav, V.: Secure, reliable and load balanced routing protocols for multihop wireless networks. In: 2017 International Conference on Intelligent Computing and Control (I2C2) Proceedings, pp. 1–6. IEEE (2017). https://doi.org/10.1109/I2C2.2017.8321936

  10. Kumar, N., Singh, Y.: Trust and packet load balancing based secure opportunistic routing protocol for WSN. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) Proceedings, pp. 463–467. IEEE (2017). https://doi.org/10.1109/ISPCC.2017.8269723

  11. Li, S., Zhao, S., Wang, X., Zhang, K., Li, L.: Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Syst. J. 8(3), 858–867 (2013). https://doi.org/10.1109/JSYST.2013.2260626

    Article  Google Scholar 

  12. Lemeshko, O., Yeremenko, O., Yevdokymenko, M., Shapovalova, A., Hailan, A.M., Mersni, A.: Cyber resilience approach based on traffic engineering fast reroute with policing. In: 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) Proceedings, vol. 1, pp. 117–122. IEEE (2019). https://doi.org/10.1109/IDAACS.2019.8924294

  13. Lin, S.C., Wang, P., Luo, M.: Control traffic balancing in software defined networks. Comput. Netw. 106, 260–271 (2016)

    Article  Google Scholar 

  14. Lemeshko, O., Yeremenko, O.: Enhanced method of fast re-routing with load balancing in software-defined networks. J. Electr. Eng. 68(6), 444–454 (2017). https://doi.org/10.1515/jee-2017-0079

    Article  Google Scholar 

  15. Lemeshko, O., Yeremenko, O.: Linear optimization model of MPLS Traffic Engineering Fast ReRoute for link, node, and bandwidth protection. In: 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET) Proceedings, pp. 1009–1013. IEEE (2018). https://doi.org/10.1109/TCSET.2018.8336365

  16. Mendiola, A., Astorga, J., Jacob, E., Higuero, M.: A survey on the contributions of software-defined networking to traffic engineering. IEEE Commun. Surv. Tutor. 19(2), 918–953 (2017). https://doi.org/10.1109/COMST.2016.2633579

    Article  Google Scholar 

  17. Blokdyk, G.: Software-Defined WAN SD-WAN A Clear and Concise Reference. 5STARCooks (2018)

    Google Scholar 

  18. Kellerer, W., Kalmbach, P., Blenk, A., Basta, A., Reisslein, M., Schmid, S.: Adaptable and data-driven softwarized networks: review, opportunities, and challenges. Proc. IEEE 107(4), 711–731 (2019). https://doi.org/10.1109/JPROC.2019.2895553

    Article  Google Scholar 

  19. Abdullah, M.Z., Al-awad, N.A., Hussein, F.W.: Evaluating and comparing the performance of using multiple controllers in software defined networks. Int. J. Mod. Educ. Comput. Sci. 11(8), 27–34 (2019). https://doi.org/10.5815/ijmecs.2019.08.03

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oleksandra Yeremenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lemeshko, O., Hu, Z., Shapovalova, A., Yeremenko, O., Yevdokymenko, M. (2021). Research of the Influence of Compromise Probability in Secure Based Traffic Engineering Model in SDN. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education IV. ICCSEEA 2021. Lecture Notes on Data Engineering and Communications Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-030-80472-5_5

Download citation

Publish with us

Policies and ethics