Hash Flow: An Access Control Mechanism for Software Defined Network

In recent years, increasingly complex business applications, IP communications systems and cloud services all place great demands on network architectures that weren’t originally designed to handle such workloads. As networks grow in complexity, network performance problems increase as well, increasingly inadequate. Network functions virtualization (NFV) enabled the implementation of these network functions using software and general computing equipment, rather than dedicated hardware. The deployment and management of NFV are facilitated by the use of software-defined networking (SDN). Therefore, In this paper, we design a practical access control mechanism for software defined network (SDN). We first introduce the current problem of end-to-end authentication problem in SDN, and then claim that both network and routing layers protocol will require data authentication improvement. Hence, this paper proposes a hash flow tagging mechanism, which combines hash function and flow tag advantages to protect end-to-end network intrusion and achieve high security in SDN. We sketch out the changes and extensions of a SDN network controller and switches to enable high security flow data. The complete design of a SDN architecture using hash table is an exciting avenue for end-to-end authentication. The evaluation result shows the proposed architecture can achieve better protection and remain high data throughput.

[1]  Rajeev Piyare,et al.  Multi-helper Relay Based WUSB/DRD/WLP Protocol in WiMedia Distributed MAC Systems , 2013 .

[2]  Yeonwoo Lee,et al.  Performance Evaluation of Ship Area Network with TDMA-Based HR-WPAN for an M2M Application , 2014, 2014 8th International Conference on Future Generation Communication and Networking.

[3]  Yeonwoo Lee,et al.  Performance Evaluation of a WiMedia based Wireless Bridge using Relay Cooperative Transmission , 2014 .

[4]  Simon Oechsner,et al.  Modeling and performance evaluation of an OpenFlow architecture , 2011, 2011 23rd International Teletraffic Congress (ITC).

[5]  Ya. A. Skorokhodov CUDA-Based Method to Boost Target Performance Evaluation of Space Systems for Automatic Mobile Object Identification and Localization , 2019, Programming and Computer Software.

[6]  Abdul Karim,et al.  Designing a constellation for AIS mission based on data acquisition of LAPAN-A2 and LAPAN-A3 satellites , 2019 .

[7]  Bin Lin,et al.  COMPARISON BETWEEN ARPA RADAR AND AIS CHARACTERISTICS FOR VESSEL TRAFFIC SERVICES , 2006 .

[8]  Takeshi Motohka,et al.  ALOS-4 current status , 2019, Remote Sensing.

[9]  Niko Balkenhol,et al.  Towards the restoration of the Mesoamerican Biological Corridor for large mammals in Panama: comparing multi-species occupancy to movement models , 2020, Movement ecology.

[10]  Srećko Krile,et al.  NMEA Communication Standard for Shipboard Data Architecture , 2013 .

[11]  Nico Bayer,et al.  OpenFlow for Wireless Mesh Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).