AID Shuffling Mechanism Based on Group-Buying Auction for Identifier Network Security

Identifier network is one of promising network architectures to solve IP dual-property issues by separating network into access network and core network. The key design is the identifier/location separation mechanism which introduces user accessing address space and network routing address space to represent the identifier and location of terminal, respectively. The core network can prevent the cyber attacks by controlling the mapping relationship between Accessing IDentifier (AID) and Routing IDentifier (RID) via the mapping system. While the access network is facing serious security problems which makes it easily to be attacked. Therefore, this work focuses on access network security and studies AID shuffling mechanism by randomizing identifier through virtual AID. However, how the mapping servers allocate virtual AID to terminals in a reasonable way is quite difficult. To solve this problem, we propose an AID shuffling mechanism based on Group-buying Auction for Identifier Network (GAIN) among mapping servers, accessing switching routers and terminals. First, GAIN decides a group bid for each group leader and the winning virtual AID range for each group. Second, the mapping servers allocate the identifier for each terminal. Third, GAIN determines how much each winning group leaders should pay for virtual AID range to each mapping server in the winning group. We evaluate the identifier assignment of GAIN in terms of rationality, budget balance, computational tractability and truthfulness. The large-scale simulations are performed to evaluate GAIN, and the results are presented to verify the effectiveness and efficiency by comparing with other state-of-the-art approaches.

[1]  Ilsun You,et al.  GRBC-based Network Security Functions placement scheme in SDS for 5G security , 2018, J. Netw. Comput. Appl..

[2]  Joseph G. Tront,et al.  Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid , 2014, CISR '14.

[3]  Hongke Zhang,et al.  GBC-based caching function group selection algorithm for SINET , 2017, J. Netw. Comput. Appl..

[4]  Qian Zhang,et al.  Groupon in the Air: A three-stage auction framework for Spectrum Group-buying , 2013, 2013 Proceedings IEEE INFOCOM.

[5]  Md Zakirul Alam Bhuiyan,et al.  A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing , 2019, IEEE Internet of Things Journal.

[6]  Justin Yackoski,et al.  Moving Target Defense: a Journey from Idea to Product , 2016, MTD@CCS.

[7]  Jiankun Hu,et al.  Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.

[8]  Azer Bestavros,et al.  Markov Modeling of Moving Target Defense Games , 2016, MTD@CCS.

[9]  Shui Yu,et al.  Enhancing Vehicular Communication Using 5G-Enabled Smart Collaborative Networking , 2017, IEEE Wireless Communications.

[10]  Hongke Zhang,et al.  Improving Onboard Internet Services for High-Speed Vehicles by Multipath Transmission in Heterogeneous Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[11]  Wei Quan,et al.  A SINET-based communication architecture for Smart Grid , 2015, 2015 International Telecommunication Networks and Applications Conference (ITNAC).

[12]  Hongke Zhang,et al.  Smart Collaborative Identifier Network , 2016, Springer Berlin Heidelberg.

[13]  Yanmin Zhu,et al.  Group Buying Based Incentive Mechanism for Mobile Crowd Sensing , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[14]  Dejun Yang,et al.  Group Buying Spectrum Auctions in Cognitive Radio Networks , 2017, IEEE Transactions on Vehicular Technology.

[15]  Anh Nguyen-Tuong,et al.  Effectiveness of Moving Target Defenses , 2011, Moving Target Defense.

[16]  Yu Wang,et al.  Mitigating Interference via Power Control for Two-Tier Femtocell Networks: A Hierarchical Game Approach , 2019, IEEE Transactions on Vehicular Technology.

[17]  Hongke Zhang,et al.  Enhancing Crowd Collaborations for Software Defined Vehicular Networks , 2017, IEEE Communications Magazine.

[18]  Yu Wang,et al.  Delay-Constrained Utility Maximization for Video Ads Push in Mobile Opportunistic D2D Networks , 2018, IEEE Internet of Things Journal.

[19]  Scott A. DeLoach,et al.  A Theory of Cyber Attacks: A Step Towards Analyzing MTD Systems , 2015, MTD@CCS.

[20]  Daniel A. Menascé,et al.  Performance Modeling of Moving Target Defenses , 2017, MTD@CCS.

[21]  Hongke Zhang,et al.  Incentive mechanism for computation offloading using edge computing: A Stackelberg game approach , 2017, Comput. Networks.

[22]  Joshua Taylor,et al.  A Quantitative Framework for Moving Target Defense Effectiveness Evaluation , 2015, MTD@CCS.

[23]  Chunming Qiao,et al.  Smart identifier network: A collaborative architecture for the future internet , 2016, IEEE Network.

[24]  Yi Lin,et al.  Preventing DDoS attacks by identifier/locator separation , 2013, IEEE Network.

[25]  Ke Xu,et al.  SI-STIN: A Smart Identifier Framework for Space and Terrestrial Integrated Network , 2019, IEEE Network.

[26]  Xuan Liu,et al.  Design and Implementation of a Central-Controllable and Secure Multicast System Based on Universal Identifier Network , 2018, Sensors.

[27]  Mohsen Guizani,et al.  Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.

[28]  Luo Hongbin Fundamental Research on Theories of Smart and Cooperative Networks , 2013 .

[29]  Jianfeng Guan,et al.  When Group Buying Meets Wi-Fi Advertising , 2018, 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC).

[30]  Thomas E. Carroll,et al.  Analysis of network address shuffling as a moving target defense , 2014, 2014 IEEE International Conference on Communications (ICC).

[31]  Zhang Hong-ke Research on Universal Network Supporting Pervasive Services , 2007 .

[32]  Romano Fantacci,et al.  IoT Security via Address Shuffling: The Easy Way , 2019, IEEE Internet of Things Journal.

[33]  Scott A. DeLoach,et al.  A model for analyzing the effect of moving target defenses on enterprise networks , 2014, CISR '14.

[34]  Md Zakirul Alam Bhuiyan,et al.  Fog-Based Computing and Storage Offloading for Data Synchronization in IoT , 2019, IEEE Internet of Things Journal.

[35]  Joseph G. Tront,et al.  Implementing an IPv6 Moving Target Defense on a Live Network , 2012 .

[36]  Lin Yang,et al.  Effectiveness Evaluation Model of Moving Target Defense Based on System Attack Surface , 2019, IEEE Access.