首页> 外文期刊>Internet of Things Journal, IEEE >Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks
【24h】

Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks

机译:从MitM攻击保护IoT–Fog网络的SDN基础架构安全

获取原文
获取原文并翻译 | 示例
           

摘要

While the Internet of Things (IoT) is making our lives much easier, managing the IoT becomes a big issue due to the huge number of connections, and the lack of protections for devices. Recent work shows that software-defined networking (SDN) has a great capability in automatically and dynamically managing network flows. Besides, switches in SDNs are usually powerful machines, which can be used as fog nodes simultaneously. Therefore, SDN seems a good choice for IoT–Fog networks. However, before deploying to IoT–Fog networks, the security of the OpenFlow channel between the controller and its switches need to be addressed. Since all the controller commands are sent through this channel, once compromised, the network will be completely controlled by an attacker. This is a disaster for both the network service providers and their customers. Previous works on SDN security either protect controllers themselves or make a strong assumption that the OpenFlow channel is already secured. Using TLS to encrypt the channel is not a “silver-bullet” solution due to the known TLS vulnerabilities. In this paper, we specifically investigate the potential threats of man-in-the-middle attacks on the OpenFlow control channel. We first introduce a feasible attack model in an IoT–Fog architecture, and then we implement attack demonstrations to show the severe consequences of such attacks. Additionally, we propose a lightweight countermeasure using Bloom filters. We implement a prototype for this method to monitor stealthy packet modifications. The result of our evaluation shows that our Bloom filter monitoring system is efficient and consumes few resources.
机译:尽管物联网(IoT)使我们的生活变得更加轻松,但是由于连接数量众多以及缺乏设备保护功能,物联网的管理成为一个大问题。最近的工作表明,软件定义网络(SDN)具有自动和动态管理网络流的强大功能。此外,SDN中的交换机通常是功能强大的机器,可以同时用作雾节点。因此,SDN似乎是物联网雾网络的不错选择。但是,在部署到IoT–Fog网络之前,需要解决控制器及其交换机之间的OpenFlow通道的安全性。由于所有控制器命令都是通过此通道发送的,因此一旦受到威胁,攻击者将完全控制网络。对于网络服务提供商及其客户而言,这都是一场灾难。之前有关SDN安全的工作要么保护控制器本身,要么强力假设OpenFlow通道已被保护。由于已知的TLS漏洞,使用TLS加密通道不是“银弹”解决方案。在本文中,我们专门研究OpenFlow控制通道上的中间人攻击的潜在威胁。我们首先在IoT-Fog架构中引入可行的攻击模型,然后实施攻击演示以展示此类攻击的严重后果。此外,我们提出了使用布隆过滤器的轻量级对策。我们为此方法实现了一个原型,以监视秘密数据包的修改。我们的评估结果表明,我们的Bloom过滤器监视系统高效且消耗很少的资源。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号