BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain
Abstract
:1. Introduction
1.1. Motivation
- (1)
- Compared with SDN intradomain security service negotiation, since there is no unified authoritative center among SDN domains, SDN interdomain security service negotiation lacks trustworthiness; therefore, ensuring the trustworthiness of SDN interdomain security service negotiation is a challenge.
- (2)
- SDN interdomain environment communication lacks security, so ensuring the security of SDN interdomain security service negotiation is a second challenge.
- (3)
- Since security requirements are dynamically changing, how to negotiate security services automatically and in a timely manner to adapt to dynamically changing security requirements is a third challenge.
1.2. Proposed Solutions
1.3. Contributions
- (1)
- It utilizes smart contract technology to realize policy publishing, updating, and policy matching to ensure automatic and transparent security service negotiation.
- (2)
- It adopts a non-interactive key exchange and a message authentication code to ensure the confidentiality of the secure service negotiated on the blockchain.
- (3)
- It combines the blockchain transaction signature verification mechanism and the simple payment verification function (SPV) for receipt to realize secure and trustworthy security service negotiation in an untrustworthy environment.
- (4)
- Based on the account state mechanism of blockchain, it realizes automatic updating of policies and ensures the timeliness of policy negotiation; based on the blockchain storage structure, it builds a global and whole-process supervisory view for SDN interdomain security service negotiation.
2. Related Work
2.1. SDN-Based IPsec
2.2. SDN Multi-Domain Organization Architecture
2.3. Blockchain Applications in SDN
3. Overview of BSSN-SDNs
3.1. Threat Models of Security Service Negotiation in the SDN Interdomain
3.1.1. Security Service Negotiation Based on Data Plane
- (1)
- Eavesdropping security services: compromised or malicious forwarding nodes in the intradomain paths or switching nodes in the interdomain paths may eavesdrop on the negotiated security services.
- (2)
- Tampering security services: the compromised or malicious forwarding nodes in the intradomain paths or switching nodes in the interdomain paths are likely to tamper with the negotiated security services.
- (3)
- Identity forgery: all three types of adversaries may use a spoofed identity to send forged security service negotiation messages.
- (4)
- Security service negotiation message replay attack: all three types of adversaries are likely to replay security service messages.
- (1)
- Control plane is safe and secure.
- (2)
- Control plane to data plane southbound interface communication is secure.
- (3)
- Data plane packets are forwarded without facing malicious drops or path changes.
3.1.2. Security Service Negotiation Based on Control Plane
- (1)
- Eavesdropping security services: the compromised or malicious network nodes on the east-west links may eavesdrop on the negotiated security services.
- (2)
- Tampering security services: the compromised or malicious network nodes on the east-west links are likely to tamper with the negotiated security services.
- (3)
- Identity forgery: both types of adversaries may use a spoofed identity to send forged security service negotiation messages.
- (4)
- Security service negotiation message replay attack: both types of adversaries are likely to replay security service messages.
- (1)
- The control plane for each domain is reliable.
- (2)
- The communication within the control plane of a single domain is secure and trustworthy.
- (3)
- Control plane to data plane southbound interface communication is secure.
3.1.3. Security Service Negotiation Based on the Super Control Center
- (1)
- Eavesdropping security services: the network nodes on the links between the super control center and the domains may eavesdrop on the negotiated security services.
- (2)
- Tampering security services: the network nodes on the links between the super control center and the domains are likely to tamper with the negotiated security services.
- (3)
- Identity forgery: malicious or compromised domain controllers and network nodes on the links between the center and domain controllers may use a spoofed identity to send forged security service negotiation messages.
- (4)
- Security service negotiation message replay attack: malicious or compromised domain controllers and network nodes on the links between the center and domain controllers are likely to replay security service messages.
- (5)
- Management transparency and single points of failure: the compromised control center may confront problems of management transparency and single points of failure.
- (1)
- The control plane for each domain is reliable.
- (2)
- Communication within the control plane of a single domain is secure and trustworthy.
- (3)
- Control plane to data plane southbound interface communication is secure.
3.2. Reference Architecture of BSSN-SDNs
- (1)
- The blockchain management layer provides the security service negotiation function for the SDN interdomain communication, which mainly includes the security policy publication and update and the security service negotiation. The blockchain management layer is given as a logical schematic of a blockchain whose physical structure is a peer-to-peer network consisting of ledger nodes.
- (2)
- The control logic layer contains the original SDN controller, the extended security service negotiation functions and the blockchain client . The SDN controller interacts with the blockchain through the blockchain client, including transaction upload and receipt verification. The WE-bridge is an east-west interface for SDN controllers to interact with interdomain network topology.
- (3)
- The data-forwarding layer corresponds to the SDN data plane. The controller issues security services to the border switches in the data forwarding layer through the southbound interface. The border switch performs the corresponding security service for data packets based on the negotiated security service database . Then, the data packets with encapsulated security service identifiers are forwarded downstream by matching the OpenFlow flow table.
- (4)
- The connections between the blockchain client and the blockchain, as well as among the domain border gateway switches, are via traditional networks.
- (5)
- Within a single SDN domain, to enhance the resilience of the system and mitigate the single point of failure issue, multiple control nodes can be deployed on the control plane using distributed caches, like Redis, to implement active-standby or even multi-active configurations.
- (6)
- To guarantee the normal transmission of data within the SDN domain, it is presumed that the interactions within the control plane are secure and trusted and that the communication between the controller plane and the data plane is secure and trusted.
3.3. Definitions Related to BSSN-SDNs
3.4. Theoretical Model of BSSN-SDNs
- (1)
- indicates the SDN domains involved in security service negotiation.
- (2)
- denotes the federated blockchain, which is jointly maintained by the SDN domains.
- (3)
- denotes the transaction, specifically the security service negotiation transaction . It contains , where represents the transaction identifier, represents the timestamp, is the blockchain account address of the domain uploading this transaction, the is the signature of the account on the transaction, represents the secret state security policy set formulated by the source domain .
- (4)
- denotes the smart contract, specifically the security service negotiation smart contract . After the successful deployment of the smart contract, once the system meets the trigger conditions, will be automatically executed, which ensures that the security service negotiation process is automatic and transparent.
- (5)
- . After the security service negotiation smart contract achieves the negotiation result, it issues the secret state security service receipt to the relevant source domain and the destination domain. contains .
- (6)
- indicates the operations involved in , and the interaction between the two. Concretely, this includes uploading the transaction (upload), issuing the receipt (issue), formulating a local security policy (write), encrypting the security policy using a message authentication code (encrypt), publishing the secret state security policy (publish), updating the secret state security policy (update), matching the secret state security policy (match), validating the receipt (which can be conducted using a simple payment verification, SPV), and mapping the secret state security services to plaintext security services (map), etc.
3.5. Functional Module of BSSN-SDNs
- (1)
- : Write the security policies formulated by the administrator into the local policy repository through the security service negotiation engine; use the to generate that newly formulated security policies into secret state security policies and submit them to the smart contract invocation model; as well as match the ciphertext security policy with the receipt to obtain the corresponding plaintext security service and issue them to the controller.
- (2)
- : The smart contract invocation module encapsulates the secret state security policy into a security service negotiation transaction and uploads it to the blockchain, and performs SPV validation on the secret state security service receipts which issued by the blockchain.
- (3)
- : The blockchain receives the security service negotiation transaction and verifies the signature of the transaction; the legitimate transaction will automatically trigger the execution of the security service negotiation smart contract , realize the policy publishing and updating, and the interdomain secret state policy matching, and write the published and updated policies into the security policy ledger through the consensus mechanism; and it sends the matched secret state security service to the relevant SDN domains through the .
- (4)
- The controller can send the negotiated security services to the data plane through the southbound interface. In addition, the controller calculates the forwarding path based on the inter-domain topology obtained by the WE-Bridge and the intra-domain topology and sends the forwarding paths down to the data plane.
- (5)
- The data plane performs encryption and decryption operations for incoming data flow according to the security service parameters in , thus providing on-demand security services for SDN interdomain communication, and forwards the data flow based on the forwarding table.
3.6. Workflow of BSSN-SDNs
- (1)
- Security Policy Preprocessing Phase. Each SDN domain formulates the security policy from this domain to other domains and encrypts the security policy into a secret state security policy employing .
- (2)
- Security Service Negotiation Phase. Firstly, each SDN domain uploads the secret state security policy to the blockchain through the security service negotiation transaction , and then triggers the security service negotiation smart contract to automatically execute the secret state security policy publishing, updating, and matching, and finally sends the results of the security service negotiation to the relevant SDN domains through the secret state security service receipts .
- (3)
- Security Service Acquisition Phase. The blockchain clients within the SDN domain use SPV to verify the secret state security service receipts. If the verification is approved, the security service negotiation engine will map the ciphertext security policy in the receipt to the corresponding plaintext security service, thus acquiring the negotiated security service.
4. Security Service Negotiation on Blockchain
4.1. Confidentiality Protection for Security Service Negotiation on Blockchain
4.2. Smart Contracts for Security Service Negotiation on Blockchain
- (1)
- For each secret state security policy in the security policy set , obtain its domain identifications in , and obtain its serial number according to the domain identifications, then write the policy into which is the corresponding security policy storage unit of the SDN domain in the blockchain ledger. (steps 2–9).
- (2)
- Obtain the corresponding secret state security policy formulated by the destination domain from the security policy storage unit , then write it to a temporary variable . (step 10).
- (3)
- If is not empty, then the secret state security policies and are both sorted in descending order of security service priority (steps 11–13). And a match between and will be performed in steps 14–28.
- (4)
- The temporary variable mark is used to record the existence of a matching security service. (step 14).
- (5)
- For each security service in , starting from the highest priority, match each security service in in turn, and if there is a match, write it to the matched set of security policies and end the two-layer loop, otherwise, until the two-layer traversal is completed. (steps 15–28).
- (6)
- If the destination domain’s secret security policy on is empty, or there is no matching security service in the security policies of the source and destination domains, no operation will be performed on . (steps 29–30).
- (7)
- When each policy in the set has completed the above processing, the set of matched security policies is returned. (step 31).
Algorithm 1 |
Input: ; |
Output: ; |
1: ; |
2: for in |
3: |
4: |
5: if is null |
6: publish in |
7: else |
8: update by |
9: end if |
10: |
11: if |
12: |
13: |
14: mark = 0 |
15: for in |
16: for in |
17: if == |
18: |
19: mark++ |
20: break |
21: else |
22: continue |
23: end if |
24: end for |
25: if mark !=0 |
26: break |
27: end if |
28: end for |
29: end if |
30: end for |
31: return |
5. Discussions
5.1. Timeliness of Security Service Negotiation for BSSN-SDNs
5.2. Security and Trustworthiness of Security Service Negotiation for BSSN-SDNs
- (1)
- Eavesdropping attack.
- (2)
- Tampering attack.
- (3)
- Identity forgery.
- (4)
- Replay attacks.
- (5)
- Management transparency and single point of failure.
5.3. Comparison of BSSN-SDNs with Similar Schemes
6. Experiments and Evaluation
6.1. Simulation Setup
6.2. Experimental Results
6.2.1. Performance Evaluation of Blockchain-Based Security Service Negotiations
- Task 1: Time overhead of blockchain-based security service negotiation
- Task 2: the throughput and average time overhead of blockchain-based secure service negotiation
6.2.2. Performance Evaluation of Security Service Negotiation for SDN Interdomain
- Task 3: Total latency for two domains with different distances to complete a security service negotiation
- Task 4: Total latency for multiple domains to complete security service negotiation
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- McKeown, N. Software-defined networking. INFOCOM Keynote Talk. 2009, 17, 30–32. [Google Scholar]
- Flauzac, O.; González, C.; Hachani, A.; Nolot, F. SDN based Architecture for IoT and Improvement of the Security. In Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangju, Republic of Korea, 24–27 March 2015; pp. 688–693. [Google Scholar] [CrossRef]
- Nisar, K.; Jimson, E.R.; Hijazi, M.H.A.; Welch, I.; Hassan, R.; Aman, A.H.M.; Sodhro, A.H.; Pirbhulal, S.; Khan, S. A Survey on the Architecture, Application, and Security of Software Defined Networking: Challenges and Open Issues. Internet Things 2020, 12, 100289. [Google Scholar] [CrossRef]
- Rahman, A.; Islam, M.J.; Band, S.S.; Muhammad, G.; Hasan, K.; Tiwari, P. Towards a Blockchain-SDN-based Secure Architecture for Cloud Computing in Smart Industrial IoT. Digit. Commun. Netw. 2023, 9, 411–421. [Google Scholar] [CrossRef]
- Tong, W.; Dong, X.; Shen, Y.; Jiang, X.; Zhang, Z. A Blockchain-driven Data Exchange Model in Multi-domain IoT with Controllability and Parallelity. Future Gener. Comput. Syst. 2022, 135, 85–94. [Google Scholar] [CrossRef]
- Makhdoom, I.; Zhou, I.; Abolhasan, M.; Lipman, J.; Ni, W. PrivySharing: A Blockchain-based Framework for Privacy-preserving and Secure Data Sharing in Smart Cities. Comput. Secur. 2020, 88, 101653. [Google Scholar] [CrossRef]
- Siddiqui, S.; Hameed, S.; Shah, S.A.; Khan, A.K.; Aneiba, A. Smart Contract-based Security Architecture for Collaborative Services in Municipal Smart Cities. J. Syst. Archit. 2023, 135, 102802. [Google Scholar] [CrossRef]
- Singh, P.; Masud, M.; Hossain, M.S.; Kaur, A. Cross-domain Secure Data Sharing using Blockchain for industrial IoT. J. Parallel Distrib. Comput. 2021, 156, 176–184. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 25 March 2024).
- Yang, Z.; Wang, R.; Wu, D.; Yang, B.; Zhang, P. Blockchain-enabled Trust Management Model for the Internet of Vehicles. IEEE Internet Things J. 2021, 10, 12044–12054. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, J.; Yan, Z.; Wan, Z.; Jäntti, R. A Survey on Blockchain-based Trust Management for Internet of Things. IEEE Internet Things J. 2023, 10, 5898–5922. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhao, J.; Jiang, L.; Tan, R.; Niyato, D.; Li, Z.; Lyu, L.; Liu, Y. Privacy-preserving Blockchain-based Federated Learning for IoT Devices. IEEE Internet Things J. 2020, 8, 1817–1829. [Google Scholar] [CrossRef]
- Qi, Y.; Hossain, M.S.; Nie, J.; Li, X. Privacy-preserving Blockchain-based Federated Learning for Traffic Flow Prediction. Future Gener. Comput. Syst. 2021, 117, 328–337. [Google Scholar] [CrossRef]
- Gai, K.; Wu, Y.; Zhu, L.; Zhang, Z.; Qiu, M. Differential Privacy-based blockchain for Industrial internet-of-things. IEEE Trans. Ind. Inform. 2019, 16, 4156–4165. [Google Scholar] [CrossRef]
- Lopez-Millan, G.; Marin-Lopez, R.; Pereniguez-Garcia, F. Towards a Standard SDN-based IPsec Management Framework. Comput. Stand. Interfaces 2019, 66, 103357. [Google Scholar] [CrossRef]
- López-Millán, G.; Marín-López, R.; Pereñíguez-García, F.; Canovas, O.; Espín, J.A.P. Analysis and Practical Validation of a Standard SDN-based Framework for IPsec Management. Comput. Stand. Interfaces 2023, 83, 103665. [Google Scholar] [CrossRef]
- Hauser, F.; Häberle, M.; Schmidt, M.; Menth, M. P4-ipsec: Site-to-site and Host-to-site VPN with IPsec in p4-based SDN. IEEE Access 2020, 8, 139567–139586. [Google Scholar] [CrossRef]
- Hauser, F.; Schmidt, M.; Häberle, M.; Menth, M. P4-MACsec: Dynamic Topology Monitoring and Data Layer Protection with MACsec in P4-based SDN. IEEE Access 2020, 8, 58845–58858. [Google Scholar] [CrossRef]
- Son, J.; Xiong, Y.; Tan, K.; Wang, P.; Gan, Z.; Moon, S. Protego: Cloud-Scale Multitenant IPsec Gateway. In Proceedings of the 2017 USENIX Annual Technical Conference, Santa Clara, CA, USA, 12–14 July 2017; pp. 473–485. Available online: https://www.usenix.org/conference/atc17/technical-sessions/presentation/son (accessed on 7 February 2024).
- Coly, A.; Mbaye, M. S-SDS: A Framework for Security Deployment as Service in Software Defined Networks. In Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas: Third EAI International Conference, Cairo, Egypt, 14–15 February 2019; Proceedings 3. Springer International Publishing: Berlin/Heidelberg, Germany, 2019; pp. 92–103. [Google Scholar] [CrossRef]
- Gunleifsen, H.; Kemmerich, T.; Gkioulos, V. Dynamic Setup of IPsec VPNs in Service Function Chaining. Comput. Netw. 2019, 160, 77–91. [Google Scholar] [CrossRef]
- Wibowo, F.X.; Gregory, M.A.; Ahmed, K.; Gomez, K.M. Multi-domain Software Defined Networking: Research Status and Challenges. J. Netw. Comput. Appl. 2017, 87, 32–45. [Google Scholar] [CrossRef]
- Ma, Y.; Wang, Z.; Chang, C.; Wu, P. BPFC-SDNs: A Blockchain-Based and Policy-Oriented Forwarding Control for the SDN Interdomain. Secur. Commun. Netw. 2023, 1, 1104565. [Google Scholar] [CrossRef]
- Hu, J.; Reed, M.; Thomos, N.; AI-Naday, M.F.; Yang, K. Securing SDN-controlled IoT Networks through Edge Blockchain. IEEE Internet Things J. 2020, 8, 2102–2115. [Google Scholar] [CrossRef]
- Gao, J.; Agyekum, K.O.B.O.; Sifah, E.B.; Acheampong, K.N.; Xia, Q.; Du, X.; Guizani, M.; Xia, H. A Blockchain-SDN-enabled Internet of Vehicles Environment for Fog Computing and 5G Networks. IEEE Internet Things J. 2019, 7, 4278–4291. [Google Scholar] [CrossRef]
- Ren, W.; Sun, Y.; Luo, H.; Guizani, M. SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks. IEEE Trans. Netw. Serv. Manag. 2021, 18, 4406–4419. [Google Scholar] [CrossRef]
- Ahmad, S.; Mir, A.H. Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers. J. Netw. Syst. Manag. 2021, 29, 1–59. [Google Scholar] [CrossRef]
- Antichi, G.; Castro, I.; Chiesa, M.; Fernandes, E.L.; Lapeyrade, R.; Kopp, D.; Han, J.H.; Bruyere, M.; Dietzel, C.; Gusat, M.; et al. Endeavour: A scalable SDN Architecture for Real-world Ixps. IEEE J. Sel. Areas Commun. 2017, 35, 2553–2562. [Google Scholar] [CrossRef]
- Karakus, M.; Durresi, A. A survey: Control Plane Scalability Issues and Approaches in Software-Defined Networking (SDN). Comput. Netw. 2017, 112, 279–293. [Google Scholar] [CrossRef]
- Hess, F. Efficient Identity based Signature Schemes based on Pairings. In Proceedings of the Selected Areas in Cryptography: 9th Annual International Workshop, St. John’s, NL, Canada, 15–16 August 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 310–324. [Google Scholar] [CrossRef]
- Luu, L.; Chu, D.H.; Olickel, H.; Saxena, P.; Hobor, A. Making Smart Contracts Smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 254–269. [Google Scholar] [CrossRef]
- Buccafurri, F.; De Angelis, V.; Idone, M.F.; Labrini, C.; Lazzaro, S. Achieving Sender Anonymity in Tor against the Global Passive Adversary. Appl. Sci. 2022, 12, 137. [Google Scholar] [CrossRef]
- Dingledine, R.; Mathewson, N.; Syverson, P. Tor: The Second-generation Onion Router. In Proceedings of the 13th Conference on USENIX Security Symposium, San Diego, CA, USA, 9–13 August 2004; USENIX Association: Berkeley, CA, USA, 2004; pp. 303–320. [Google Scholar] [CrossRef]
- FISCO-BCOS. Available online: https://www.fisco.org.cn/fisco_20.html (accessed on 17 March 2024).
Scheme | IPsec | Open vSwitch | [15,16] | [19] | [21] | BSSN-SDNs | |
---|---|---|---|---|---|---|---|
Application Scenarios | legacy network | SDN | SDN intradomain | between legacy network and SDN | SDN with NVF | SDN interdomain | |
Deployment Locations | host or router | host or OVS switch | SDN controller and SDN border switch | SDN controller and data plane | SDN controller and VNF nodes | SDN and blockchain | |
IKE SA negotiation | ✓ 1 | ✓ | ✓ | ✗ 2 | ✓ | ✗ | ✗ |
IPsec SA negotiation | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | ✓ |
where to negotiate? | host or router | host or OVS switch | host or switch | SDN controller issue | SDN controller with host in legacy network | SDN controller issue to peer VNFs | smart contract on blockchain |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ma, Y.; Chang, C.; Wu, P.; Xiao, J.; Yuan, L. BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain. Electronics 2024, 13, 3120. https://doi.org/10.3390/electronics13163120
Ma Y, Chang C, Wu P, Xiao J, Yuan L. BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain. Electronics. 2024; 13(16):3120. https://doi.org/10.3390/electronics13163120
Chicago/Turabian StyleMa, Yingying, Chaowen Chang, Ping Wu, Jingxu Xiao, and Lu Yuan. 2024. "BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain" Electronics 13, no. 16: 3120. https://doi.org/10.3390/electronics13163120
APA StyleMa, Y., Chang, C., Wu, P., Xiao, J., & Yuan, L. (2024). BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain. Electronics, 13(16), 3120. https://doi.org/10.3390/electronics13163120