通信学报 ›› 2018, Vol. 39 ›› Issue (2): 31-42.doi: 10.11959/j.issn.1000-436x.2018022

• 学术论文 • 上一篇    下一篇

基于密码标识的SDN安全控制转发方法

秦晰1,唐国栋1(),常朝稳1,2   

  1. 1 信息工程大学三院,河南 郑州 450001
    2 郑州信大先进技术研究院,河南 郑州 450001
  • 修回日期:2017-12-13 出版日期:2018-02-01 发布日期:2018-03-28
  • 作者简介:秦晰(1978-),女,河南焦作人,博士,信息工程大学副教授、硕士生导师,主要研究方向为SDN安全、可信计算。|唐国栋(1992-),男,湖南永州人,信息工程大学硕士生,主要研究方向为SDN安全。|常朝稳(1966-),男,河南滑县人,博士,信息工程大学教授、博士生导师,主要研究方向为移动信息安全、物联网安全。
  • 基金资助:
    国家自然科学基金资助项目(61572517)

SDN security control and forwarding method based on cipher identification

Xi QIN1,Guodong TANG1(),Chaowen CHANG1,2   

  1. 1 The Third Institute,Information Engineering University,Zhengzhou 450001,China
    2 Zhengzhou Xinda Advanced Technology Research Institute,Zhengzhou 450001,China
  • Revised:2017-12-13 Online:2018-02-01 Published:2018-03-28
  • Supported by:
    The National Natural Science Foundation of China(61572517)

摘要:

针对软件定义网络(SDN,software defined networking)中匹配域范围有限和缺乏有效的数据来源验证机制问题,提出基于密码标识的 SDN 安全控制转发方法。首先,根据用户身份、文件属性或业务内容等特征信息生成密码标识,为数据流打上密码标识并用基于密码标识的私钥签名。其次,在其进出网络时验证签名,确保数据的真实性,同时将密码标识设计为转发设备能识别的匹配项,基于密码标识定义网络转发行为,形成基于人、物、业务流等细粒度网络控管能力。最后,通过实验分析验证该方法的有效性。

关键词: 软件定义网络, 密码标识, 安全控制转发, 流表匹配

Abstract:

Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.

Key words: software defined networking, cipher identification, security control and forwarding, flow table matching

中图分类号: 

No Suggested Reading articles found!