Repository logo
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Scholalry Output
  3. Publications
  4. Towards adoption of secure communication protocol in Software Defined Networks
 
  • Details

Towards adoption of secure communication protocol in Software Defined Networks

Author(s)
G.P., Kancherla, Gayatri Priyadarsini
S.G., Kulkarni, Sameer G.  
DOI
10.1109/COMSNETS56262.2023.10041364
Start Page
31-12-1901
End Page
738
Abstract
Software Defined Networking (SDN) decouples the forwarding data plane from the network control plane to provide centralized control and programmability of the data plane elements like switches and routers. Traditionally, this commu-nication between control plane and the data plane (southbound communication) for e.g., using OpenFlow were based on the non-secure protocol like transmission control protocol (TCP), which over-the-years resulted in several security incidents. In order to facilitate secure data communication, the adoption of transport layer security (TLS) has become unavoidable. To this extent, we first present the key qualitative aspects and suitability of using TLS 1.2 and the newer TLS 1.3 for southbound communication. Further, we present extensive quantitative evaluation on Mininet emulator testbed to assess the performance impact of using the TLS 1.2 and TLS 1.3 (for most widely used cipher suites) over TCP to secure the controller-switch communication. Our work shows that the adoption of secure communication channel TLS incurs significant overheads (2 - 6 �) when compared to baseline TCP (unsecure channel), while TLS 1.3 adds marginal overheads in terms of latency and throughput (? 5 %) in comparison to TLS 1.2. Also, we observed that the memory and processing (computational cost) overheads with TLS 1.2 and TLS 1.3 to be negligible, even when supporting a large number of flows. Further, we also discuss the potential adoption of QUIC protocol as an alternative to provide high performance secure communication for the southbound interface. � 2023 Elsevier B.V., All rights reserved.
Unpaywall
URI
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85149107313&doi=10.1109%2FCOMSNETS56262.2023.10041364&partnerID=40&md5=3308276ed7c4d1583e9c650565108ea7
https://d8.irins.org/handle/IITG2025/29399
Keywords
Network security
Secure communication
Seebeck effect
Software defined networking
Data planes
Data-plane
Network control plane
Openflow
Secure communication protocols
Security
Software-defined networkings
Software-defined networks
Tlsv1.3
Transport layer security
Transmission control protocol
IITGN Knowledge Repository Developed and Managed by Library

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify