BQSV: Protecting SDN controller cluster’s network topology view based on byzantine quorum system with verification function

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In Software-defined network (SDN), SDN applications and administrators rely on the logically centralized view of the network topology to make management decisions. Therefore, the correctness of SDN controller cluster’s network topology view becomes critical. However, the lack of security mechanism in SDN controller cluster makes the network topology view easy to be tampered with. In this paper, we argue that malicious controllers in a cluster can easily damage the network view of the cluster through the east-west bound interfaces. We present a scheme based on Byzantine Quorum System with verification function (BQSV) to prevent malicious controllers from manipulating the cluster’s network view through east-west bound interface and providing wrong topology information to SDN applications and administrators. Moreover, we implement the prototype of our scheme and extensive experiments to show that the proposed scheme can prevent malicious controllers from damaging the topology information of the cluster with trivial overheads.

Cite

CITATION STYLE

APA

Zhi, Y., Yang, L., Yu, S., & Ma, J. (2019). BQSV: Protecting SDN controller cluster’s network topology view based on byzantine quorum system with verification function. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11982 LNCS, pp. 73–88). Springer. https://doi.org/10.1007/978-3-030-37337-5_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free