Secure Communication over Software-Defined Networks
详细信息    查看全文
  • 作者:Stefan Rass (1)
    Benjamin Rainer (1)
    Matthias Vavti (1)
    Johannes G枚llner (2)
    Andreas Peer (2)
    Stefan Schauer (3)

    1. Alpen-Adria-Universit盲t Klagenfurt
    ; Universit盲tsstrasse 65鈥?7 ; 9020 ; Klagenfurt ; Austria
    2. National Defence Academy of the Austrian Federal Ministry of Defence and Sports
    ; Wien ; Austria
    3. AIT Austrian Institute of Technology GmbH
    ; Lakeside B10A ; 9020 ; Klagenfurt ; Austria
  • 关键词:Communication ; Security ; Pareto ; optimality ; Game theory
  • 刊名:Mobile Networks and Applications
  • 出版年:2015
  • 出版时间:February 2015
  • 年:2015
  • 卷:20
  • 期:1
  • 页码:105-110
  • 全文大小:1,658 KB
  • 参考文献:1. Abbas, A (2009) A hybrid protocol for identification of a maximal set of node disjoint paths. Int Arab J Inform Technol (IAJIT) 6: pp. 344-358
    2. Alpcan T, Ba艧ar T (2010) Network security: a decision and game theoretic approach. Cambridge University Press
    3. Djukic, P, Valaee, S (2006) Reliable packet transmissions in multipath routed wireless networks. IEEE Trans Mob Comput 5: pp. 548-559 CrossRef
    4. Finley K (2014) Online security is a total pain, but that may soon change. http://www.wired.com/2014/06/usable-security/. [online]
    5. Fitzi M, Franklin MK, Garay J, Vardhan SH (2007) Towards optimal and efficient perfectly secure message transmission. In: Vadhan S (ed) 4th Theory of cryptography conference (TCC), Lecture Notes in Computer Science LNCS 4392. Springer, pp 311鈥?22
    6. Kotzanikolaou, P, Mavropodi, R, Douligeris, C (2005) Secure multipath routing for mobile ad hoc networks. In: International conference on wireless on demand network systems and service. IEEE Computer Society, Los Alamitos
    7. Li Z, Kwok YK (2005) A new multipath routing approach to enhancing TCP security in ad hoc wireless networks. In: International conference workshops on parallel processing, pp 372鈥?79
    8. Nunes, B, Mendonca, M, Nguyen, X, Obraczka, K, Turletti, T (2014) A survey of software-defined networking: past, present, and future of programmable networks. Commun Surv Tutorials, IEEE PP: pp. 1-18
    9. Rass, S (2013) On game-theoretic network security provisioning. Springer J Netw Syst Manag 21: pp. 47-64 CrossRef
    10. Rass S, Rainer B, Vavti M, Schauer S (2013) A network modeling and analysis tool for perfectly secure communication. In: Proceedings of the 27th IEEE international conference on advanced information networking and applications, pp. 267鈥?75. IEEE Computer Society Press. (in press)
    11. Rass S, Schartner P (2010) Multipath authentication without shared secrets and with applications in quantum networks. In: Proceedings of the international conference on security and management (SAM), vol. 1. CSREA Press, pp 111鈥?15
    12. Sela, A (1999) Fictitious play in 鈥檕ne-against-all鈥?multi-player games. Economic Theory 14: pp. 635-651 CrossRef
    13. Singh V, Ahsan S, Ott J (2013) Mprtp: Multipath considerations for real-time media. ACM multimedia systems conference
    14. Voorneveld, M (1999) Pareto-optimal security strategies as minimax strategies of a standard matrix game. J. Optim. Theory Appl. 102: pp. 203-210 CrossRef
    15. Wen H, Lin C, Yang H, Ren F, Yue Y (2007) Modeling the reliability of packet group transmission in wireless network
    16. Zhao L, Delgado-Frias J (2006) Multipath routing based secure data transmission in ad hoc networks. IEEE Int Conf Wirel Mob Comput Netw Commun 17鈥?3. doi:10.1109/WIMOB.2006.1696359
  • 刊物类别:Computer Science
  • 刊物主题:Computer Communication Networks
    Electronic and Computer Engineering
    Business Information Systems
  • 出版者:Springer Netherlands
  • ISSN:1572-8153
文摘
We report on work in progress towards a practical implementation of a software defined overlay network that provides data delivery services at a freely definable and provably optimized quality of service. Our example implementation establishes transparent secure transmission, where security is in terms of confidentiality, authenticity and availability. Using general techniques from game-theory, we show how to simultaneously optimize several performance indicators of a transmission service, taking care of interdependencies and using security as a showcase application.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700