The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Les réseaux définis par logiciel (SDN) sont reconnus comme le paradigme de mise en réseau de nouvelle génération. L'architecture définie par logiciel pour les réseaux de capteurs acoustiques sous-marins (SDUASN) est devenue un sujet brûlant. Cependant, les recherches actuelles sur les SDUASN en sont encore à leurs balbutiements et se concentrent principalement sur l’architecture du réseau, la transmission et le routage des données. Il existe certaines lacunes qui font que l'échelle des SDUASN est difficile à étendre et que le maintien de la sécurité est rarement effectué. Par conséquent, une architecture de définition logicielle évolutive pour les réseaux de capteurs acoustiques sous-marins (SSDUASN) est présentée dans cet article. Il réalise une combinaison organique du niveau de connaissances, du niveau de contrôle et du niveau de données. Les nouveaux nœuds peuvent facilement accéder au réseau, ce qui pourrait favoriser un déploiement à grande échelle. Ensuite, le mécanisme d’authentification de sécurité de base appelé BSAM est conçu sur la base de notre architecture. Afin de refléter les avantages de la flexibilité et de la programmation dans les SSDUASN, un mécanisme d'authentification de sécurité avec pré-push (SAM-PP) est proposé ci-dessous. Dans les UASN actuels, le protocole d’authentification des nœuds est inefficace en raison de sa consommation élevée et de ses longs délais. De plus, il est difficile de s’adapter à un environnement dynamique. Les deux mécanismes peuvent résoudre efficacement ces problèmes. Par rapport à certains systèmes existants, BSAM et SAM-PP peuvent distinguer efficacement les nœuds légaux des nœuds malveillants, économiser considérablement l'espace de stockage des nœuds et améliorer l'efficacité du fonctionnement du réseau. De plus, SAM-PP présente un autre avantage en réduisant le délai d'authentification.
Qiuli CHEN
Army Engineering University of PLA
Ming HE
Army Engineering University of PLA,Nanjing University of Information Science and Technology
Xiang ZHENG
Army Engineering University of PLA
Fei DAI
Army Engineering University of PLA
Yuntian FENG
Army Engineering University of PLA
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Qiuli CHEN, Ming HE, Xiang ZHENG, Fei DAI, Yuntian FENG, "A Scalable SDN Architecture for Underwater Networks Security Authentication" in IEICE TRANSACTIONS on Information,
vol. E101-D, no. 8, pp. 2044-2052, August 2018, doi: 10.1587/transinf.2017EDP7359.
Abstract: Software-defined networking (SDN) is recognized as the next-generation networking paradigm. The software-defined architecture for underwater acoustic sensor networks (SDUASNs) has become a hot topic. However, the current researches on SDUASNs is still in its infancy, which mainly focuses on network architecture, data transmission and routing. There exists some shortcomings that the scale of the SDUASNs is difficult to expand, and the security maintenance is seldom dabble. Therefore, a scalable software-definition architecture for underwater acoustic sensor networks (SSDUASNs) is introduced in this paper. It realizes an organic combination of the knowledge level, control level, and data level. The new nodes can easily access the network, which could be conducive to large-scale deployment. Then, the basic security authentication mechanism called BSAM is designed based on our architecture. In order to reflect the advantages of flexible and programmable in SSDUASNs, security authentication mechanism with pre-push (SAM-PP) is proposed in the further. In the current UASNs, nodes authentication protocol is inefficient as high consumption and long delay. In addition, it is difficult to adapt to the dynamic environment. The two mechanisms can effectively solve these problems. Compared to some existing schemes, BSAM and SAM-PP can effectively distinguish between legal nodes and malicious nodes, save the storage space of nodes greatly, and improve the efficiency of network operation. Moreover, SAM-PP has a further advantage in reducing the authentication delay.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2017EDP7359/_p
Copier
@ARTICLE{e101-d_8_2044,
author={Qiuli CHEN, Ming HE, Xiang ZHENG, Fei DAI, Yuntian FENG, },
journal={IEICE TRANSACTIONS on Information},
title={A Scalable SDN Architecture for Underwater Networks Security Authentication},
year={2018},
volume={E101-D},
number={8},
pages={2044-2052},
abstract={Software-defined networking (SDN) is recognized as the next-generation networking paradigm. The software-defined architecture for underwater acoustic sensor networks (SDUASNs) has become a hot topic. However, the current researches on SDUASNs is still in its infancy, which mainly focuses on network architecture, data transmission and routing. There exists some shortcomings that the scale of the SDUASNs is difficult to expand, and the security maintenance is seldom dabble. Therefore, a scalable software-definition architecture for underwater acoustic sensor networks (SSDUASNs) is introduced in this paper. It realizes an organic combination of the knowledge level, control level, and data level. The new nodes can easily access the network, which could be conducive to large-scale deployment. Then, the basic security authentication mechanism called BSAM is designed based on our architecture. In order to reflect the advantages of flexible and programmable in SSDUASNs, security authentication mechanism with pre-push (SAM-PP) is proposed in the further. In the current UASNs, nodes authentication protocol is inefficient as high consumption and long delay. In addition, it is difficult to adapt to the dynamic environment. The two mechanisms can effectively solve these problems. Compared to some existing schemes, BSAM and SAM-PP can effectively distinguish between legal nodes and malicious nodes, save the storage space of nodes greatly, and improve the efficiency of network operation. Moreover, SAM-PP has a further advantage in reducing the authentication delay.},
keywords={},
doi={10.1587/transinf.2017EDP7359},
ISSN={1745-1361},
month={August},}
Copier
TY - JOUR
TI - A Scalable SDN Architecture for Underwater Networks Security Authentication
T2 - IEICE TRANSACTIONS on Information
SP - 2044
EP - 2052
AU - Qiuli CHEN
AU - Ming HE
AU - Xiang ZHENG
AU - Fei DAI
AU - Yuntian FENG
PY - 2018
DO - 10.1587/transinf.2017EDP7359
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E101-D
IS - 8
JA - IEICE TRANSACTIONS on Information
Y1 - August 2018
AB - Software-defined networking (SDN) is recognized as the next-generation networking paradigm. The software-defined architecture for underwater acoustic sensor networks (SDUASNs) has become a hot topic. However, the current researches on SDUASNs is still in its infancy, which mainly focuses on network architecture, data transmission and routing. There exists some shortcomings that the scale of the SDUASNs is difficult to expand, and the security maintenance is seldom dabble. Therefore, a scalable software-definition architecture for underwater acoustic sensor networks (SSDUASNs) is introduced in this paper. It realizes an organic combination of the knowledge level, control level, and data level. The new nodes can easily access the network, which could be conducive to large-scale deployment. Then, the basic security authentication mechanism called BSAM is designed based on our architecture. In order to reflect the advantages of flexible and programmable in SSDUASNs, security authentication mechanism with pre-push (SAM-PP) is proposed in the further. In the current UASNs, nodes authentication protocol is inefficient as high consumption and long delay. In addition, it is difficult to adapt to the dynamic environment. The two mechanisms can effectively solve these problems. Compared to some existing schemes, BSAM and SAM-PP can effectively distinguish between legal nodes and malicious nodes, save the storage space of nodes greatly, and improve the efficiency of network operation. Moreover, SAM-PP has a further advantage in reducing the authentication delay.
ER -