2018 A Secured OpenFlow Protocol Using Elliptic Curves
2018 A Secured OpenFlow Protocol Using Elliptic Curves
Series
laythadnan@studentmail.unimap.edu.my
1. Introduction
Secure Software-Defined Network data transfer between the control layer and infrastructure layer
using elliptic curve cryptography is based on encryption and decryption, the proposed security
mechanisms on both layers. The SDN architecture comprises three planes: Application layer, Control
layer and Infrastructure layer. (APIs) Open Application Programmable Interfaces communicate
between the Control and Infrastructure layers.
• Application Layer: The application layer consists of the end-user business applications and other
control elements. The limit between the application layers and control layers is transferred by the
northbound Open Application Programmable Interfaces (API). The SDN architecture offers different
benefits such as control, flexibility, effective fragmentation, network management, network control,
low operating cost, low cost plug-in devices, upon request and the provision of resources [1].
• Control Layer: The control layer consists of a centralized controller which provides unified oversight
functions. Essentially, the controller supervises the packet forwarding functions of the network
through an interface. Additionally, it controls all the network processes such as routing, indoctrination,
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018)
1234567890 ‘’“” 012014 doi:10.1088/1742-6596/1019/1/012014
finishes and billing functions. The OpenFlow protocol is the most widely used control protocol in the
SDN domain.
• Infrastructure layer: SDN isolates the control layer from the infrastructure layer of the network. It
transfers the network intellect to a centralized controller. Consequently, the infrastructure layer now
contains low end switches connected by network links. Wireless access points and the Internet are
connected to the infrastructure layer. User traffic is transported through the infrastructure layer.
SDN Architecture.
2. Security of SDN
SDNs are vulnerable to security threats that can be created in different units of the network. Security
threats in an SDN network can be separated into four distinct types:
1) Application layer Security,
2) Control layer Security,
3) Infrastructure layer Security
4) Layer communication Security.
SDNs contain two data transfer channels: control layer data transfer and Infrastructure layer data
transfer.
Thus, the communication security threat can be divided into:
(1) Security relating to Control data transfer.
(2) Security relating to Infrastructure data transfer.
2
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018)
1234567890 ‘’“” 012014 doi:10.1088/1742-6596/1019/1/012014
BEAST- Browser
Exploit Against The attacker using cipher block chaining.
SSL/TLS attack
RC4 preferences in The attacker can recover the full plaintext when it is repeatedly encrypted in the
TLS same, or in several different, terms.
The attacker inserts a sequence of TCP reset requests to prematurely reset the
Reset attack
communication session.
The attacker's forces change the TLS sessions allowing the data to be changed
POODLE attack using padding at the end of the block cipher. As a result, encryption codes become
less secure each time it is passed.
The attacker uses a man-in-the-middle attack to recover the plaintext from a
LUCKY 13
Cipher-block chaining encrypted TLS session.
The network controller is the main component of the SDN network because it comprises central
intelligence and controls its functions. Consequently, attacks on the network controller represent the
most serious threats to the structure of the SDN. Control data transfer is the only interface that enables
a connection between the controller layer and the infrastructure layer. Thus, security in relation to data
transfer control is a key factor in ensuring proper communication with the layers. A DoS attack on the
SDN controller is presented in [4] in which an attacker, on an ongoing basis, sends IP packets with
random headers to the controller through the control data transfer channel. This leaves the controller in
an unresponsive state and unable to publish flow rules in the data transfer. TLS is used for optional
menu connections in the latest open flow specification due to its complex configuration [5]
Configuration is required to generate specific network site certificates and signed machine certificates
corresponding to the site-level private keys for controlling and transferring data [6]. Thus, many SDN
and equipment vendors omit support for TLS in the infrastructure layer. This leaves the data channel
transferring control vulnerable to security attacks. The control channel must therefore be secured using
other mechanisms.
3
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018)
1234567890 ‘’“” 012014 doi:10.1088/1742-6596/1019/1/012014
therefore modify the flow of change or destroy the data without being noticed by the network operator.
The rotation of data flows may result in a lower quality of service (QoS) between connection layers
[7].
The SDN architecture also requires powerful mechanisms for the mutual authentication of the data
transmutation channel. However, hackers can impersonate these authentication mechanisms as
legitimate converters and inject fraudulent traffic flows to the data level [8]. Using this method, an
attacker could exhaust the flow tables and reduce the bandwidth available for the user's traffic [2].
Furthermore, it will also affect the level of control by causing unnecessary flow requests to the
controller [8].
4. Elliptic Curves
Elliptic curves are mathematical constructs that have been studied by mathematicians from the
seventeenth century onwards [12].
Definition: An elliptic curve E over the finite field Fq is defined by equation (1) [13]
y 2 = x3 + ax + b,
Where a, b ∈ Fq, and 4a3 + 27b2 ≠ 0 (mod q), together with a special point Ο, termed the point at
Infinity.
The set E(Fq) consists of all points (x, y), x, y ∈ Fq, which satisfy the defining equation (2),
together with Ο.
Algebraic Elliptic Curves
The essential operation on an elliptic curve is the addition of points on the curve. To perform the
addition of points on elliptic curves an algebraic formula is required. The following result provides
such a formula [14].
P3 = P1 ⊕ P2 is given by :
4
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018)
1234567890 ‘’“” 012014 doi:10.1088/1742-6596/1019/1/012014
In this case, a and b is smaller than p. Ep (a, b) will represent a group with pair a and b.
All pairs satisfying the above conditions will be used for encryption. In general, pairs will be found
using the following method.
1. 0 ≤ x < p, compute ( )
2. Determine whether the above result will have a square root. If it does not, x doesn’t exist in
Ep. If x exists, y will have two values. Pair x and y will then be used for encryption.
Then P + Q are computed as follows: P, Q ∈ Ep (a, b);
1. P + O = P
2. P = (x, y) => P + (x, -y) = O. (x, -y) is reverse element of P.
x3 ≡ ( )
y3 ≡ ( ) ( )
{ .
5
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018)
1234567890 ‘’“” 012014 doi:10.1088/1742-6596/1019/1/012014
If an attacker knows G and KG, he/she can find K. This means the encryption algorithm is stronger
with smaller bits.
6. Security analysis
This occurs when the algorithm has been applied in the emulator for networks NS3.25 and using the
OpenFlow Protocol 1.3. It involves a single controller, two switches and two users in an SDN
scenario.
After changing the TLS sessions in original protocol and using the Elliptic curve cryptography
algorithm, the second table and the third table present a comparison between the current method and
the proposed method through a calculation given in units of a million instructions per second (MIPS).
205 7.1 *
234 1.6 *
Thus, the algorithm is novel and strong enough to provide secure data transfer in the OpenFlow
protocol used in the architecture of Software Defined Networks.
7. CONCLUSION
This paper addressed security challenges regarding connection data transfer channels in SDN
mechanisms. It proposed a novel and secure method of data transfer from the control layer to
infrastructure layer in the OpenFlow protocol, that of Elliptic Curve Cryptography. Reliability and
efficiency were expected to increase for each transmission of data, The method increased network
security by increasing the security of the protocol used in the Software Defined Network. This was
achieved using an elliptic curve algorithm that allows itself to encrypt and decrypt the data that will be
transferred and execute active classification. Any node between source and destination can be used to
view information.
Finally, the security features and performance of the proposed architecture in NS3.25 simulation
was analyzed. The results showed that the use of the proposed algorithm protected communication
channels against attacks such as spoofing, DoS, replay, reset and eavesdropping attacks. However,
6
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018)
1234567890 ‘’“” 012014 doi:10.1088/1742-6596/1019/1/012014
there is a penalty incurred for security performance in terms of latency and throughput. In future, the
focus will be on how to leverage resources to enhance the performance of the proposed method.
References
[1] https://www.opennetworking.org/wpcontent/uploads/2015/10/Principles_and_Practices_for_Sec
uring_Software-Defined_Networks_applied_to_OFv1.3.4_V1.0.pdf
[2] McBride, M., Cohn, M., Deshpande, S., Kaushik, M., Mathews, M., & Nathan, S. (2013). Sdn
security considerations in the data center. Open Networking Foundation-ONF SOLUTION
BRIEF.
[3] Kreutz, D., Ramos, F. and Verissimo, P., 2013, August. Towards secure and dependable
software-defined networks. In Proceedings of the second ACM SIGCOMM workshop on Hot
topics in software defined networking (pp. 55-60). ACM.
[4] Fonseca, P., Bennesby, R., Mota, E., & Passito, A. (2012). A replication component for resilient
OpenFlow-based networking. Paper presented at the Network Operations and Management
Symposium (NOMS), 2012 IEEE.
[5] Specification, O. S. Version 1.4. 0, October 14, 2013
[6] Zerkane, S., Espes, D., Le Parc, P. and Cuppens, F., 2016, May. Software Defined Networking
Reactive Stateful Firewall. In IFIP International Information Security and Privacy
Conference (pp. 119-132). Springer International Publishing.
[7] Shin, S., & Gu, G. (2013). Attacking software-defined networks: A first feasibility study. Paper
presented at the Proceedings of the second ACM SIGCOMM workshop on Hot topics in
software defined networking.
[8] Scott-Hayward, S., O'Callaghan, G., & Sezer, S. (2013). SDN security: A survey. Paper
presented at the Future Networks and Services (SDN4FNS), 2013 IEEE SDN For.
[9] Abbas, S. A. (2015). Enhancing the Security of Identity and Access Management in Cloud
Computing using Elliptic Curve Cryptography. IJERMT, 4(7), 8-15.
[10] Sudha, S., & Viswanatham, V. (2013). ADDRESSING SECURITY AND PRIVACY ISSUES IN
CLOUD COMPUTING. Journal of Theoretical & Applied Information Technology, 48(2).
[11] Nida, P., Dhiman, H., & Hussain, S. (2014). A survey on identity and access management in
cloud computing. Int. J. Eng. Res. Technol, 3(4).
[12] Certicom Corp., 1998 “ The Elliptic Curve Cryptosystem “, A Certicom White Paper,
[13] Fibíková, L., & Vyskoc, J. (2001). Practical cryptography-the key size problem: PGP after
years. Paper presented at the Proceedings in Workshop “Santa’s Get Together.
[14] Yan, S. Y. (2002). Number theory for computing: Springer Science & Business Media.
[15] Silverman, J. H. (1986). Heights and elliptic curves Arithmetic geometry (pp. 253-265):
Springer.
[16] Araki, K., Satoh, T., & Miura, S. (1998). Overview of elliptic curve cryptography. Paper
presented at the International Workshop on Public Key Cryptography.