Securing Centralized SDN Control Wi
Securing Centralized SDN Control Wi
4605
Suhail Ahmad
Ajaz Hussain Mir
Keywords SDN, SDN security, blockchain, southbound interface, TLS, threats in SDNs
Copyright © 2023 Author(s). This is an open access publication, which can be used, distributed
and reproduced in any medium according to the Creative Commons CC-BY 4.0 License.
5
6 Suhail Ahmad, Ajaz Hussain Mir
1. Introduction
The extensive efforts of researchers over the years to transform the Internet to a more
reliable, programmable, open, manageable, and secure infrastructure have resulted
in SDN. SDN introduces a novel networking architecture that segregates network in-
telligence from packet forwarding by placing network control logic into an external
software-based controller. Software-based SDN controllers form the SDN control pla-
ne and provide a birds-eye view of an entire network at a single central point. This
centralized network control simplifies network management and enables dynamic and
automated flow control. Besides the centralized network control, SDN fosters the con-
cept of network programmability, wherein diverse network functions are implemented
as software applications – either on top of the SDN controller or as independent
data-analysis functions.
The triple-layered SDN architecture that was proposed by the Open Network
Foundation (ONF) is shown in Figure 1.
The bottom layer (or the data plane) includes simple forwarding devices that
are called switches; these match any received packet headers against the flow rules or
instructions that are issued by the SDN controller. The middle layer (or the control
plane) comprises SDN controllers, which may implement a specific network operating
system (NOS) to abstract low-level control logic details from management applications
Securing centralized SDN control with distributed blockchain technology 7
and convert high-level network policies into flow rules to properly configure and mana-
ge the entire data plane infrastructure [33]. The top layer (or the management plane)
involves various SDN applications that implement specific network-control functions
like load balancing, routing, firewalls, etc. The applications in the management plane
can be implemented by using either controller-specific programming languages or high-
level SDN programming languages (like Frenetic [23], Pyretic [42], Procera [55], etc).
The information exchange among the three layers/planes in SDN takes place
over the southbound, northbound, and eastbound/westbound interfaces. The mana-
gement applications use the northbound interface to exchange information with the
SDN control plane. It can be compared with the POSIX or win32 standard of ope-
rating systems, which provide the necessary abstractions to ensure controller and
programming language independence. The primary goal here is to conceal complex
network-wide configurations and state management to simplify the roles of network
administrators by providing suitable high-level abstractions.
The eastbound interface is used to exchange information between SDN control-
lers, while the westbound interface enables information exchanges between centra-
lized SDN controllers and traditional distributed control plane. Neither the east-
bound nor the westbound interface has been standardized, and various controllers
[13, 22, 32, 44, 49, 51] use diverse approaches for inter-controller communication and
to communicate with legacy distributed control [28–30]. On the other hand, the open
vendor agnostic interface between the data and the control plane is called the south-
bound interface (SBI); in this manuscript, our main goal is to secure the information
exchange at this interface.
In brief, the SDN paradigm is a promising architecture that is still in its early
stage of development and requires further advancements in all of the three planes, and
more importantly, in the inter-plane communication protocols in order to realize its
full benefits in production and realistic deployments. The two key aspects that act as
impediments in widespread SDN acceptance are interfacing with legacy distributed
controls and SDN security. The former has received much attention from the research
community, and numerous hybrid SDN controllers and data plane devices (DPDs)
have been proposed (which we analyzed in our previous work [3]). The security aspect
of SDN requires more consideration in terms of the development and testing of secure
and protected SDN layers and inter-communication mechanisms in order to withstand
diverse real-world security threats.
1.1. Contributions
The primary focus of this manuscript is to protect SDN control traffic from adversaries
and malicious devices. To the best of our knowledge, this is first time a blockchain-
based multi-domain authentication and key-exchange mechanism has been proposed
to secure a centralized SDN control. The proposed lightweight blockchain-based decen-
tralized security mechanism for the southbound interface provides additional security
8 Suhail Ahmad, Ajaz Hussain Mir
features as compared to the existing approaches. In this manuscript, the major con-
tributions that are made are as follows:
• We provide an overview of key resources in different DPDs and SDN controllers.
• We highlight how an insecure southbound interface jeopardizes the resources of
both the control and data planes.
• We summarize various security threats or attacks that are plausible over an
unprotected SBI.
• We emphasize the various vulnerabilities and limitations of the most prominent
TLS-based security solution for the SBI.
• We describe our proposed robust, secure, and distributed mechanism for SBI
security.
• We analyze the proposed security mechanism in terms of its security features,
communication overhead, and re-authentication cost.
The three distinguishing features of the SDN paradigm are dynamic traffic-flow con-
trol, centralized network visibility, and network programmability. Such features have
revolutionized the overall network control and basic packet forwarding. However, these
features have also introduced new security challenges and threat vectors into the ne-
twork architecture. The separation of the forwarding infrastructure, control functions,
and management applications into three planes have introduced new threat interfa-
ces and vulnerable targets. The information exchange among the SDN planes require
secure communication channels that necessitate the use of cryptographic mechanisms
in order to ensure message integrity, confidentiality, and source authentication. In this
paper, our goal is to authenticate devices in the SDN domain and secure the traffic
between the control and data planes. Therefore, we first elaborate the services that
are offered and resources that are involved in these two planes; in the next section, we
highlight how an insecure SBI can be exploited by opponents to disrupt such services
and resources.
Securing centralized SDN control with distributed blockchain technology 9
In short, the intelligence of the entire network resides in the SDN control plane.
Logically or physically centralized SDN controllers enable dynamic network control
and vibrant network monitoring. In dynamic network control, the forwarding devices
are programmed as per the policy directives that are expressed by the applications in
the management plane and can be reconfigured as per the changing network state. In
10 Suhail Ahmad, Ajaz Hussain Mir
network monitoring, on the other hand, SDN controllers retrieve flow-statistic infor-
mation from the forwarding devices that can be analyzed by numerous applications
in the management plane (like load balancing, security, etc.). If traffic congestion or
other anomalies like security attacks are detected, the SDN control plane dynamically
reprograms the flow rules so that the network traffic is diverted to under-utilized pa-
ths or an intrusion-detection system (IDS). The network traffic-statistic information
is also beneficial for network provisioning in order to meet future traffic demands.
Both of these control functions involve bi-directional information exchanges between
the control and data planes via the SBI. Therefore, it necessitates a reliable informa-
tion exchange at the SBI in order to determine the correct network state and detect
anomalies like congestion, attacks, or faults in the network. To prevent opponents
or malicious devices from accessing the network state information and disturbing the
smooth functioning of the network necessitates protecting the communication channel
between the control and data plane. However, most SDN controllers do not use secure
SBIs except for a few (like OpenDayLight [44], ONOS [13], and Rosemary [51]).
a)
b)
Figure 3. Flow rule – Match, Action, Stats in OpenFlow (a); OpenFlow evolution (b)
Since its inception, OpenFlow has gone through a brisk evolution. The basic
version 1.0 [45] provided only a single flow table with 12 fixed header fields, whereas
the latest version 1.5 [46] introduced a number of advanced functions along with 41
matching fields. The evolution of OpenFlow is shown in Figure 3b, along with the most
prominent features that were added with each version. After the standardization of
version 1.0, it immediately became evident that it was very restraining; subsequently,
three important advances (flexible match/action, multiple flow tables, and tailored
stateful extensions) were made to OpenFlow in the advanced versions.
The most important extension in OpenFlow is group tables, which provide ele-
mentary stateful operations in the DPDs. For instance, the original OpenFlow specifi-
cation required remote controller intervention to instantiate a new flow rule in case of
a link/port failure. Such controller dependence will result in delayed responses; in the
intervening period, those packets that were destined to a failed port would be lost.
The fast failure group table contains multiple action buckets to address this issue.
Another group table is select that enables load balancing in the data plane. Gro-
up tables are quite suitable for handling such situations, but they are still optional
and loosely specified in the latest OpenFlow specification. Also, these extensions in
the OpenFlow evolution approve the essence of stateful operations inside the DPDs.
12 Suhail Ahmad, Ajaz Hussain Mir
ii) Fuzzing attacks: In an open control channel, an attacker can inject cleverly
crafted control packets into the data plane that contain malicious or malfor-
med headers that can expose prevailing vulnerabilities or can disturb the normal
packet flow processing. Such malformed control packets can lead forwarding swit-
ches to an undesired state that can have a detrimental effect on the overall switch
stability and performance [57].
iii) Reconnaissance attacks: Such attacks are also termed as side-channel attacks
wherein an attacker can commonly clout the resultant response of a target device
against a particular network situation to deduce certain implied information
that an attacker can subsequently use to launch other kinds of attacks. For
instance, an adversary can determine the control latency by sending specific
packets to a particular switch and later on use the same information to launch
a flow table flooding attack [57].
iv) State memory exhaustion attacks: In a stateful SDN data plane, each da-
ta plane device allocates memory for state transitions that are generated by
incoming packets or switch-level events. To save state information, data struc-
tures like array-based variables or state tables are used in different stateful
DPDs [16, 59]. With an insecure southbound channel, however, an attacker can
exploit the open channel to store unnecessary state information into the DPDs
to exhaust the state memory.
v) Switch malfunction attacks: Another threat vector that is derived from an
unprotected switch-controller channel is the possibility that an attacker may
force the execution of CPU-intensive tasks on a switch. For instance, an attacker
may impersonate the SDN controller and can send flow-status queries to the
switch, forcing a switch to incessantly compute the required information. The
other switch-related attacks are identity hijacking and spanning tree poisoning.
In the former case, an attacker may impersonate a legitimate switch to disconnect
a genuine one, whereas in the later case, an attacker can fabricate fake links by
using crafted LLDP packets to poison the spanning tree protocol.
ii) Topology poisoning: As discussed in the previous section, the SDN controller
discovers switches, hosts, and links in the network with the help of an initial
handshake process, packet in messages, and LLDP protocol, respectively [31]. In
order to have up-to-date topology information at the centralized SDN controller,
the said message exchange takes place continuously over the data-control chan-
nel. An insecure message exchange can be exploited by an opponent to poison
such messages with fake information; in the worst case, this may result in ha-
ving incorrect topology information with fake links and nodes at the centralized
controller. Topology poisoning can also be used to perform a host-location hi-
jacking attack in which an attacker crafts LLDP packets to poison the topology
information in order to divert the traffic of a legitimate host toward an attacker’s
device [26]. In addition to this, an adversary may also exploit the device-learning
messages to create message-forwarding loops [1].
iii) NOS service disruption: Like a traditional PC operating system, the NOS
in the SDN control plane controls network resources to simplify the network
management and, at the same time, attempts to provide cost-effective resour-
ce utilization. However, most NOSs support limited security features except for
a few (like ONOS [13], ODL [44], and Rosemary [51]). With an open data-control
plane channel and lack of authentication mechanisms, any reprobate data plane
device can additionally exploit the SDN controller’s mis-configuration and vulne-
rabilities in order to achieve diverse objectives like executing control commands
that kill core-controller processes, redirecting information that is anticipated at
a legitimate device, tampering with and accessing controller databases, and mo-
difying internal data that may lead the SDN controller to an erratic state; in
the wort case, this can kill vital controller processes or tamper with internal da-
ta structures to achieve a denial-of-service attack or controller non-availability.
All of these security threats are summarized in Table 1. Apart from these security
threats, there are numerous other vulnerabilities in different planes and interfaces (as
reported by the researchers in [1, 5, 7, 8, 19]); however, our aim here is to highlight
only those issues that are associated with an unprotected SBI.
Table 1
Security threats in SDN Data and Control Plane due to unprotected SBI
Table 1 cont.
Network Plane Attacks Main Highlights
Reconnaissance Attacker determines certain information that
attacks can be subsequently used to launch other
kinds of attacks
State memory Opponents flood stateful SDN devices with
bogus state exhaustion information to
consume state storage memory
Switch malfunction Attacker forces execution of CPU-intensive
tasks on attacks switch to disturb normal
processing at DPD
Packet in Flooding Fake packet in messages disrupt normal
processing of packets and, in worst case,
results in denial of service for legitimate flows
Topology Poisoning To divert traffic of legitimate host toward an
Control Plane
attacker’s device or create forwarding loops
Threats
in data-link layer
Service disruption Without protection in place, core controller
processes and internal data structures can be
tampered with, which can have detrimental
impact on overall controller operations
4. Related work
As observed in the previous section, the SBI is highly prone to various attacks without
security protocols, and attackers can breach SDNs while remaining unobserved. The
ONF recommended TLS for securing the information exchange at the SBI. One of
the impediments for network operators when using TLS is the tedious configuration,
as both the controllers and the DPDs require certificate authority’s (CA) keys, cer-
tificates, and the signing of these certificates with the CA’s key [12]. The keys and
certificates need to be deployed prior to the actual network implementation. This
complicated configuration that is required at both ends is a major hindrance for TLS
adoption for the SBI.
On the other hand, network administrators in SDNs have the flexibility to choose
DPDs [20, 50, 54, 56] as per the requirements; accordingly, they must use security
protocols as per the availability of resources in these DPDs. TLS provides such fle-
xibility and backward compatibility by enabling distant parties to choose from diffe-
rent security algorithms and protocol versions during the initial handshake process.
However, this flexibility is a primary security concern in TLS, as it may jeopardi-
ze the network’s resources and control traffic in terms of integrity, availability, and
confidentiality. Since its inception, the TLS protocol suite has confronted numerous
practical and theoretical attacks such as collision attacks [14, 15], RACOON [39],
CRIME [9, 21], POODLE [41], Triple Handshake [40], DROWN [11], etc. Consequent
Securing centralized SDN control with distributed blockchain technology 17
to such attacks, TLS evolved from version 1.1 to version 1.3. The latest version 1.3
introduced a faster handshake process, new security features, and restricted use of vul-
nerable cipher suites. However, the authors of [36] claimed that a downgrade attack
is still feasible in TLS 1.3.
The authors of [34] proposed identity-based cryptography (IBC) for SBI securi-
ty. The proposed approach relieves the end parties from obtaining public keys from
a central authority to derive session keys. However, the authors created a simplified
set-up where the roles of the various entities were not clearly mentioned. On the other
hand, the authors of [47] deployed an intrusion-detection center (IDC) and KDC be-
tween the control and data planes to monitor SBI traffic and secure in-transit control
traffic. They did not evaluated the proposed system in terms of security features or
other performance parameters.
The authors of [2] pointed out various deficiencies in TLS-based implementa-
tions with OpenFlow and recommended certain changes in order to improve overall
network security. The highlighted issues are support for vulnerable versions, support
for vulnerable protocols, optional client verification, etc. They have necessitated mu-
tual authentication for seamless and secure network connectivity. Keeping all of these
issues in view, we present an authentication and key-exchange mechanism in the next
section that addresses most of these vulnerabilities.
2. Using elliptic curve E, the AS determines its private key (SAS ) and public
key (PAS ) as follows: SAS ∈ ZP and PAS = SAS .G, where (.) represents
elliptic curve cryptographic (ECC) multiplication.
3. At the end of the initialization, the AS publishes the following pu-
blic parameters: [E, G, n, H1 (), H2 (), PAS ], where H1 () and H2 () are the
collision-resistant one-way hash functions that are used during the mutual-
authentication and key-exchange phase.
ii) Registration Phase: In this phase, all of the entities (including the switches
and SMs) register themselves with the AS over a secure channel. For source
anonymity, the identities of these entities are never communicated in clear text
(as shown in Figure 5).
Here, we have elucidated the registration of a switch; likewise, the other entities
can be registered.
1. Switch (SWi ) selects an identity IDSW i for itself and concurrently generates
a nonce or time stamp T SSW i that protects from replay attack. Afterwards,
it computes the private key and public key for itself as follows:
• Selects secret key, SSW i = n1 , and calculates public key, PSW i = n1 .G
• Calculates hash of following: P = H1 (IDSW i ||n1 ||T SSW i ).
2. Switch (SWi ) calculates an intermediate-token, T KSW i = E[PAS ,
{IDSW i ||n1 ||T SSW i ||P }] and then relays it to AS.
3. The AS decrypts the received T KSW i and extracts the values of
IDSW i , n1 , T SSW i , and P. The AS validates the received time stamp; if it
falls within the permissible limit, then the AS proceeds further – otherwise,
the connection is terminated. The received P ensures message integrity.
4. Like switch (SWi), the AS generates the private and public keys for switch
(SWi) as follows:
Uses received secret key SSW i = n1 and calculates public key PSW i = n1 .G.
20 Suhail Ahmad, Ajaz Hussain Mir
The values of [(AU T H)SW i , s1 , T SSW i , T KSW i , IDSW i ] are securely relay-
ed to the service manager for source authentication and further processing.
3. Once the SM receives it, it validates the received time-stamp T SSW i ; upon
its successful validation, it fetches the value of T SSW i (= k) from the re-
gistered list of switches from the blockchain. Using k, SM determines an
authentication token to prove the truthfulness of the received (AU T H)SW i
as follows:
If the values of (AU T H)SW i and (AU T H)SW i ? are the same, this proves
the authenticity of SWi to SMj; otherwise, the connection is terminated.
4. Likewise, the SMj authenticates itself to the switch by generating
a random number s2 , a time stamp T SSM j and authentication token
(AU T H)SM j . In addition to this, it calculates a session key with the
help of a session key derivation function (skdf) to be used for further
communication as SKij = skdf (T SSW i ||k||T SSM j ). Finally, the values of
[AU T HSM j , s2 , T SSM j , k, IDSM j ] are securely transmitted to the SWi for
further processing. Here, we have not described function skdf(), as any me-
chanism for key derivation can be employed by the end parties.
5. Upon receiving the values of [AU T HSM j , s2 , T SSM j , k, and IDSM j ], the
switch validates the time stamp; if valid, it will proceed further to de-
termine the authenticity of SMj. The switch also determines session key
SKij = skdf (T SSW i ||T KSW i ||T SSM j ). Therefore, both parties mutually
authenticate each other and are now ready for secure data transmission
that is encrypted with the session key.
iv) Consensus Phase: In the proposed approach, PBFT is used to form the public
ledger, as it requires a relatively limited number of nodes to build the consensus.
The authentication outcome is transmitted to the blockchain using the following
steps:
1. In this setup, we assume ‘n’ witness peers (WPs) that can write a block
to the distributed public ledger. Out of these ‘n’ WPs, one is designated
“Speaker” while the others behave as “Congressmen” during the consensus.
The speaker ensures a smooth consensus process and cannot join the voting
process. Moreover, the speaker usually conducts ‘m’ rounds of consensus for
saving the time that is required in the speaker selection. Here, speaker ‘a’ is
nominated on the basis of following mechanism: a = (h mod n) + 1, where
‘h’ denotes the current block’s height.
3. After a period of ‘t’ intervals, the block that contains the authentication re-
sults is created, which is followed by the voting process. Initially, the speaker
broadcasts a request to all congressmen for vote using [Preq , h, W Pi , blockh ,
and SigW P i (block)], where Preq refers to the request to vote.
4. After receiving the voting request, the j th WP shares its vote using
[Pres , h, W P j, blockh , and SigW P j (block)], where Pres denotes the j th WP’s
response.
5. After receiving responses from the WPs, the speaker builds a consensus to
publish an authentication block to the public ledger.
v) Service Delivery Phase: This phase seamlessly provides DPDs with the ne-
cessary services without re-authentication if there is a change of controller or
a switch migrates to another controller. If the controller changes, the Switch
(SWi) simply sends E(PSM j , k) where k = H1 (SSW i ||IDSW i )⊕H2 (SAS ||IDSW i )
to the new controller. Once the new controller receives the request from a new
switch, it validates the existence from the distributed public ledger. If it is found
and not on the revocation list, the necessary services are provided to the switch
without further re-authentication.
Table 2
Comparison of security features between TLS and Proposed Mechanism
Security Features TLS Proposed Mechanism
Confidentiality Y Y
Integrity Y Y
Immune to Record Tampering Y Y
Resists Impersonation Y Y
Mutual Authentication Y Y
Source Anonymity N Y
Forward Secrecy Y Y
Non-repudiation Y Y
Resists Replay Y Y
Key Exchange Y Y
MITM N Y
Non-interactivity N Y
certificate verify (CERTV ). EE include extensions like signature algorithms and sup-
ported group, which were sent as plaintext in TLS 1.2 earlier. CERTv is one of the
major enhancements in TLS version 1.3, as it ensures strong resilience against MITM
by performing digital signatures of all of the messages that are exchanged from CH
to CERT. After CH and SH, both end parties can derive the session key by using
the DHKE algorithm. Finally, the handshake is done by exchanging the FIN message.
to reduce the control traffic of the initial authentication and key exchange to half,
the overall bandwidth requirement and control latency can be reduced significantly
in such use cases.
7. Conclusion
In this manuscript, we have attempted to safeguard SDN control traffic from ad-
versaries and malicious devices. We have highlighted numerous security threats and
issues that are associated with an unprotected southbound interface and have propo-
sed a decentralized blockchain-based security mechanism for authentication and key
exchange. The proposed scheme provides the following benefits: i) it involves the le-
ast amount of control traffic for authentication and key exchange; ii) it relieves the
SDN controller from the burden of initial authentication and key determination; iii)
it ensures non-interactivity; and iv) its blockchain-based distributed ledger ensures
uninterrupted availability of authentication information and overcomes the security
issues that are faced by a central authority. The proposed mechanism is compared to
the widely used TLS-based security solution and provides adequate security with limi-
ted overhead. The security analysis of the proposed scheme shows that it is practical
to safeguard centralized SDN control with a distributed blockchain technology.
This manuscript only provides informal proof of the various security features of
the proposed scheme. In the future, we will try to investigate formal security proof
of the proposed mechanism. Furthermore, we will try to explore the possibility of
extending the proposed mechanism to the other SDN interfaces. Another possible
direction is to further reduce the authentication and consensus overhead with more
flexibility.
References
[1] Abdou A., Oorschot van P.C., Wan T.: Comparative analysis of control plane
security of SDN and conventional networks, IEEE Communications Surveys &
Tutorials, vol. 20(4), pp. 3542–3559, 2018.
[2] Agborubere B., Sanchez-Velazquez E.: OpenFlow communications and TLS se-
curity in software-defined networks. In: 2017 IEEE International Conference on
Internet of Things (iThings) and IEEE Green Computing and Communications
(GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and
IEEE Smart Data (SmartData), pp. 560–566, 2017.
[3] Ahmad S., Mir A.H.: Scalability, consistency, reliability and security in SDN
controllers: a survey of diverse SDN controllers, Journal of Network and Systems
Management, vol. 29(1), pp. 1–59, 2021.
[4] Al-Fares M., Loukissas A., Vahdat A.: A scalable, commodity data center network
architecture, ACM SIGCOMM Computer Communication Review, vol. 38(4),
pp. 63–74, 2008.
26 Suhail Ahmad, Ajaz Hussain Mir
[5] AlEroud A., Alsmadi I.: Identifying cyber-attacks on software defined networks:
An inference-based intrusion detection approach, Journal of Network and Com-
puter Applications, vol. 80, pp. 152–164, 2017.
[6] Alharbi T.: Deployment of blockchain technology in software defined networks:
A survey, IEEE Access, vol. 8, pp. 9146–9156, 2020.
[7] Ali S.T., Sivaraman V., Radford A., Jha S.: A survey of securing networks
using software defined networking, IEEE Transactions on Reliability, vol. 64(3),
pp. 1086–1097, 2015.
[8] Alsmadi I., Xu D.: Security of software defined networks: A survey, Computers
& Security, vol. 53, pp. 79–108, 2015.
[9] Alupotha J., Prasadi S., Alawatugoda J., Ragel R., Fawsan M.: Implementing
a proven-secure and cost-effective countermeasure against the compression ratio
info-leak mass exploitation (CRIME) attack. In: 2017 IEEE International Con-
ference on Industrial and Information Systems (ICIIS), pp. 1–6, 2017.
[10] Ashouri M., Setayesh S.: Enhancing the Performance and Stability of SDN Ar-
chitecture with a Fat-Tree Based Algorithm, 2018. https://hal.archives-ouvertes.
fr/hal-01858528 (working paper or preprint).
[11] Aviram N., Schinzel S., Somorovsky J., Heninger N., Dankel M., Steube J., Va-
lenta L., et al.: DROWN: Breaking TLS Using SSLv2. In: 25th USENIX Security
Symposium (USENIX Security 16), pp. 689–706, 2016.
[12] Benton K., Camp L.J., Small C.: OpenFlow vulnerability assessment. In:
HotSDN’13: Proceedings of the Second ACM SIGCOMM Workshop on Hot To-
pics in Software Defined Networking, pp. 151–152, 2013.
[13] Berde P., Gerola M., Hart J., Higuchi Y., Kobayashi M., Koide T., Lantz B., et al.:
ONOS: towards an open, distributed SDN OS. In: HotSDN’14: Proceedings of the
third workshop on Hot topics in software defined networking, pp. 1–6, 2014.
[14] Bhargavan K., Leurent G.: On the practical (in-) security of 64-bit block ci-
phers: Collision attacks on HTTP over TLS and OpenVPN. In: Proceedings of
the 2016 ACM SIGSAC Conference on Computer and Communications Security,
pp. 456–467, 2016.
[15] Bhargavan K., Leurent G.: Transcript collision attacks: Breaking authentication
in TLS, IKE, and SSH. In: Network and Distributed System Security Symposium –
NDSS 2016, 2016.
[16] Bianchi G., Bonola M., Capone A., Cascone C.: OpenState: Programming
platform-independent stateful OpenFlow applications inside the switch, ACM
SIGCOMM Computer Communication Review, vol. 44(2), pp. 44–51, 2014.
[17] Bianchi G., Bonola M., Pontarelli S., Sanvito D., Capone A., Cascone C.:
Open Packet Processor: a programmable architecture for wire speed platform-
independent stateful in-network processing, arXiv:160501977, 2016. doi: 10.
48550/ARXIV.1605.01977.
Securing centralized SDN control with distributed blockchain technology 27
[18] Bosshart P., Daly D., Gibb G., Izzard M., McKeown N., Rexford J., Schle-
singer C., Talayco D., et al.: P4: Programming protocol-independent packet
processors, ACM SIGCOMM Computer Communication Review, vol. 44(3),
pp. 87–95 2014.
[19] Chica J.C.C., Imbachi J.C., Vega J.F.B.: Security in SDN: A comprehensive su-
rvey, Journal of Network and Computer Applications, vol. 159, 102595, 2020.
[20] Chole S., Fingerhut A., Ma S., Sivaraman A., Vargaftik S., Berger A.,
Mendelson G., et al.: dRMT: Disaggregated Programmable Switching. In:
SIGCOMM’17: Proceedings of the Conference of the ACM Special Interest Group
on Data Communication, pp. 1–14, 2017.
[21] Fisher D.: CRIME Attack Uses Compression Ratio of TLS Requests as Side
Channel to Hijack Secure Sessions, ThreatPost, 2012.
[22] Floodlight Project. http://www.projectfloodlight.org/.
[23] Foster N., Harrison R., Freedman M.J., Monsanto C., Rexford J., Story A.,
Walker D.: Frenetic: A network programming language, ACM Sigplan Notices,
vol. 46(9), pp. 279–291, 2011.
[24] Gao J., Zhai E., Liu H.H., Miao R., Zhou Y., Tian B., Sun C., et al.: Lyra: A cross-
platform language and compiler for data plane programming on heterogeneous
ASICs. In: SIGCOMM’20: Proceedings of the Annual conference of the ACM
Special Interest Group on Data Communication on the applications, technologies,
architectures, and protocols for computer communication, pp. 435–450, 2020.
[25] He C., Feng X.: Pomp: protocol oblivious SDN programming with automatic
multi-table pipelining. In: IEEE INFOCOM 2018 – IEEE Conference on Com-
puter Communications, pp. 998–1006, 2018.
[26] Hong S., Xu L., Wang H., Gu G.: Poisoning network visibility in software-defined
networks: New attacks and countermeasures. In: NDSS, vol. 15, pp. 8–11, 2015.
[27] Hsu K.F., Beckett R., Chen A., Rexford J., Tammana P., Walker D.: Contra:
A programmable system for performance-aware routing. In: NSDI’20: Proceedings
of the 17th USENIX Conference on Networked Systems Design and Implementa-
tion (NSDI 20), pp. 701–721, 2020.
[28] Huang S., Zhao J., Wang X.: HybridFlow: A Lightweight Control Plane for Hybrid
SDN in Enterprise Networks. In: 2016 IEEE/ACM 24th International Symposium
on Quality of Service (IWQoS), pp. 1–2, 2016.
[29] Jin C., Lumezanu C., Xu Q., Mekky H., Zhang Z.L., Jiang G.: Magneto: Unified
Fine-grained Path Control in Legacy and OpenFlow Hybrid Networks. In: SOSR
2017 – Proceedings of the 2017 Symposium on SDN Research, pp. 75–87, 2017.
[30] Jin C., Lumezanu C., Xu Q., Zhang Z.L., Jiang G.: Telekinesis: Controlling Legacy
Switch Routing with OpenFlow in Hybrid Networks. In: SOSR ’15: Proceedings of
the 1st ACM SIGCOMM Symposium on Software Defined Networking Research,
pp. 1–7, 2015.
28 Suhail Ahmad, Ajaz Hussain Mir
[31] Khan S., Gani A., Wahab A.W.A., Guizani M., Khan M.K.: Topology discove-
ry in software defined networks: Threats, taxonomy, and state-of-the-art, IEEE
Communications Surveys & Tutorials, vol. 19(1), pp. 303–324, 2016.
[32] Koponen T., Casado M., Gude N., Stribling J., Poutievski L., Zhu M., Ramana-
than R., et al.: Onix: A distributed control platform for large-scale production
networks. In: OSDI’10: Proceedings of the 9th USENIX Conference on Operating
Systems Design and Implementation, 2010.
[33] Kreutz D., Ramos F.M., Verissimo P.E., Rothenberg C.E., Azodolmolky S.,
Uhlig S.: Software-defined networking: A comprehensive survey, Proceedings of
the IEEE, vol. 103(1), pp. 14–76, 2014.
[34] Lam J., Lee S.G., Lee H.J., Oktian Y.E.: Securing SDN southbound and data
plane communication with IBC, Mobile Information Systems, vol. 2016, 2016.
[35] Latif S.A., Wen F.B.X., Iwendi C., Wang L.F., Mohsin S.M., Han Z., Band S.S.:
AI-empowered, blockchain and SDN integrated security architecture for IoT
network of cyber physical systems, Computer Communications, vol. 181,
pp. 274–283, 2022.
[36] Lee S., Shin Y., Hur J.: Return of version downgrade attack in the era of TLS 1.3.
In: CoNEXT’20: Proceedings of the 16th International Conference on Emerging
Networking Experiments and Technologies, pp. 157–168, 2020.
[37] McKeown N., Anderson T., Balakrishnan H., Parulkar G., Peterson L., Re-
xford J., Shenker S., Turner J.: OpenFlow: enabling innovation in cam-
pus networks, ACM SIGCOMM Computer Communication Review, vol. 38(2),
pp. 69–74 2008.
[38] Meng W., Li W., Zhou J.: Enhancing the security of blockchain-based software
defined networking through trust-based traffic fusion and filtration, Information
Fusion, vol. 70, pp. 60–71, 2021.
[39] Merget R., Brinkmann M., Aviram N., Somorovsky J., Mittmann J.,
Schwenk J.: Raccoon Attack: Finding and Exploiting Most-Significant-Bit-
Oracles in TLS-DH (E). In: 30th USENIX Security Symposium (USENIX Se-
curity 21), pp. 213–230, 2021.
[40] Microsoft Research. https://mitls.org/pages/attacks/3SHAKE.
[41] Möller B., Duong T., Kotowicz K.: This POODLE bites: exploiting the SSL 3.0
fallback, Security Advisory, vol. 21, pp. 34–58, 2014.
[42] Monsanto C., Reich J., Foster N., Rexford J., Walker D.: Composing software
defined networks. In: 10th USENIX Symposium on Networked Systems Design
and Implementation (NSDI’13), pp. 1–13, 2013.
[43] Moshref M., Bhargava A., Gupta A., Yu M., Govindan R.: Flow-level state trans-
ition as a new switch primitive for SDN. In: HotSDN’14: Proceedings of the third
workshop on Hot topics in software defined networking, pp. 61–66, 2014.
[44] OpenDayLight Project. http://www.opendaylight.org/.
Securing centralized SDN control with distributed blockchain technology 29
[58] Zhang Y., Lin X., Xu C.: Blockchain-based secure data provenance for cloud
storage. In: Information and Communications Security. 20th International Con-
ference, ICICS 2018, Lille, France, October 29–31, 2018, Proceedings, pp. 3–19,
Springer, 2018.
[59] Zhu S., Bi J., Sun C., Wu C., Hu H.: SDPA: Enhancing stateful forwarding for
software-defined networking. In: 2015 IEEE 23rd International Conference on
Network Protocols (ICNP), pp. 323–333, 2015.
Affiliations
Suhail Ahmad
University of Kashmir, Department of Computer Science and Engineering, India,
suhail.sam008@gmail.com
Ajaz Hussain Mir
National Institute of Technology, Electronics and Communication Department, Srinagar,
Jammu & Kashmir, India, ahmir@rediffmail.com
Received: 20.12.2020
Revised: 11.11.2022
Accepted: 01.01.2023