Open Access Open Access  Restricted Access Subscription Access

A Decrease in the Encryption Latency Utilizing Transport Layer Protocols for Software Defined Networks

Muhammad Saddheer, Waqas Ahmad, Muhammad Nadeem, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz

Abstract


Data centers and business networks are rapidly using SDN (Software Defined Networking), an emerging technology. It isolates the control plane from the underlying data or forwarding plane to allow more efficient and customized network control with a global view of the underlying network. A variety of encryption algorithms created for network-level data encryption and decryption must be used in a PC network for every application communication to be encrypted at the transmission end and decrypted at the receiving end. Unfortunately, the time it takes to transform plain text into encrypted text due to encryption computations might slow down the performance of the communication protocol stack. This study aims to simulate and investigate the effects of encryption delay caused by encryption calculations on TCP and UDP transport layer protocols in an SDN network environment. We will consider and investigate performance measures including data, throughput, and end-to-end packet delay under the suggested SDN simulation settings using a realistic network simulator.


Keywords


ABE attribute-based encryption, CP-ABE ciphertext policy attribute-based encryption, CS cloud server, PK public key, RK retrieving key, SK secret key, TK transformation key, TCT transformed ciphertext

Full Text:

PDF

References


Mekki T, Jabri I, Rachedi A, Chaari L. Software‐defined networking in vehicular networks: A survey. Trans Emerg Telecommun Technol. 2022 Oct; 33(10): e4265.

Kaur S, Kumar K, Aggarwal N. Analysis of ddos attacks in software defined networking. In 2022 IEEE Delhi Section Conference (DELCON). 2022 Feb 11; 1–6.

Latif S, Usman M, Manzoor S, Iqbal W, Qadir J, Tyson G, Castro I, Razi A, Boulos MN, Weller A, Crowcroft J. Leveraging data science to combat COVID-19: A comprehensive review. IEEE Trans Artif Intell. 2020 Aug; 1(1): 85–103.

Priyadarsini M, Bera P. Software defined networking architecture, traffic management, security, and placement: A survey. Comput Netw. 2021 Jun 19; 192: 108047.

Nadeem M, Arshad A, Riaz S, Zahra SW, Dutta AK, Almotairi S. Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks. Appl Sci. 2022; 12(15): 7701.

Jangjou M, Sohrabi MK. A comprehensive survey on security challenges in different network layers in cloud computing. Arch Comput Methods Eng. 2022; 29(6): 3587–3608.

Alam A. Cloud-Based E-learning: Scaffolding the Environment for Adaptive E-learning Ecosystem Based on Cloud Computing Infrastructure. In Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021. Singapore: Springer Nature Singapore; 2022; 2: 1–9.

Seifert M, Kuehnel S, Sackmann S. Hybrid Clouds Arising from Software as a Service Adoption: Challenges, Solutions, and Future Research Directions. ACM Comput Surv. 2023; 55(11): 1–35.

Nadeem F. Evaluating and Ranking Cloud IaaS, PaaS and SaaS Models Based on Functional and Non-Functional Key Performance Indicators. IEEE Access. 2022; 10: 63245–63257.

Parast FK, Sindhav C, Nikam S, Yekta HI, Kent KB, Hakak S. Cloud computing security: A survey of service-based models. Comput Secur. 2022; 114: 102580.

Nadeem M, Arshad A, Riaz S, Wajiha Zahra S, Band SS, Mosavi A. Two layer symmetric cryptography algorithm for protecting data from attacks. Comput Mater Contin. 2022 Oct; 74(2): 2625–2640.

Mohammed CM, Zeebaree SR. Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: A review. Int J Sci Bus. 2021; 5(2): 17–30.

Mohammed AH, Khaleefah RM, Abdulateef IA. A review software defined networking for internet of things. In 2020 IEEE International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). 2020 Jun 26; 1–8.

Al Hayajneh A, Bhuiyan MZ, McAndrew I. Improving Internet of Things (IoT) security with software-defined networking (SDN). Computers. 2020 Feb 7; 9(1): 8.

Hauser F, Häberle M, Schmidt M, Menth M. P4-ipsec: Site-to-site and host-to-site VPN with IPSEC in p4-based SDN. IEEE Access. 2020 Jul 29; 8: 139567–86.

Arif M, Habib MA, Mahmood N, Tariq A, Ahmad M. Effect of Encryption Delay on FTP and VoIP Traffic Based on TCP/UDP. In Proceedings of International Conference on Information Technology and Applications: ICITA 2021. Singapore: Springer Nature Singapore. 2022 Apr 21; 573–582.

Durner R, Kellerer W. The cost of security in the SDN control plane. ACM CoNEXT 2015-Student Workshop 2015. Heidelberg, Germany. 2015, Dec 1. DOI: http://dx.doi.org/10.1145/2842665.2843563.

Usman M, Amin R, Aldabbas H, Alouffi B. Lightweight challenge-response authentication in SDN-based UAVs using elliptic curve cryptography. Electronics. 2022 Mar 25; 11(7): 1026.

Wulf F, Lindner T, Strahringer S, Westner M. IaaS, PaaS, or SaaS? The Why of Cloud Computing Delivery Model Selection: Vignettes on the Post-Adoption of Cloud Computing. In Proceedings of the 54th Hawaii International Conference on System Sciences. 2021; 6285–6294.

Jamjoom M, Abulkasim H, Abbas S. Lightweight Authenticated Privacy-Preserving Secure Framework for the Internet of Vehicles. Secur Commun Netw. 2022 Sep 9; 2022: 6573060.

Butt UA, Amin R, Mehmood M, Aldabbas H, Alharbi MT, Albaqami N. Cloud Security Threats and Solutions: A Survey. Wirel Pers Commun. 2023; 128(1): 387–413.

Aoudni Y, Donald C, Farouk A, Sahay KB, Babu DV, Tripathi V, Dhabliya D. Cloud security based attack detection using transductive learning integrated with Hidden Markov Model. Pattern Recognit Lett. 2022; 157: 16–26.

Nadeem M, Arshad A, Riaz S, Zahra SW, Dutta AK, Al Moteri M, Almotairi S. An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms. Comput Mater Contin. 2022; 74(2): 4059–4079.

Upadhyay D, Zaman M, Joshi R, Sampalli S. An efficient key management and multi-layered security framework for SCADA systems. IEEE Trans Netw Service Manag. 2021; 19(1): 642–660.

Zahra SW, Arshad A, Nadeem M, Riaz S, Dutta AK, Alzaid Z, Almotairi S, et al. Development of Security Rules and Mechanisms to Protect Data from Assaults. Appl Sci. 2022; 12(24): 12578.

Singh V, Pandey SK. Revisiting cloud security threats: replay attack. In 2018 IEEE 4th International Conference on Computing Communication and Automation (ICCCA). 2018 Dec; 1–6.

Tadapaneni NR. Cloud computing security challenges. Ssrn electronic journal. 2020; 7(6): 1–6.

Zaman Amirreza, Safarinejadian Behrouz. Security Analysis and Fault Detection Against Stealthy Replay Attacks. Int J Control. 2022; 95(6): 1562–1575.

Thirumavalavasethurayar P, Ravi Theaveraj. Implementation of Replay Attack in Controller Area Network Bus using Universal Verification Methodology. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India. 2021; 1142–1146. 10.1109/ICAIS50930.2021.9395871.

Nadeem M, Arshad A, Riaz S, Band SS, Mosavi A. Intercept the Cloud Network from Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access. 2021; 9: 152300–152309.

Musa A, Mahmood A. Client-side Cryptography Based Security for Cloud Computing System. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). 2021; 594–600.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517