SlideShare a Scribd company logo
1 of 27
Security Analysis of IEEE 802.21 Standard in
Software Defined Wireless Networking
THE 20TH INTERNATIONAL CONFERENCE ON COMPUTER
AND INFORMATION TECHNOLOGY (ICCIT 2017)
1ICCIT, Dhaka, Bangladesh December 22nd-24th
Asma Islam Swapna, Nazrul Islam
Presentation Summary
Objective of Work
SDN & MIH
SDN Security Aspect
Deployed Architecture
Evaluation
Conclusion & Future Work
References
2December 20nd-24thICCIT, Dhaka, Bangladesh
โ€ข To identify integration synergies between 802.21 and SDN in wireless
scenarios
โ€ข Focus: Handover optimization and multi-technology interfacing in
heterogeneous network
โ€ข Study Base: STRIDE Threat Model
ICCIT, Dhaka, Bangladesh December 22nd-24th 3
Objective of Work
Presentation Summary
Objective of Work
SDN & MIH
SDN Security Aspect
Deployed Architecture
Evaluation
Conclusion & Future Work
References
4December 22nd-24thICCIT, Dhaka, Bangladesh
Software Defined Networking (SDN)
Current Network
5
Specialized Packet
Forwarding Hardware
App App App
Specialized Packet
Forwarding Hardware
App App App
Specialized Packet
Forwarding Hardware
App App App
Specialized Packet
Forwarding Hardware
App App App Specialized Packet
Forwarding Hardware
Operating
System
Operating
System
Operating
System
Operating
System
Operating
System
App App App
Million of lines of source code
Billions of gates
Limitations ?
Source: Open Network Foundation NewsletterICCIT, Dhaka, Bangladesh December 22nd-24th
Software Defined Networking (SDN)
Source: Open Network Foundation Newsletter
Global Network View
Protocols Protocols
Control via
forwarding
interface
Network Operating System
Control Programs
Solution !
Operating System for Networks
SDN providing network
administration
Full hardware accessibility
ICCIT, Dhaka, Bangladesh December 22nd-24th 6
Software Defined Wireless Networking
2G ๏ƒ  3G ๏ƒ  4G ๏ƒ  5G ๏ƒ  Billions of device connected wirelessly
Heterogeneous Network
7
Debut of pop in 2005, 2013
ICCIT, Dhaka, Bangladesh December 22nd-24th
Emerging SDWN Protocols
Bigger the network, greater the challenge in
security management
8
MIH
BGP
OF-Config
NETCONF
NFV
4D
PCE
SANE-based
SDN
ArchitecturesSDN/SDWN
Protocols
Source: McAfee Labs, 2015
Efficient Routing
Configure Network Devices
Leverage SDWN/SDN
controller
ICCIT, Dhaka, Bangladesh December 22nd-24th
Using IEEE 802.21 (MIH) assists
SDN operations
โ€ข Datapath
โ€ข Maintains the flow table
โ€ข Processes incoming packets
โ€ข Link
โ€ข Interact with the network interfaces of the OpenFlow Switch
โ€ข Leveraged by Link Media Dependent Interface (LMDI) that translates MIM
OpenFlow messages into media specific commands
โ€ข OpenFlow Channel
โ€ข Establishes a connection with the OpenFlow Controller via
OpenFlow protocol
โ€ข Able to manage and to transmit events from the OpenFlow switch
to the OpenFlow Controller
ICCIT, Dhaka, Bangladesh December 22nd-24th 9
ICCIT, Dhaka, Bangladesh December 22nd-24th 10
Signal Overhead Analysis
Presentation Summary
Objective of Work
SDN & MIH
SDN Security Aspect
Deployed Architecture
Evaluation
Conclusion & Future Work
References
11ICCIT, Dhaka, Bangladesh December 22nd-24th
SDWN Security Aspects
ICCIT, Dhaka, Bangladesh 12December 22nd-24th
Security Challenges :
๏‚ง Attack on the centralized controller
๏‚ง Trust problem between controller and software applications
๏‚ง Attack on the communication channel between controller and devices
๏‚ง Conflicting flow rules
๏‚ง Forwarding loops
Security Challenge
Configure and managing large, scale-out, multi-domain, multi-
controller based SDWN from security attacks
13ICCIT, Dhaka, Bangladesh December 22nd-24th
Threat Models
Elicitations and analysis of security threats, mechanisms in
deployed designs and network
โ€ข DREAD โ€“ SQL Injections, Microsoft, OpenStack
โ€ข Octave โ€“ Large system and Application
โ€ข STRIDE โ€“ Network System and Application, Microsoft
โ€ข Generic Risk Model โ€“
โ€ข Guerilla Threat Modeling โ€“
โ€ข Process for Attack Simulation and Threat Analysis (PASTA) โ€“ last stage risk management
โ€ข Trike etc.
14ICCIT, Dhaka, Bangladesh December 22nd-24th
DFD elements can be vulnerable to one or
many STRIDE threats.
15
STRIDE & Data Flow Diagram (DFD)
FlowVisor Data Flow Diagram
Spoofing
Information
DIsclosure
Rrepudiation
Temparing
Denial of
Service
Elevation of
Privilege
STRIDE
Name STRIDE
vulnerability
Definition
Data Flow Yes Data sent among
network elements
Data Store Yes Stable Data
Process Yes
Programs or
applications that
configures the system
Interactors Yes
Endpoints out of
system scope to
control
Trust
Boundaries
Yes
Separation between
trusted and untrusted
elements of the
system
ICCIT, Dhaka, Bangladesh December 22nd-24th
Presentation Summary
Objective of Work
SDN & MIH
SDN Security Aspect
Deployed Architecture
Evaluation
Conclusion & Future Work
References
16ICCIT, Dhaka, Bangladesh December 22nd-24th
ICCIT, Dhaka, Bangladesh December 22nd-24th 17
Deployed Architecture
MIH handover framework provides
a set of optimization facilities and
functionalities
Network information flows
and controls are deployed
in all the linked network
resources
ICCIT, Dhaka, Bangladesh December 22nd-24th 18
Deployed Architecture
โ€ข OpenFlow Controller / PoS
โ€“ Perform routing related tasks, via
SDN
โ€“ Handle and control mobility
procedures, via IEEE 802.21
โ€ข OpenFlow device
โ€“ Forwarding related tasks
โ€“ Provides interfaces to control
and manage link layers,
regarding handover
management
โ€ข Mobile Node
โ€“ Provide interfaces to control and
manage link layers, via IEEE
802.21
Presentation Summary
Objective of Work
SDN & MIH
SDN Security Aspect
Deployed Architecture
Evaluation
Conclusion & Future Work
References
19ICCIT, Dhaka, Bangladesh December 22nd-24th
Evaluation
20ICCIT, Dhaka, Bangladesh December 22nd-24th
Compare with ticket based authentication and fast handover
mechanism by Li et. el?
Evaluation
21ICCIT, Dhaka, Bangladesh December 22nd-24th
Presentation Summary
Objective of Work
SDN & MIH
SDN Security Aspect
Deployed Architecture
Evaluation
Conclusion & Future Work
References
22ICCIT, Dhaka, Bangladesh December 22nd-24th
Conclusion
โ€ข When analyzed under light of 802.21 objectives
โ€ข SDN has some security vulnerabilities that could be
mitigated/protected
โ€ข 802.21 can optimize SDN flow handover in wireless environments
โ€ข 802.21 supported mobility allows for seamless handover in SDN flow
environments with preserved session privacy
โ€ข 802.21 packet flow has a lower overhead and higher forgery attack
resistance than OpenFlow
โ€ข Transporting MIH in UDP (with Ack service) has a message exchange
delay comparable with OpenFlow (TCP)
โ€ข Possibilities to adopt in IP based linked technologies
23ICCIT, Dhaka, Bangladesh December 22nd-24th
Future Work
24
SDWN appliance in largeer network, i. e. data center
Vulnerabilithy assessment in SDWN orchestration
Analyzing and controlling routing preferences for SDWN
ICCIT, Dhaka, Bangladesh
Network Management and Configuration research in SDWN
data center etc.
December 22nd-24th
References
L. M. C. Carlos J Bernardos, Antonio De La Oliva and H. Jin, โ€œAn architecture for software defined
wireless networking,โ€ IEEE Wireless Communications, vol. 21, no. 3, pp. 52โ€“61, 2014.
M. R. Sama, L. M. Contreras, J. Kaippallimalil, I. Akiyoshi, H. Qian, and H. Ni, โ€œSoftware-defined
control of the virtualized mobile packet core,โ€ IEEE Communications Magazine, vol. 53, no. 2, pp.
107โ€“115, 2015.
J. B. You Wang and K. Zhang, โ€œDesign and implementation of a software-defined mobility architecture
for ip networks,โ€ Mobile Networks and Applications, vol. 20, no. 1, pp. 40โ€“52, 2015.
I. Saadat, F. Buiati, D. R. Caหœnas, and L. J. G. Villalba, โ€œOverview of ieee 802.21 security issues for
mih networks,โ€ in ICIT 2011: Proceedings of the 5th International Conference on Information
Technology, 2011.
E. Piri and K. Pentikousis, โ€œIeee 802.21: media independent handover services,โ€ The Internet Protocol
Journal, vol. 12, no. 2, pp. 7โ€“27, 2009
25ICCIT, Dhaka, Bangladesh December 22nd-24th
QUESTIONS
ANSWERS
We are here to listen and speak !
Thanks!
Asma Islam Swapna
Twitter: @AsmaSwapna
Github: @AsmaSwapna
Tech Blog: blog.asmaswapna.com
ResearchGate: Asma_Swapna2
LinkedIn: asma0swapna
27ICCIT, Dhaka, Bangladesh December 22nd-24th

More Related Content

What's hot

A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
eSAT Journals
ย 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
ย 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
Editor IJARCET
ย 

What's hot (20)

IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
ย 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
ย 
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT SecurityA Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
ย 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
ย 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
ย 
An energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsAn energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocols
ย 
SDN-ppt-new
SDN-ppt-newSDN-ppt-new
SDN-ppt-new
ย 
35 9142 it s-execution evaluation of end-to-end edit septian
35 9142  it  s-execution evaluation of end-to-end edit septian35 9142  it  s-execution evaluation of end-to-end edit septian
35 9142 it s-execution evaluation of end-to-end edit septian
ย 
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET- Enhancing Network Security by Modified Secure Dynamic Path IdentifiersIRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
ย 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
ย 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
ย 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
ย 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environment
ย 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
ย 
SDN Landscape and Challenges
SDN Landscape and ChallengesSDN Landscape and Challenges
SDN Landscape and Challenges
ย 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
ย 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
ย 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
ย 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
ย 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
ย 

Similar to Security Analysis of IEEE 802.21 Standard in Software Defined Wireless Networking

Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
ย 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Fernando Velez Varela
ย 
1570272924-3
1570272924-31570272924-3
1570272924-3
Raluca Ciungu
ย 
Synopsis Lokesh Pawar.pptx
Synopsis Lokesh Pawar.pptxSynopsis Lokesh Pawar.pptx
Synopsis Lokesh Pawar.pptx
RahulSingh190790
ย 
Software-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingSoftware-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to Networking
Anju Ann
ย 
Rui aguiarphd proposal
Rui aguiarphd proposalRui aguiarphd proposal
Rui aguiarphd proposal
KellyCheah
ย 
NovelFrameworkforResourceDiscoveryandSelf-ConfigurationinSoftwareDefinedWirel...
NovelFrameworkforResourceDiscoveryandSelf-ConfigurationinSoftwareDefinedWirel...NovelFrameworkforResourceDiscoveryandSelf-ConfigurationinSoftwareDefinedWirel...
NovelFrameworkforResourceDiscoveryandSelf-ConfigurationinSoftwareDefinedWirel...
Fernando Velez Varela
ย 

Similar to Security Analysis of IEEE 802.21 Standard in Software Defined Wireless Networking (20)

Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
ย 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
ย 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
ย 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
ย 
Akash rajguru project report sem VI
Akash rajguru project report sem VIAkash rajguru project report sem VI
Akash rajguru project report sem VI
ย 
1570272924-3
1570272924-31570272924-3
1570272924-3
ย 
Survey of optimizing dynamic virtual local area network algorithm for softwar...
Survey of optimizing dynamic virtual local area network algorithm for softwar...Survey of optimizing dynamic virtual local area network algorithm for softwar...
Survey of optimizing dynamic virtual local area network algorithm for softwar...
ย 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIAN
ย 
Software defined networking introduction
Software defined networking introductionSoftware defined networking introduction
Software defined networking introduction
ย 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES โ€“ ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES โ€“ ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES โ€“ ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES โ€“ ISSUES A...
ย 
Synopsis Lokesh Pawar.pptx
Synopsis Lokesh Pawar.pptxSynopsis Lokesh Pawar.pptx
Synopsis Lokesh Pawar.pptx
ย 
Software-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingSoftware-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to Networking
ย 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
ย 
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
ย 
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksProposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
ย 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
ย 
Call for Paper - 3rd International Conference on Networks, Blockchain and Int...
Call for Paper - 3rd International Conference on Networks, Blockchain and Int...Call for Paper - 3rd International Conference on Networks, Blockchain and Int...
Call for Paper - 3rd International Conference on Networks, Blockchain and Int...
ย 
OpenFlow Aware Network Processor
OpenFlow Aware Network ProcessorOpenFlow Aware Network Processor
OpenFlow Aware Network Processor
ย 
Rui aguiarphd proposal
Rui aguiarphd proposalRui aguiarphd proposal
Rui aguiarphd proposal
ย 
NovelFrameworkforResourceDiscoveryandSelf-ConfigurationinSoftwareDefinedWirel...
NovelFrameworkforResourceDiscoveryandSelf-ConfigurationinSoftwareDefinedWirel...NovelFrameworkforResourceDiscoveryandSelf-ConfigurationinSoftwareDefinedWirel...
NovelFrameworkforResourceDiscoveryandSelf-ConfigurationinSoftwareDefinedWirel...
ย 

Recently uploaded

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
amitlee9823
ย 
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
dharasingh5698
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 

Recently uploaded (20)

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
ย 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 

Security Analysis of IEEE 802.21 Standard in Software Defined Wireless Networking

  • 1. Security Analysis of IEEE 802.21 Standard in Software Defined Wireless Networking THE 20TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2017) 1ICCIT, Dhaka, Bangladesh December 22nd-24th Asma Islam Swapna, Nazrul Islam
  • 2. Presentation Summary Objective of Work SDN & MIH SDN Security Aspect Deployed Architecture Evaluation Conclusion & Future Work References 2December 20nd-24thICCIT, Dhaka, Bangladesh
  • 3. โ€ข To identify integration synergies between 802.21 and SDN in wireless scenarios โ€ข Focus: Handover optimization and multi-technology interfacing in heterogeneous network โ€ข Study Base: STRIDE Threat Model ICCIT, Dhaka, Bangladesh December 22nd-24th 3 Objective of Work
  • 4. Presentation Summary Objective of Work SDN & MIH SDN Security Aspect Deployed Architecture Evaluation Conclusion & Future Work References 4December 22nd-24thICCIT, Dhaka, Bangladesh
  • 5. Software Defined Networking (SDN) Current Network 5 Specialized Packet Forwarding Hardware App App App Specialized Packet Forwarding Hardware App App App Specialized Packet Forwarding Hardware App App App Specialized Packet Forwarding Hardware App App App Specialized Packet Forwarding Hardware Operating System Operating System Operating System Operating System Operating System App App App Million of lines of source code Billions of gates Limitations ? Source: Open Network Foundation NewsletterICCIT, Dhaka, Bangladesh December 22nd-24th
  • 6. Software Defined Networking (SDN) Source: Open Network Foundation Newsletter Global Network View Protocols Protocols Control via forwarding interface Network Operating System Control Programs Solution ! Operating System for Networks SDN providing network administration Full hardware accessibility ICCIT, Dhaka, Bangladesh December 22nd-24th 6
  • 7. Software Defined Wireless Networking 2G ๏ƒ  3G ๏ƒ  4G ๏ƒ  5G ๏ƒ  Billions of device connected wirelessly Heterogeneous Network 7 Debut of pop in 2005, 2013 ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 8. Emerging SDWN Protocols Bigger the network, greater the challenge in security management 8 MIH BGP OF-Config NETCONF NFV 4D PCE SANE-based SDN ArchitecturesSDN/SDWN Protocols Source: McAfee Labs, 2015 Efficient Routing Configure Network Devices Leverage SDWN/SDN controller ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 9. Using IEEE 802.21 (MIH) assists SDN operations โ€ข Datapath โ€ข Maintains the flow table โ€ข Processes incoming packets โ€ข Link โ€ข Interact with the network interfaces of the OpenFlow Switch โ€ข Leveraged by Link Media Dependent Interface (LMDI) that translates MIM OpenFlow messages into media specific commands โ€ข OpenFlow Channel โ€ข Establishes a connection with the OpenFlow Controller via OpenFlow protocol โ€ข Able to manage and to transmit events from the OpenFlow switch to the OpenFlow Controller ICCIT, Dhaka, Bangladesh December 22nd-24th 9
  • 10. ICCIT, Dhaka, Bangladesh December 22nd-24th 10 Signal Overhead Analysis
  • 11. Presentation Summary Objective of Work SDN & MIH SDN Security Aspect Deployed Architecture Evaluation Conclusion & Future Work References 11ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 12. SDWN Security Aspects ICCIT, Dhaka, Bangladesh 12December 22nd-24th Security Challenges : ๏‚ง Attack on the centralized controller ๏‚ง Trust problem between controller and software applications ๏‚ง Attack on the communication channel between controller and devices ๏‚ง Conflicting flow rules ๏‚ง Forwarding loops
  • 13. Security Challenge Configure and managing large, scale-out, multi-domain, multi- controller based SDWN from security attacks 13ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 14. Threat Models Elicitations and analysis of security threats, mechanisms in deployed designs and network โ€ข DREAD โ€“ SQL Injections, Microsoft, OpenStack โ€ข Octave โ€“ Large system and Application โ€ข STRIDE โ€“ Network System and Application, Microsoft โ€ข Generic Risk Model โ€“ โ€ข Guerilla Threat Modeling โ€“ โ€ข Process for Attack Simulation and Threat Analysis (PASTA) โ€“ last stage risk management โ€ข Trike etc. 14ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 15. DFD elements can be vulnerable to one or many STRIDE threats. 15 STRIDE & Data Flow Diagram (DFD) FlowVisor Data Flow Diagram Spoofing Information DIsclosure Rrepudiation Temparing Denial of Service Elevation of Privilege STRIDE Name STRIDE vulnerability Definition Data Flow Yes Data sent among network elements Data Store Yes Stable Data Process Yes Programs or applications that configures the system Interactors Yes Endpoints out of system scope to control Trust Boundaries Yes Separation between trusted and untrusted elements of the system ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 16. Presentation Summary Objective of Work SDN & MIH SDN Security Aspect Deployed Architecture Evaluation Conclusion & Future Work References 16ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 17. ICCIT, Dhaka, Bangladesh December 22nd-24th 17 Deployed Architecture MIH handover framework provides a set of optimization facilities and functionalities Network information flows and controls are deployed in all the linked network resources
  • 18. ICCIT, Dhaka, Bangladesh December 22nd-24th 18 Deployed Architecture โ€ข OpenFlow Controller / PoS โ€“ Perform routing related tasks, via SDN โ€“ Handle and control mobility procedures, via IEEE 802.21 โ€ข OpenFlow device โ€“ Forwarding related tasks โ€“ Provides interfaces to control and manage link layers, regarding handover management โ€ข Mobile Node โ€“ Provide interfaces to control and manage link layers, via IEEE 802.21
  • 19. Presentation Summary Objective of Work SDN & MIH SDN Security Aspect Deployed Architecture Evaluation Conclusion & Future Work References 19ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 20. Evaluation 20ICCIT, Dhaka, Bangladesh December 22nd-24th Compare with ticket based authentication and fast handover mechanism by Li et. el?
  • 22. Presentation Summary Objective of Work SDN & MIH SDN Security Aspect Deployed Architecture Evaluation Conclusion & Future Work References 22ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 23. Conclusion โ€ข When analyzed under light of 802.21 objectives โ€ข SDN has some security vulnerabilities that could be mitigated/protected โ€ข 802.21 can optimize SDN flow handover in wireless environments โ€ข 802.21 supported mobility allows for seamless handover in SDN flow environments with preserved session privacy โ€ข 802.21 packet flow has a lower overhead and higher forgery attack resistance than OpenFlow โ€ข Transporting MIH in UDP (with Ack service) has a message exchange delay comparable with OpenFlow (TCP) โ€ข Possibilities to adopt in IP based linked technologies 23ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 24. Future Work 24 SDWN appliance in largeer network, i. e. data center Vulnerabilithy assessment in SDWN orchestration Analyzing and controlling routing preferences for SDWN ICCIT, Dhaka, Bangladesh Network Management and Configuration research in SDWN data center etc. December 22nd-24th
  • 25. References L. M. C. Carlos J Bernardos, Antonio De La Oliva and H. Jin, โ€œAn architecture for software defined wireless networking,โ€ IEEE Wireless Communications, vol. 21, no. 3, pp. 52โ€“61, 2014. M. R. Sama, L. M. Contreras, J. Kaippallimalil, I. Akiyoshi, H. Qian, and H. Ni, โ€œSoftware-defined control of the virtualized mobile packet core,โ€ IEEE Communications Magazine, vol. 53, no. 2, pp. 107โ€“115, 2015. J. B. You Wang and K. Zhang, โ€œDesign and implementation of a software-defined mobility architecture for ip networks,โ€ Mobile Networks and Applications, vol. 20, no. 1, pp. 40โ€“52, 2015. I. Saadat, F. Buiati, D. R. Caหœnas, and L. J. G. Villalba, โ€œOverview of ieee 802.21 security issues for mih networks,โ€ in ICIT 2011: Proceedings of the 5th International Conference on Information Technology, 2011. E. Piri and K. Pentikousis, โ€œIeee 802.21: media independent handover services,โ€ The Internet Protocol Journal, vol. 12, no. 2, pp. 7โ€“27, 2009 25ICCIT, Dhaka, Bangladesh December 22nd-24th
  • 26. QUESTIONS ANSWERS We are here to listen and speak !
  • 27. Thanks! Asma Islam Swapna Twitter: @AsmaSwapna Github: @AsmaSwapna Tech Blog: blog.asmaswapna.com ResearchGate: Asma_Swapna2 LinkedIn: asma0swapna 27ICCIT, Dhaka, Bangladesh December 22nd-24th

Editor's Notes

  1. Different protocols used for different perspectives