Visible to the public Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things

TitleEnabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things
Publication TypeConference Paper
Year of Publication2022
AuthorsRivera, Abel O. Gomez, White, Evan M., Acosta, Jaime C., Tosh, Deepak
Conference Name2022 IEEE Conference on Dependable and Secure Computing (DSC)
Keywordsauthentication, Behavior-based Authentication, Behavioral sciences, human factors, Internet, iobt, military computing, Network Traffic Management, Protocols, pubcrawl, Real-time Systems, resilience, Resiliency, Scalability, SDN, telecommunication traffic
AbstractMilitary networks consist of heterogeneous devices that provide soldiers with real-time terrain and mission intel-ligence. The development of next-generation Software Defined Networks (SDN)-enabled devices is enabling the modernization of traditional military networks. Commonly, traditional military networks take the trustworthiness of devices for granted. How-ever, the recent modernization of military networks introduces cyber attacks such as data and identity spoofing attacks. Hence, it is crucial to ensure the trustworthiness of network traffic to ensure the mission's outcome. This work proposes a Continuous Behavior-based Authentication (CBA) protocol that integrates network traffic analysis techniques to provide robust and efficient network management flow by separating data and control planes in SDN-enabled military networks. The evaluation of the CBA protocol aimed to measure the efficiency of the proposed protocol in realistic military networks. Furthermore, we analyze the overall network overhead of the CBA protocol and its accuracy to detect rogue network traffic data from field devices.
DOI10.1109/DSC54232.2022.9888903
Citation Keyrivera_enabling_2022