Title | Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Rivera, Abel O. Gomez, White, Evan M., Acosta, Jaime C., Tosh, Deepak |
Conference Name | 2022 IEEE Conference on Dependable and Secure Computing (DSC) |
Keywords | authentication, Behavior-based Authentication, Behavioral sciences, human factors, Internet, iobt, military computing, Network Traffic Management, Protocols, pubcrawl, Real-time Systems, resilience, Resiliency, Scalability, SDN, telecommunication traffic |
Abstract | Military networks consist of heterogeneous devices that provide soldiers with real-time terrain and mission intel-ligence. The development of next-generation Software Defined Networks (SDN)-enabled devices is enabling the modernization of traditional military networks. Commonly, traditional military networks take the trustworthiness of devices for granted. How-ever, the recent modernization of military networks introduces cyber attacks such as data and identity spoofing attacks. Hence, it is crucial to ensure the trustworthiness of network traffic to ensure the mission's outcome. This work proposes a Continuous Behavior-based Authentication (CBA) protocol that integrates network traffic analysis techniques to provide robust and efficient network management flow by separating data and control planes in SDN-enabled military networks. The evaluation of the CBA protocol aimed to measure the efficiency of the proposed protocol in realistic military networks. Furthermore, we analyze the overall network overhead of the CBA protocol and its accuracy to detect rogue network traffic data from field devices. |
DOI | 10.1109/DSC54232.2022.9888903 |
Citation Key | rivera_enabling_2022 |