Affiliation:
1. Department of Computer Science and Engineering, University of Bologna, 40136 Bologna, Italy
Abstract
The recent widespread novel network technologies for programming data planes are remarkably enhancing the customization of data packet processing. In this direction, the Programming Protocol-independent Packet Processors (P4) is envisioned as a disruptive technology, capable of configuring network devices in a highly customizable way. P4 enables network devices to adapt their behaviors to mitigate malicious attacks (e.g., denial of service). Distributed ledger technologies (DLTs), such as blockchain, allow secure reporting alerts on malicious actions detected across different areas. However, the blockchain suffers from major scalability concerns due to the consensus protocols needed to agree on a global state of the network. To overcome these limitations, new solutions have recently emerged. IOTA is a next-generation distributed ledger engineered to tackle the scalability limits while still providing the same security capabilities such as immutability, traceability, and transparency. This article proposes an architecture that integrates a P4-based data plane software-defined network (SDN) and an IOTA layer employed to notify about networking attacks. Specifically, we propose a fast, secure, and energy-efficient DLT-enabled architecture that combines the IOTA data structure, named Tangle, with the SDN layer to detect and notify about network threats.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference36 articles.
1. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework;Osanaiye;J. Netw. Comput. Appl.,2016
2. Evolution of Internet of Things From Blockchain to IOTA: A Survey;Alshaikhli;IEEE Access,2022
3. Auhl, Z., Chilamkurti, N., Alhadad, R., and Heyne, W. (2022). A Comparative Study of Consensus Mechanisms in Blockchain for IoT Networks. Electronics, 11.
4. A security and performance analysis of proof-based consensus protocols;Rebello;Ann. Telecommun.,2021
5. A comprehensive survey of vulnerability and information security in SDN;Deb;Comput. Netw.,2022
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献