Next Article in Journal
Recent Advances in Fabrication Methods for Flexible Antennas in Wearable Devices: State of the Art
Next Article in Special Issue
IPSCL: An Accurate Indoor Positioning Algorithm Using Sensors and Crowdsourced Landmarks
Previous Article in Journal
Robust Noise Suppression Technique for a LADAR System via Eigenvalue-Based Adaptive Filtering
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Concept Paper

Packet Key-Based End-to-End Security Management on a Blockchain Control Plane

1
School of Information, Communications and Electronics Engineering, The Catholic University of Korea, 43 Jibong-ro, Bucheon-si, Gyeonggi-do 14662, Korea
2
College of Computer Studies, De La Salle University, 2401 Taft Avenue, Manila 1004, Philippines
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(10), 2310; https://doi.org/10.3390/s19102310
Submission received: 25 April 2019 / Revised: 17 May 2019 / Accepted: 17 May 2019 / Published: 19 May 2019

Abstract

:
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome the limitation that the existing vertical model, as well as the Software-Defined Networking (SDN) based horizontal model, confronts within solving end-to-end security management. The proposed blockchain-based security management (BSM) scheme enables each peer to easily obtain the necessary parameters required to manage the packet key-based security system. The important features of the BSM scheme include the renewal process, which enables the different packet data streams to use completely different security parameters for the security management. In addition, because even blind values cannot be exposed to the possible attackers, our BSM scheme guarantees very secure end-to-end data transfer against active attacks such as falsification of data and transactions. Finally, this paper compares the BSM scheme with the existing vertical model to prove the advantageous effects on latency.

1. Introduction

The main feature of the Long Term Evolution (LTE) system is to use two independent planes where the signaling information process is done by control plane and the user data process is done by a user data plane [1,2,3,4,5]. As depicted in Figure 1, security management functions are based on the vertical model which uses distributed servers such as Mobility Management Entities (MMEs) and Home Subscriber Servers (HSSs) in LTE networks. Thus, the integrated operation of network control on the control plane enables security management functions to be efficiently implemented within the range of local LTE networks. However, for the end-to-end security management throughout the Internet, different solutions have been explored to use the horizontal network function model [6,7,8,9].
The existing Session Initiation Protocol (SIP) based Voice over Internet Protocol (VoIP) call system uses the vertical model to handle the security management where multiple servers distributed over networks collaborate to control a secure session between the end-to-end peers. The Internet Engineering Task Force (IETF)’s direction is to use the horizontal model. One of the horizontal models introduced for the future 5G mobile networks is Software-Defined Networking (SDN) [10,11,12,13]. SDN is an emerging networking paradigm that changes the limitations of the existing vertical model including LTE network control model, which separates the network’s control plane from the data plane [14]. In SDN, the control plane is implemented in a logically centralized controller, simplifying the policy enforcement and network function configuration. The centralized network controller in the control plane manages the intelligence and state of the entire network for the network functions such as security management and mobility management [15,16]. However, the current network legacy devices are not yet ready to implement the horizontal model [17,18,19,20].
The goal of this paper is to develop a blockchain-based security management (BSM) scheme which utilizes a packet key-based system to perform better and extends the scope in security management from the local area to the end-to-end security service range. As depicted in Figure 2, our BSM structure is close to the administrative control that the SDN-based horizontal model operates with. However, while the software-defined controller on the control plane functions as the control center, the BSM scheme utilizes one of the most innovative features of the blockchain where there is no central server running. BSM operates between two end-to-end peers without environments of the distributed servers and the centralized controller [21,22]. Thus, this idea gives significantly advantageous effects on the end-to-end security management by reducing the complexity of the system deployment and latency taken for the end-to-end secure session set up. From the latency viewpoints, our BSM scheme is more advantageous in security management because security parameter agreements between end-to-end peers can be easily obtained via blockchain. Furthermore, considering low latency of 1 ms in 5G networks (10 to 20 ms for 4G), our BSM scheme is more useful in 5G environments because it requires less computational load during secure session setup and the latency to the setup secure session is mainly affected by the network delay components [23,24,25].
The rest of this paper is organized as follows. In Section 2, this paper proposes and explains the BSM scheme. Then, Section 3 describes the improvement effects of the proposed BSM scheme. This paper will be concluded in Section 4.

2. Blockchain-Based Security Management (BSM) Scheme

2.1. Security Management on the Blockchain Control Plane

As shown in Figure 3, the blockchain-based security management (BSM) network architecture explains the feature of the control plane. The steps to run the network are as follows:
  • New transactions, which include ToALL Tx and Peer-fitted Tx, are sent to the nearest super node (SN). After the SN receives the transaction message, it broadcasts the message to all SNs. Each transaction message contains several pieces of field data for security management, which will be described later.
  • Like Bitcoin, our BSM scheme uses the consensus algorithm of PoW (Proof of Work). Thus, the PoW mining involves numerous hashing attempts. In the BSM network SNs are only able to add a new block to the blockchain if the distributed SNs reach consensus and agree that the block has provided by the miner is a valid proof of work. Differently from Bitcoin SNs are pre-determined at the stage of the system deployment. In addition, the BSM scheme limits the average block creation period within 1 second. The SN collects new transactions into a block and performs on finding a proof-of-work for its block. There are two kinds of blockchains: full blockchain and block-header chain. Here, the SN maintains the full blockchain while EN usually maintains the block-header chain. Later, when the end node (EN) needs a certain transactio information, it sends a query message to the nearest SN. Then, the SN searches the corresponding transaction data from the full blockchain and sends replies to the EN.
  • When an SN finds a proof-of-work, it broadcasts the block to all SNs.
  • SNs accept the block only if all transactions in it are valid.
  • Nodes imply their acceptance of the block by working on creating the next necessary block in the chain, using the hash of the accepted block as the previous hash. SNs and ENs will always keep working on extending full blockchains and block-header chains respectively.
  • The EN is responsible for updating its valid information for security management by pushing them into the blockchain. The valid information is contained in either ToALL Tx or Peer-fitted Tx.
Here, we define the latency from the moment a new transaction is announced to the network until the event that the transaction successfully gets in the blockchain as Time-to-Get-in-Blockchain ( T G i n B ). It is easy to adjust the average of TGinB value by controlling the block creation difficulty because our BSM scheme is based on the private blockchain among the SNs differently from the public blockchain where at least 51% miners have to agree for changing the difficulty [26]. Our BSM scheme adjusts this difficulty to target 1 second between blocks. The period of 1 second for T G i n B means that it only takes 1 second on average for a certain EN’s new information for security management to become available to other ENs since the transaction information becomes valid on the blockchain after 1 second from the moment when the transaction was sent to the network.

2.2. BSM Wallet

The following information, which is maintained in the wallet, is used for the security management.
  • Prime number (q) and primitive root ( α ): global parameters in the Diffie–Hellman key exchange.
  • An array of secret values ( X E N s), that is, Secret Value Vector (SVV), for packet key agreements.
The tasks performed by the wallet software also include:
  • generates the corresponding public key ( p u b K e y ) and the hash address ( M y _ H a s h _ A d d r ),
  • generates an array of blind keys ( Y E N s), that is, Blind Value Vector (BVV), using the equation of Y E N = α X E N m o d q .
  • generates an array of index values ( H E N s), that is, Blind Value Hash Table (BVHT), using the equation of H E N = Hash( Y E N ). ‘Hash’ is a one-way hash function which accepts the blind value as input ( Y E N ) and produces a fixed-size message digest as output ( H E N ).

2.3. Security Parameter Agreement between Peers by Using Blockchain

Transactions, which grow without ceasing, are stored into a distributed database called the blockchain. There are two types of transactions: ToALL Tx and Peer-fitted Tx. Each EN sends its ToALL Tx to the network in advance. This process belongs to the registration step. Then, the ToALL Tx allows a certain session initiator to reach the ToALL transaction information of the session responder. The Peer-fitted Tx is sent to the network in order that the session responder obtains the session initiator’s Tx information during the session initiation stage. As illustrated in Figure 4, the BSM transaction consists of Transaction Input (TxIn) and Transaction Output (TxOut). The TxIn contains the signature and the public key computed from the EN’s private key which creates the transaction. The first field of TxOut contains the hash address that identifies the owner of this transaction.
Figure 5 illustrates how the SNs handles ToALL Txs and Peer-fitted Txs to establish the packet key-based secure session. Each EN, which needs the blockchain-based security management services, should store its ToALL Tx information into the blockchain in the pre-session stage. This process belongs to ToALL Tx initialization stage. Now, let’s assume the case that E N A wants to set up a packet key-based secure session with E N B . E N A first uses the Query/Reply procedure to obtain the E N B ’s ToALL Tx information. After E N A succeeds to obtain E N B ’s ToALL Tx information, it sends the secure session request message destined to E N B along with sending the Peer-fitted Tx to the network. When E N B receives the secure session request message from E N A , it extracts the Peer-fitted Tx from the blockchain. Then, all parameters for security management are agreed between the peers. Then, both peers renew their ToALL Txs. As a result of this renewal process, every session uses a different set of security parameters which contribute to guarantee a much more secure session.

2.4. Ever-Growing Series of Blocks and Blockchain Access

2.4.1. Creation of ToALL Tx Blocks

The blockchain is a distributed database holding all the BSM transactions, that is, ToALL and Peer-fitted Txs, and keeps them secure. Figure 6 explains how the ToALL Tx information is stored in the blockchain. When a BSM application of E N A begins to work, E N A creates and maintains m-sized Secret Value Vector of E N A , S V V A = [ ( 1 , X A , 1 ) , ( 2 , X A , 2 ) , ( 3 , X A , 3 ) , , ( m , X A , m ) ] . Then, E N A calculates corresponding Blind Value Vector of E N A , B V V A = [ ( 1 , Y A , 1 ) , ( 2 , Y A , 2 ) , ( 3 , Y A , 3 ) , , ( m , Y A , m ) ] where Y A , i = α A X A , i m o d q A , i = 1 , 2 , 3 , , m . E N A sends ToALL Tx, which contains the value field of global parameters ( α A , q A ) and B V V A , to the network expecting that those values are successfully stored in the blockchain within 1 second. Because of this registration process, the ToALL Tx information converts to public status so that any peer EN can be available to reach that ToALL Tx via the blockchain.

2.4.2. Obtaining the Peer’s Information for Security Management

The procedure of a secure session establishment begins with the Query/Reply mechanism to obtain the peer’s information for security management. Figure 7 shows how E N A as a session initiator obtains the session responder E N B ’s information. E N A send Query for E N B ’s ToALL information to the nearest SN. Because E N B already registered its ToALL Tx to the blockchain, E N A can receive the reply of E N B ’s ToALL information from its nearest SN. Therefore, E N A can obtain <Values> in E N B ’s ToALL Tx: ( α B , q B ) and B V V B .

2.4.3. Creation of Peer-Fitted Block

Because of the Query/Reply mechanism, E N A obtains ( α B , q B ) and B V V B . Here, for the scalability of our BSM scheme, it is assumed that the session initiator and the session responder use different global parameters. This means that our BSM scheme can be used to secure end-to-end peers which belong to different groups. If the BSM scheme operates between end-to-end peers in the same group, the use of the Peer-fitted Tx is not necessary. Because the BSM scheme is scalable, it requires the additional steps to handle the Peer-fitted Tx. The additional steps are as follows.
  • The session initiator creates the Peer-fitted Tx.
  • The session initiator sends the Peer-fitted Tx to the network.
  • Some SN create a new block, which includes the Peer-fitted Tx and uses it to extend the blockchain.
  • The session responder finally extracts the Peer-fitted Tx from the blockchain.
Those steps contribute to increase latency to complete the procedure of the secure session setup. This increased latency issue results in limitation of the BSM scheme.
Then, using ( α B , q B ) , E N A calculates B V V A of [ ( 1 , Y A , 1 ) , ( 2 , Y A , 2 ) , ( 3 , Y A , 3 ) , , ( m , Y A , m ) ] based on S V V A of [ ( 1 , X A , 1 ) , ( 2 , X A , 2 ) , ( 3 , X A , 3 ) , , ( m , X A , m ) ] . As shown in Figure 8, E N A sends Peer-fitted Tx to the network where the Tx contains B V V A where the component of Y A , i is calculated by using the equation of α B X A , i m o d q B . When (5) Secure session request arrives at E N B , E N B can obtain B V V A via (6) Extract Peer-fitted Tx and (7) Reply.

2.4.4. Security Parameter Agreements between Peers

As shown in Figure 9, E N B can maintain security-related parameters: S V V B , B V V A , and the index table of B V H T B . Here, H B , i , which is the hashed value of Y B , i , can be used as the index of security parameters selected. In addition, E N A side can use security-related parameters: S V V A , B V V B , and the index table of B V H T A . Now, both sides are ready to use the packet-key system.

2.4.5. Renewal Process for the Security Parameters

The secure aspect of our BSM system is due to the fact that each secure session establishment procedure uses the different set of security parameters: S V V , B V V , and B V H T . Each EN uses a different S V V of [ ( 1 , X 1 ) , ( 2 , X 2 ) , ( 3 , X 3 ) , , ( m , X m ) ] every session. This means that once S V V is used, the previous S V V is replaced with new S V V * . Thus, the B V V * , which calculated from the new S V V * , needs to be made public. This is the ToALL Tx renewal process shown in Figure 10. E N A creates S V V A * of [ ( 1 , X A , 1 * ) , ( 2 , X A , 2 * ) , ( 3 , X A , 3 * ) , , ( m , X A , m * ) ] and calculates the corresponding B V V A * of [ ( 1 , Y A , 1 * ) , ( 2 , Y A , 2 * ) , ( 3 , Y A , 3 * ) , , ( m , Y A , m ) * ] using the equation of Y A , i * = α A X A , i * m o d q A . Then, the ToALL Tx, which includes the value field of ( α A , q A ) and B V V A * , is sent to the network.

2.5. Operation of the Packet Key Bbased Secure Data Session

Figure 11 explains how the proposed scheme encrypts the whole session by applying a different packet key to each datagram under the condition that E N A and E N B maintain [ ( 1 , X A , 1 ) , ( 2 , X A , 2 ) , ( 3 , X A , 3 ) , , ( m , X A , m ) ] and [ ( 1 , X B , 1 ) , ( 2 , X B , 2 ) , ( 3 , X B , 3 ) , . . . ( m , X B , m ) ] , respectively. In addition, E N A and E N B are ready to use [ ( 1 , Y B , 1 ) , ( 2 , Y B , 2 ) , ( 3 , Y B , 3 ) , , ( m , Y B , m ) ] and [ ( 1 , Y A , 1 ) , ( 2 , Y A , 2 ) , ( 3 , Y A , 3 ) , ( m , Y A , m ) ] , respectively. Then, when E N A starts to send nth datagram to E N B , E N A selects an index value randomly. Here, we assume that g is selected. Then, E N A computes the packet key of K A , g using the equation of Y B , g X A , g m o d q B . Now, E N A can encrypt the nth datagram using the resultant packet key which results in E (nth datagram, K A , g ), where E is any symmetrical key encryption algorithm. Finally, E N A sends the encrypted nth datagram together with the index value of g. When E N B receives the encrypted nth datagram from E N A , E N B finds the index value of g. Then, E N B computes the packet key of K B , g using the equation of Y A , g X B , g m o d q B . Now, E N B can decrypt the encrypted nth datagram using the resultant packet key, which results in D(E(nth datagram, K A , g ), K B , g ), where D is the same symmetrical key Decryption algorithm as E N A . Finally, E N B obtains the nth datagram.

3. Improvement Effects of the Proposed BSM Scheme

3.1. Effects on Security

The most attractive feature of the packet key scheme is that there is little chance to reuse the same packet key for a continuous packet data stream. Additional advantageous effects are as follows. As shown in Figure 10, the renewal process of the BSM scheme enables the different packet data session to use completely different security parameters for security management. Therefore, our BSM scheme is secure against the powerful eavesdroppers who use brute-force approaches even to try after-transmission attacks. Our BSM scheme also uses BVHT to indicate the index value associated with the packet key used. The one-way hash function accepts the blind value selected from the BVV as input and produces a fixed-size hash value as output, which is used as the index value. As shown in Figure 11, each datagram in a secure datagram flow contains the corresponding index value for a certain blind value. This means that our BSM scheme protects the blind values while the existing Diffie–Hellman key exchange method exposes the blind values. Instead of the blind values, exposing the hash values to the possible attackers contributes to our BSM scheme to lead to very secure end-to-end data transfer systems against active attacks such as falsification of data and transactions.

3.2. Effects on Latency

In SIP-based VoIP call operation, an end user sends SIP requests to initiate a session. Figure 12 shows a series of steps required to complete a packet key-based secure VoIP session set up between two ENs.
This paper calls the existing SIP plus packet key model shown in Figure 12 a “vertical model”. Some assumptions are necessary to perform the comparative analysis with respect to total latency to complete security management between E N A and E N B , where they are located in different domains. This paper assumes three types of delays, that is (1) T I n t r a : intra-domain delay caused in intra-domain links, (2) T E 2 E : end-to-end delay caused in end-to-end path, (3) T B V V : processing delay caused to compute B V V , and (4) T G i n B : latency for creating a block.
Table 1 shows comparisons on latency needed to set up a packet key-based secure session between the proposed BSM model, the non-scalable BSM model, and the vertical model. Figure 13 shows the secure session setup procedure for the non-scalable BSM scheme. Compared to the proposed BSM scheme in Figure 5, it is shown that the secure session setup procedure for the non-scalable BSM scheme is much simpler.
The latency of T B V V changes depending on the size of B V V as well as the size of the secret value. Here, the size of the secret value, as well as the blind value, is the same as that of the packet key. Recall that calculating each component of the B V V needs the corresponding latency for the computation of α A X A , i m o d q A . Table 2 shows experimental data on computational latency needed to compute each blind value for a given secret value. The results were obtained from the testbed with 2.2GHz i7-8750H CPU. Then, the m-sized B V V requires m times the above latency.
Figure 14 plots the total latency to set up the packet key-based secure session in the BSM model, which corresponds to the latency of 2 T I n t r a + 1 T B V V + 1 T G i n B . Here, we assume that 2 × T I n t r a is 0.4 s and T G i n B is one second.
Figure 15 plots the total latency to set up the packet key-based secure session in the non-scalable BSM model, which corresponds the latency of 4 T I n t r a + 1 T E 2 E . Here, we assume that 4 × T I n t r a is 0.8 s and T E 2 E is 0.5 s. For the non-scalable BSM model, the total latency is independent of the parameter of T B V V . It is shown that the total latency to setup the packet key-based secure session can be dramatically reduced if the proposed BSM scheme operates in the limited scale.
Figure 16 plots the total latency to set up the packet key-based secure session in the vertical model, which corresponds to the latency of 2 T E 2 E + 2 T B V V . Here, we assume that 2 × T E 2 E is one second.
The use of packet key guarantees very secure data flow [27]. However, the latency to set up the secure session needs to be limited to below several seconds. In Figure 14, it is shown that the B V V size of 1600 and the key size of 2048 bits are enough to satisfy the session set up latency below 10 s. On the other hand, according to Figure 16, the condition of 1600-sized B V V and 2048-sized key causes the latency to rise beyond 20 s. If the vertical model uses the B V V size of 2000 and the key size of 2048 bits, its packet key session setup latency tends to increase up to 30 s. As a result, it is proved that, compared with the vertical model, our BSM scheme effects are better by almost 200% on latency to set up a secure session while it provides the same security level as the vertical model.
Table 3 shows comparisons on two kinds of network delay components for the 3G, 4G and 5G networks. According to [24], T I n t r a can be reduced to 2 ms in 5G networks while T I n t r a of 20 ms is required in 4G networks. Then, it is reasonable to consider that T E 2 E values in 4G networks and 5G networks are 50 ms and 5 ms, respectively.
Figure 17 plots the latency comparisons for different models. Those latency results are based on the conditions that 3G networks work and the size of BVV is 400, that is, m = 400. Considering that in the packet key scheme different keys are supplied for different packets, packet key size of around 512 bits is enough to satisfy the secure session. It is shown that either the proposed BSM model or the non-scalable BSM model guarantees latency level of 2500 ms even in 3G networks.
Figure 18 plots the latency comparisons for different models in 4G environments where m = 400. It is shown that the key size of 512 bits is the turning point where the proposed BSM scheme performs better on latency compared with the vertical model. In addition, the non-scalable BSM model guarantees very low latency level as the 4G networks guarantee fast data rates.
Figure 19 plots the latency comparisons for different models in 5G environments where m = 400. In 5G environments, with the key size of 512 bits, latency level can be reduce to 2000 ms in the BSM model. In addition, the non-scalable BSM model guarantees much less latency level as the 5G networks serve very fast data rates.

4. Conclusions

Existing phone systems, such as SIP-based VoIP call systems, use the vertical model to solve issues relating to the security management. As of now, as IETF suggests, an alternative solution is to use the SDN horizontal model where a centralized software-defined network controller on the control plane is in charge of security management. The goal of this paper is to introduce blockchain technologies to manage a packet key-based security system, which can overcome the limitation that the vertical model is confronted with. While the packet key-based security system can provide very strong security strength, it needs a high computational power to agree on security parameters between peers at the packet key session setup phase. Our BSM scheme is advantageous from the perspective that, using blockchain, each peer can easily obtain the necessary parameters required to handle security management.
Advantageous effects in our BSM scheme result from the renewal process, which enables the different packet data sessions to use completely different security parameters for the security management. Therefore, our BSM scheme is secure against the powerful eavesdroppers who use brute-force approaches even to try after-transmission attacks. In addition, in our BSM scheme, corresponding hash values travel together with the secured datagrams so that even blind values cannot be exposed to the possible attackers. This contributes our BSM scheme to lead to very secure end-to-end data transfer systems against active attacks such as falsification of data and transactions. From the viewpoints of latency, the BSM scheme performs better by around 200 % than the existing vertical model.

Author Contributions

Y.J. initiated the idea, designed the security management scheme and wrote the paper; M.P. made contributions in the proposed security management scheme and edited the paper; R.A. conducted the experiment setup and helped to finalize the paper.

Funding

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2017R1A2B4006086).This study was also supported by the Research Fund, 2019 of the Catholic University of Korea.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

References

  1. Saini, A.; Festijo, E.D.; Jung, Y. Packet key-based security system for the next generation LTE networks. Procedia Comput. Sci. 2017, 110, 297–303. [Google Scholar] [CrossRef]
  2. Ahmad, F.; Peradilla, M.; Saini, A.; Jung, Y. Improving security level of LTE access procedure by using short-life shared key. IEICE Trans. Commun. 2017, 100, 738–748. [Google Scholar] [CrossRef]
  3. Alamouti, S.; Sharafat, A.R. Device-to-Device Communications in Multi-Cell LTE-Advanced Networks with Cloud Radio Access Network Architecture. IEEE Commun. Stand. Mag. 2018, 2, 90–94. [Google Scholar] [CrossRef]
  4. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and Beyond. IEEE Commun. Surv. Tutorials 2019. [Google Scholar] [CrossRef]
  5. Tahir, M.N.; Maenpaa, K.; Sukuvaara, D.T. Evolving Wireless Vehicular Communication System level comparison and analysis of 802,11 p, 4G 5G. In Proceedings of the 2nd International Conference on Communication, Computing and Digital systems (C-CODE), Islamabad, Pakistan, 6–7 March 2019; pp. 48–52. [Google Scholar] [CrossRef]
  6. Tantayakul, K.; Dhaou, R.; Paillassa, B. Mobility management with caching policy over SDN architecture. In Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Berlin, Germany, 6–8 November 2017; pp. 1–7. [Google Scholar] [CrossRef]
  7. Tantayakul, K.; Dhaou, R.; Paillassa, B. Impact of SDN on Mobility Management. In Proceedings of the 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, Switzerland, 23–25 March 2016; pp. 260–265. [Google Scholar] [CrossRef]
  8. Sun, G.; Al-Ward, H.; Boateng, G.O.; Jiang, W. Content-Aware Caching in SDN-Enabled Virtualized Wireless D2D Networks to Reduce Visiting Latency. In Proceedings of the 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Chengdu, China, 9–12 October 2018; pp. 149–150. [Google Scholar] [CrossRef]
  9. Ko, H.; Jang, I.; Lee, J.; Pack, S.; Lee, G. SDN-based distributed mobility management for 5G. In Proceedings of the 2017 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 8–10 January 2017; pp. 116–117. [Google Scholar] [CrossRef]
  10. Baktir, A.C.; Ozgovde, A.; Ersoy, C. How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions. IEEE Commun. Surv. Tutor. 2017, 19, 2359–2391. [Google Scholar] [CrossRef]
  11. Elsadek, W.F.; Mikhail, M.N. IP mobility management using software defined networking: A review. In Proceedings of the 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 December 2017; pp. 76–81. [Google Scholar] [CrossRef]
  12. Cox, J.H.; Chung, J.; Donovan, S.; Ivey, J.; Clark, R.J.; Riley, G.; Owen, H.L. Advancing Software-Defined Networks: A Survey. IEEE Access 2017, 5, 25487–25526. [Google Scholar] [CrossRef]
  13. Bera, S.; Misra, S.; Vasilakos, A.V. Software-Defined Networking for Internet of Things: A Survey. IEEE Internet Things J. 2017, 4, 1994–2008. [Google Scholar] [CrossRef]
  14. Din, I.U.; Kim, B.S.; Hassan, S.; Guizani, M.; Atiquzzaman, M.; Rodrigues, J.J.P.C. Information-Centric Network-Based Vehicular Communications: Overview and Research Opportunities. Sensors 2018, 18. [Google Scholar] [CrossRef] [PubMed]
  15. Jung, Y.; Peradilla, M.; Saini, A. Software-defined Naming, Discovery and Session Control for IoT Devices and Smart Phones in the Constraint Networks. Procedia Comput. Sci. 2017, 110, 290–296. [Google Scholar] [CrossRef]
  16. Festijo, E.; Jung, Y.; Peradilla, M. Software-defined security controller-based group management and end-to-end security management. J. Ambient Intell. Humanized Comput. 2018. [Google Scholar] [CrossRef]
  17. Bhatia, A.; Haribabu, K.; Gupta, K.; Sahu, A. Realization of flexible and scalable VANETs through SDN and virtualization. In Proceedings of the 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, 10–12 January 2018; pp. 280–282. [Google Scholar] [CrossRef]
  18. Hätönen, S.; Savolainen, P.; Rao, A.; Flinck, H.; Tarkoma, S. Off-the-Shelf Software-defined Wi-Fi Networks. In Proceedings of the 2016 ACM SIGCOMM Conference, Florianopolis, Brazil, 22–26 August 2016; pp. 609–610. [Google Scholar] [CrossRef]
  19. Bifulco, R.; Boite, J.; Bouet, M.; Schneider, F. Improving SDN with InSPired Switches. In Proceedings of the Symposium on SDN Research, Santa Clara, CA, USA, 14–15 March 2016; pp. 11:1–11:12. [Google Scholar] [CrossRef]
  20. Luo, H.; Wu, K.; Ruby, R.; Liang, Y.; Guo, Z.; Ni, L.M. Software-Defined Architectures and Technologies for Underwater Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutor. 2018, 20, 2855–2888. [Google Scholar] [CrossRef]
  21. Fekih, A.; Gaied, S.; Yousef, H. A comparative study of content-centric and software defined networks in smart cities. In Proceedings of the 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C), Sfax, Tunisia, 17–19 February 2017; pp. 147–151. [Google Scholar] [CrossRef]
  22. Kumari, A.; Gowri, S.; Radhika, E.G. An Approach for End-to-End (E2E) Security of 5G Applications. In Proceedings of the 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Omaha, NE, USA, 3–5 May 2018; pp. 133–138. [Google Scholar] [CrossRef]
  23. Parvez, I.; Rahmati, A.; Guvenc, I.; Sarwat, A.I.; Dai, H. A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions. IEEE Commun. Surv. Tutor. 2018, 20, 3098–3130. [Google Scholar] [CrossRef] [Green Version]
  24. Kiss, P.; Reale, A.; Ferrari, C.J.; Istenes, Z. Deployment of IoT applications on 5G edge. In Proceedings of the 2018 IEEE International Conference on Future IoT Technologies (Future IoT), Eger, Hungary, 18–19 January 2018; pp. 1–9. [Google Scholar] [CrossRef]
  25. López Rodríguez, F.; Silva Dias, U.; Campelo, D.R.; Oliveira Albuquerque, R.d.; Lim, S.J.; García Villalba, L.J. QoS Management and Flexible Traffic Detection Architecture for 5G Mobile Networks. Sensors 2019, 19, 1335. [Google Scholar] [CrossRef] [PubMed]
  26. Košťál, K.; Helebrandt, P.; Belluš, M.; Ries, M.; Kotuliak, I. Management and Monitoring of IoT Devices Using Blockchain. Sensors 2019, 19. [Google Scholar] [CrossRef] [PubMed]
  27. Festijo, E.; Jung, Y. An Open Horizontal Model for Group Management and End-to-End Security Management Suitable for Group-based Private Systems. In Proceedings of the International Conference on Internet of Things and Cloud Computing, Cambridge, UK, 22–23 March 2016; pp. 19:1–19:12. [Google Scholar]
Figure 1. Security management based on the vertical model distributed servers such as Mobility Management Entity (MME) and Home Subscriber Server (HSS) in LTE networks.
Figure 1. Security management based on the vertical model distributed servers such as Mobility Management Entity (MME) and Home Subscriber Server (HSS) in LTE networks.
Sensors 19 02310 g001
Figure 2. End-to-end packet key-based security management on the blockchain control plane.
Figure 2. End-to-end packet key-based security management on the blockchain control plane.
Sensors 19 02310 g002
Figure 3. Blockchain-based Security Management (BSM) network architecture.
Figure 3. Blockchain-based Security Management (BSM) network architecture.
Sensors 19 02310 g003
Figure 4. BSM transaction architecture.
Figure 4. BSM transaction architecture.
Sensors 19 02310 g004
Figure 5. Security parameter agreement between peers by using blockchain.
Figure 5. Security parameter agreement between peers by using blockchain.
Sensors 19 02310 g005
Figure 6. ToALL Tx registration.
Figure 6. ToALL Tx registration.
Sensors 19 02310 g006
Figure 7. Tx information access by Query/Reply mechanism.
Figure 7. Tx information access by Query/Reply mechanism.
Sensors 19 02310 g007
Figure 8. Sending Peer-fitted Blind Value Vector information via blockchain.
Figure 8. Sending Peer-fitted Blind Value Vector information via blockchain.
Sensors 19 02310 g008
Figure 9. Security parameter agreements between peers.
Figure 9. Security parameter agreements between peers.
Sensors 19 02310 g009
Figure 10. ToAll Tx renewal.
Figure 10. ToAll Tx renewal.
Sensors 19 02310 g010
Figure 11. Packet key encryption and decryption for the secure datagram flow.
Figure 11. Packet key encryption and decryption for the secure datagram flow.
Sensors 19 02310 g011
Figure 12. Secure Session Initiation Protocol (SIP) model for the packet key-based encrypted data flow.
Figure 12. Secure Session Initiation Protocol (SIP) model for the packet key-based encrypted data flow.
Sensors 19 02310 g012
Figure 13. Secure session setup procedure in the non-scalable BSM model.
Figure 13. Secure session setup procedure in the non-scalable BSM model.
Sensors 19 02310 g013
Figure 14. Total latency to set up a packet key-based secure session in the BSM model.
Figure 14. Total latency to set up a packet key-based secure session in the BSM model.
Sensors 19 02310 g014
Figure 15. Total latency to set up a packet key-based secure session in the non-scalable BSM model.
Figure 15. Total latency to set up a packet key-based secure session in the non-scalable BSM model.
Sensors 19 02310 g015
Figure 16. Total latency to set up a packet key-based secure session in the vertical model.
Figure 16. Total latency to set up a packet key-based secure session in the vertical model.
Sensors 19 02310 g016
Figure 17. Total latency to set up a packet key-based secure session in 3G networks for the case size of Blind Value Vector (m) = 400.
Figure 17. Total latency to set up a packet key-based secure session in 3G networks for the case size of Blind Value Vector (m) = 400.
Sensors 19 02310 g017
Figure 18. Total latency to set up a packet key-based secure session in 4G networks for the case size of Blind Value Vector (m) = 400.
Figure 18. Total latency to set up a packet key-based secure session in 4G networks for the case size of Blind Value Vector (m) = 400.
Sensors 19 02310 g018
Figure 19. Total latency to set up a packet key-based secure session in 5G networks for the case size of Blind Value Vector (m) = 400.
Figure 19. Total latency to set up a packet key-based secure session in 5G networks for the case size of Blind Value Vector (m) = 400.
Sensors 19 02310 g019
Table 1. Comparisons on latency needed to set up packet key-based session.
Table 1. Comparisons on latency needed to set up packet key-based session.
ModelsLatency to Setup a Secure Session
Proposed BSM model2 T I n t r a ((1), (2) in Figure 7)
1 T B V V ((3) in Figure 8)
1 T G i n B ((4)+(5)+(6)+(7) in Figure 8)
( 2 T I n t r a + 1 T B V V + 1 T G i n B )
Non-scalable BSM model2 T I n t r a ((1), (2) in Figure 13)
1 T E 2 E ((3) in Figure 13)
2 T I n t r a ((4), (5) in Figure 13)
( 4 T I n t r a + 1 T E 2 E )
Vertical model2 T E 2 E : ((b), (d) in Figure 12)
2 T B V V ((a), (c) in Figure 12)
( 2 T E 2 E + 2 T B V V )
Table 2. Key-size varying latency for computing a blind value.
Table 2. Key-size varying latency for computing a blind value.
Packet Key Size (bits)Latency to Compute α A X A , i mod q A (ms)
2561
5123
10244
20487
307219
Table 3. Network delays for 3G, 4G, and 5G networks.
Table 3. Network delays for 3G, 4G, and 5G networks.
Networks T Intra T E 2 E
3G200 ms500 ms
4G20 ms50 ms
5G2 ms5 ms

Share and Cite

MDPI and ACS Style

Jung, Y.; Peradilla, M.; Agulto, R. Packet Key-Based End-to-End Security Management on a Blockchain Control Plane. Sensors 2019, 19, 2310. https://doi.org/10.3390/s19102310

AMA Style

Jung Y, Peradilla M, Agulto R. Packet Key-Based End-to-End Security Management on a Blockchain Control Plane. Sensors. 2019; 19(10):2310. https://doi.org/10.3390/s19102310

Chicago/Turabian Style

Jung, Younchan, Marnel Peradilla, and Ronnel Agulto. 2019. "Packet Key-Based End-to-End Security Management on a Blockchain Control Plane" Sensors 19, no. 10: 2310. https://doi.org/10.3390/s19102310

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop