[1] SASAKI T, PAPPAS C, LEE T, et al. SDNsec: forwarding accountability for the SDN data plane[C]// Proceedings of the 201625th International Conference on Computer Communication and Networks. Piscataway, NJ: IEEE, 2016:1-10. [2] 王首一,李琦,张云.轻量级的软件定义网络数据包转发验证[J].计算机学报,2019,42(1):176-187. (WANG S Y, LI Q, ZHANG Y. LPV: lightweight packet forwarding verification in SDN[J]. Chinese Journal of Computers, 2019, 42(1): 176-187.) [3] PORRAS P, SHIN S, YEGNESWARAN V, et al. A security enforcement kernel for OpenFlow networks[C]// Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks. New York: ACM, 2012:121-126. [4] SON S, SHIN S, YEGNESWARAN V, et al. Model checking invariant security properties in OpenFlow[C]// Proceedings of the 2013 IEEE International Conference on Communications. Piscataway, NJ: IEEE, 2013:1974-1979. [5] LI G, GUO S, YANG Y, et al. Traffic load minimization in software defined wireless sensor networks[J]. IEEE Internet of Things Journal, 2018, 5(3): 1370-1378. [6] QIU X, ZHANG K, REN Q. Global flow table: a convincing mechanism for security operations in SDN[J]. Computer Networks, 2017, 120: 56-70. [7] XU T, GAO D, DONG P, et al. Defending against New-flow attack in SDN-based Internet of things[J]. IEEE Access, 2017, 5:3431-3443. [8] 王蒙蒙,刘建伟,陈杰,等.软件定义网络:安全模型、机制及研究进展[J].软件学报,2016,27(4):969-992.(WANG M M, LIU J W, CHEN J, et al. Software defined networking: security model, threats and mechanism[J]. Journal of Software, 2016,27(4):969-992.) [9] 王涛,陈鸿昶,程国振. 软件定义网络及安全防御技术研究[J]. 通信学报,2017,38(11):133-160.(WANG T, CHEN H C, CHENG G Z. Research on software-defined network and the security defense technology[J]. Journal on Communications, 2017, 38(11): 133-160.) [10] 柳林,周建涛.软件定义网络控制平面的研究综述[J].计算机科学,2017,44(2):75-81.(LIU L, ZHOU J T. Review for research of control plane in software-defined network[J]. Computer Science, 2017,44(2):75-81.) [11] AL-SHAER E, AL-HAJ S. FlowChecker: configuration analysis and verification of federated OpenFlow infrastructures[C]// Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration. New York: ACM, 2010:37-44. [12] FERGUSON A D, GUHA A, LIANG C, et al. Participatory networking: an API for application control of SDNs[J]. ACM SIGCOMM Computer Communication Review, 2013, 43(4):327-338. [13] CHEUNG S, FONG M, PORRAS P, et al. Securing the software-defined network control layer[EB/OL].[2018-06-20]. http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/10_3_2.pdf. [14] DHAWAN M, PODDAR R, MAHAJAN K, et al. SPHINX: detecting security attacks in software-defined networks[EB/OL].[2018-06-20]. https://pdfs.semanticscholar.org/4f35/8dbee87adc305b3e983e5ff6dff1074d3cf6.pdf. [15] WANG Y, JUN B I, ZHANG K. A tool for tracing network data plane via SDN/OpenFlow[J]. Science China(Information Sciences), 2017, 60(2):022304. [16] WANG M, LIU J, MAO J, et al. RouteGuardian: constructing secure routing paths in software-defined networking[J]. Tsinghua Science and Technology, 2017, 22(4):400-412. [17] WANG T, CHEN H. SGuard: a lightweight SDN safe-guard architecture for DoS attacks[J]. China Communications, 2017, 14(6): 113-125. [18] AGARWAL K, DIXON C, DIXON C, et al. SDN traceroute: tracing SDN forwarding without changing network behavior[C]// Proceedings of the 3rd Workshop on Hot Topics in Software Defined Networking. New York: ACM, 2014: 145-150. [19] HEER T, MORCHON O G, WEHRLE K. ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication[C]// Proceedings of the 2008 ACM CoNEXT Conference. New York: ACM, 2008: Article No. 23. [20] BOUABANA-TEBIBEL T. Hash chains at the basis of a secure reactive routing protocol[C]// Proceedings of the 3rd International Conference on Trusted Systems. Berlin: Springer-Verlag, 2011:258-270. [21] KIM H J, BASESCU C, JIA L, et al. Lightweight source authentication and path validation[J].ACM SIGCOMM Computer Communication Review, 2014, 44(4): 271-282. [22] 王月,吕光宏,曹勇.软件定义网络安全研究[J].计算机技术与发展,2018,28(4):128-132.(WANG Y, LYU G H, CAO Y. Research on software defining network security[J]. Computer Technology and Development, 2018,28(4):128-132.) [23] 翁丽萍. 基于单向哈希链的Ad Hoc网络认证和密钥管理研究[D]. 长沙:中南大学,2010:20-24.(WENG L P. Research on authentication and key management of Ad Hoc network based on one-way Hash chain[D]. Changsha: Central South University, 2010:20-24.) [24] LIU Y, KUANG Y, XIAO Y, et al. SDN-based data transfer security for Internet of things[J]. IEEE Internet of Things Journal, 2018, 5(1): 257-268. [25] 李兆斌,李伟隆,魏占祯,等.SDN数据安全处理机制关键模块的研究与实现[J].计算机应用,2018,38(7):1929-1935.(LI Z B, LI W L, WEI Z Z, et al.Research and implementation of key module of SDN data security processing mechanism[J].Journal of Computer Applications,2018,38(7):1929-1935.) |