HUM: A Novel Algorithm Based in Blockchain for Security in SD-WAN Controller

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Currently, software-defined networks (SDN) are displacing traditional networks, and this carries a lot of advantages and disadvantages, one of which is security. For this reason, this article presents a security analysis on wide area SDN network controllers. Furthermore, we propose the use of the HUM algorithm, a blockchain-based algorithm, as a possible solution to increase the robustness of security in the flow of packets between edge devices. This algorithm works by a group of controller nodes that are aware of all changes made to the data flow. The simulation of a topology is presented, and finally, an application case is proposed for the use of the algorithm within an SD-WAN network in a financial institution.

Original languageEnglish
Title of host publicationProceedings of 8th International Congress on Information and Communication Technology - ICICT 2023
EditorsXin-She Yang, R. Simon Sherratt, Nilanjan Dey, Amit Joshi
PublisherSpringer Science and Business Media Deutschland GmbH
Pages461-471
Number of pages11
ISBN (Print)9789819932429
DOIs
StatePublished - 2023
Event8th International Congress on Information and Communication Technology, ICICT 2023 - London, United Kingdom
Duration: 20 Feb 202323 Feb 2023

Publication series

NameLecture Notes in Networks and Systems
Volume693 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

Conference8th International Congress on Information and Communication Technology, ICICT 2023
Country/TerritoryUnited Kingdom
CityLondon
Period20/02/2323/02/23

Bibliographical note

Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023.

Keywords

  • Blockchain
  • Cybersecurity
  • Encryption
  • SD-WAN
  • SDN
  • Security

Fingerprint

Dive into the research topics of 'HUM: A Novel Algorithm Based in Blockchain for Security in SD-WAN Controller'. Together they form a unique fingerprint.

Cite this