Open Access iconOpen Access

ARTICLE

crossmark

Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches

by Jiajun Yan, Ying Zhou*, Anchen Dai, Tao Wang

School of Electronics and Communication Engineering, Sun Yat-sen University, Shenzhen, 518107, China

* Corresponding Author: Ying Zhou. Email: email

Computers, Materials & Continua 2024, 79(1), 563-580. https://doi.org/10.32604/cmc.2024.048922

Abstract

As an emerging network paradigm, the software-defined network (SDN) finds extensive application in areas such as smart grids, the Internet of Things (IoT), and edge computing. The forwarding layer in software-defined networks is susceptible to eavesdropping attacks. Route hopping is a moving target defense (MTD) technology that is frequently employed to resist eavesdropping attacks. In the traditional route hopping technology, both request and reply packets use the same hopping path. If an eavesdropping attacker monitors the nodes along this path, the risk of 100% data leakage becomes substantial. In this paper, we present an effective route hopping approach, called two-day different path (TDP), that turns communication paths into untraceable moving targets. This technology minimizes the probability of data leakage by transmitting request data and reply data through different paths. Firstly, a brief introduction to the network model and attack model involved in this paper is given. Secondly, the algorithm and processing method of the TDP are proposed. Thirdly, the paper proposes three different metrics to measure the effectiveness of the proposed approach. Finally, theoretical analysis and simulation results show that the TDP can effectively reduce the percentage of data exposure, decrease eavesdropping attack success probability, and improve the unpredictability of the path.

Keywords


Cite This Article

APA Style
Yan, J., Zhou, Y., Dai, A., Wang, T. (2024). Securing forwarding layers from eavesdropping attacks using proactive approaches. Computers, Materials & Continua, 79(1), 563-580. https://doi.org/10.32604/cmc.2024.048922
Vancouver Style
Yan J, Zhou Y, Dai A, Wang T. Securing forwarding layers from eavesdropping attacks using proactive approaches. Comput Mater Contin. 2024;79(1):563-580 https://doi.org/10.32604/cmc.2024.048922
IEEE Style
J. Yan, Y. Zhou, A. Dai, and T. Wang, “Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches,” Comput. Mater. Contin., vol. 79, no. 1, pp. 563-580, 2024. https://doi.org/10.32604/cmc.2024.048922



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 489

    View

  • 359

    Download

  • 0

    Like

Share Link