Authentication, Authorization and Mobility in Openflow-enabled Enterprise Wireless Networks

نویسنده

  • Theresa Enghardt
چکیده

Large-scale 802.11 wireless networks may benefit from Openflow deployment on its Access Points and other forwarding devices combined with centralized management of data flows on an Openflow controller. The reason is that services such as authentication or routing can be provided in an easier way and more efficiently when operating on a full view of the network rather than dealing with distributed state on the individual devices. The interaction of Openflow with mechanisms in wireless networks such as authentication, authorization and mobility of clients may yield new possibilities such as enabling roaming between APs or networks, enhancing handover or providing alternate means of authentication. For instance, computing a set of neighboring APs that the client frequently roams to may enable faster handover due to preauthenticating the station with the neighbors before roaming. The present student project report aims to explore ways to incorporate Openflow into an enterprise wireless network. It presents three examples of an Openflow-enabled architecture in terms of authentication, authorization and mobility. Furthermore, it describes the deployment of a prototype of one of these architectures in the Berlin Open Wireless Lab (BOWL) testbed, substituting the Linux bridge with the implementation of an Openflow-enabled virtual switch. Correct behavior in terms of authentication, authorization and handover were validated and an unexpected issue of flooding 802.1x frames was observed and corrected. This work is a proof-of-concept of how Openflow can be deployed in an enterprise Wireless network and proposes alternative architectures that require more implementation work, but enable features such as authentication to an arbitrary server and load balancing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure, QoS-Enabled Mobility Support for IP-based Networks

The rising number of mobile users, the advent of various radio access technologies, and the increasing importance of IP services over wireless as well as wired networks pose a number of new challenges. While Mobile IP has been designed for mobility management in IP networks, it may result in high latency and signaling overhead during handoff. Thus, advanced mobility mechanisms improving Mobile ...

متن کامل

AuthFlow: authentication and access control mechanism for software defined networking

Software Defined Networks are being widely adopted by enterprise networks. Providing security features in these next generation networks, however, is a challenge. In this paper, we present the main security threats in Software Defined Networks and we propose AuthFlow, an authentication and access control mechanism based on host credentials. The main contributions of the proposed mechanism are t...

متن کامل

Deploying a virtual network function over a software defined network infrastructure: experiences deploying an access control VNF in the University of Basque Country’s OpenFlow enabled facility

Network Function Virtualisation is one of the last buzzwords in the networking scenario. Although this functionality is many times related with Software Defined Networks this is not compulsory. For some, NFV can be seen as a new name for an assembly of known technologies, but substituting hardware boxes by Virtual Machines in the dynamic scenario of the slice creation in SDN based infrastructur...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012