Abstract
In order to use relevant methods to control SDN network access based on zero trust, this paper will carry out relevant research. This paper first introduces the basic concepts of zero trust and SDN, then constructs the access control framework of SDN, and puts forward the relevant control principles. Through this study, SDN network access can be effectively controlled on the basis of zero trust, which can greatly guarantee access security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mir, A., Rashid. I., Kumar, K.R.: An augmented smart grid based SCADA security management system (SSMS) based on zero-trust architecture. In: Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27–28 Feb 2020, Jamia Hamdard, New Delhi, India (2021)
Arabi, A., Ogundijo, A.D., Nyamasvisva, T.E.: A zero-trust model-based framework for managing of academic dishonesty in institutes of higher learning. Turkish J. Comput. Math. Educ. (TURCOMAT) 2(6), 5381–5389 (2021)
Shah, S.W., Syed, N.F., Shaghaghi, A., Anwar, A., Baig, Z., Doss, R.: LCDA: lightweight continuous device-to-device authentication for a zero trust architecture (ZTA). Comput. Secur. 108, 102351 (2021)
Tao, C., Lv, Y., Qi, Z., et al.: An implementation method of zero-trust architecture. J. Phys: Conf. Ser. 1651, 012010 (2020)
Bogner, E.: The zero-trust mandate: never trust, continually verify. Softw. World 50(4), 9–10 (2019)
Lu, L., Han, J., Liu, Y., Hu, L., Huai, J.-P., Ni, L., Ma, J.: Pseudo trust: zero-knowledge authentication in anonymous P2Ps. IEEE Trans. Parallel Distrib. Syst. 19(10), 1325–1337 (2008)
Dunning, D., Anderson, J.E., Schlösser, T., Ehlebracht, D., Fetchenhauer, D.: Trust at zero acquaintance: more a matter of respect than expectation of reward. J. Pers. Soci. Psychol. 107(1), 122–141 (2014)
Beck, E.A.: How zero-trust network security can enable recovery from cyberattacks. ISACA J. 6, 14–18 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Li, M., Cheng, H., Cao, W., Yu, S., Song, J. (2023). Access Control Method of SDN Network Based on Zero Trust. In: Abawajy, J.H., Xu, Z., Atiquzzaman, M., Zhang, X. (eds) Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022). ICATCI 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 170. Springer, Cham. https://doi.org/10.1007/978-3-031-29097-8_59
Download citation
DOI: https://doi.org/10.1007/978-3-031-29097-8_59
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29096-1
Online ISBN: 978-3-031-29097-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)