Skip to main content

Access Control Method of SDN Network Based on Zero Trust

  • Conference paper
  • First Online:
Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022) (ICATCI 2022)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 170))

Abstract

In order to use relevant methods to control SDN network access based on zero trust, this paper will carry out relevant research. This paper first introduces the basic concepts of zero trust and SDN, then constructs the access control framework of SDN, and puts forward the relevant control principles. Through this study, SDN network access can be effectively controlled on the basis of zero trust, which can greatly guarantee access security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mir, A., Rashid. I., Kumar, K.R.: An augmented smart grid based SCADA security management system (SSMS) based on zero-trust architecture. In: Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27–28 Feb 2020, Jamia Hamdard, New Delhi, India (2021)

    Google Scholar 

  2. Arabi, A., Ogundijo, A.D., Nyamasvisva, T.E.: A zero-trust model-based framework for managing of academic dishonesty in institutes of higher learning. Turkish J. Comput. Math. Educ. (TURCOMAT) 2(6), 5381–5389 (2021)

    Google Scholar 

  3. Shah, S.W., Syed, N.F., Shaghaghi, A., Anwar, A., Baig, Z., Doss, R.: LCDA: lightweight continuous device-to-device authentication for a zero trust architecture (ZTA). Comput. Secur. 108, 102351 (2021)

    Article  Google Scholar 

  4. Tao, C., Lv, Y., Qi, Z., et al.: An implementation method of zero-trust architecture. J. Phys: Conf. Ser. 1651, 012010 (2020)

    Google Scholar 

  5. Bogner, E.: The zero-trust mandate: never trust, continually verify. Softw. World 50(4), 9–10 (2019)

    MathSciNet  Google Scholar 

  6. Lu, L., Han, J., Liu, Y., Hu, L., Huai, J.-P., Ni, L., Ma, J.: Pseudo trust: zero-knowledge authentication in anonymous P2Ps. IEEE Trans. Parallel Distrib. Syst. 19(10), 1325–1337 (2008)

    Article  Google Scholar 

  7. Dunning, D., Anderson, J.E., Schlösser, T., Ehlebracht, D., Fetchenhauer, D.: Trust at zero acquaintance: more a matter of respect than expectation of reward. J. Pers. Soci. Psychol. 107(1), 122–141 (2014)

    Article  Google Scholar 

  8. Beck, E.A.: How zero-trust network security can enable recovery from cyberattacks. ISACA J. 6, 14–18 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hang Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, M., Cheng, H., Cao, W., Yu, S., Song, J. (2023). Access Control Method of SDN Network Based on Zero Trust. In: Abawajy, J.H., Xu, Z., Atiquzzaman, M., Zhang, X. (eds) Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022). ICATCI 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 170. Springer, Cham. https://doi.org/10.1007/978-3-031-29097-8_59

Download citation

Publish with us

Policies and ethics