Preprint Article Version 1 This version is not peer-reviewed

IOTASDN: IOTA 2.0 Smart Contracts for Securing SDN Ecosystem

Version 1 : Received: 13 July 2024 / Approved: 15 July 2024 / Online: 15 July 2024 (19:53:24 CEST)

How to cite: Fartitchou, M.; Lamaakal, I.; Maleh, Y.; El Makkaoui, K.; El Allali, Z.; Pławiak, P.; Alblehai, F.; A. Abd El-Latif, A. IOTASDN: IOTA 2.0 Smart Contracts for Securing SDN Ecosystem. Preprints 2024, 2024071200. https://doi.org/10.20944/preprints202407.1200.v1 Fartitchou, M.; Lamaakal, I.; Maleh, Y.; El Makkaoui, K.; El Allali, Z.; Pławiak, P.; Alblehai, F.; A. Abd El-Latif, A. IOTASDN: IOTA 2.0 Smart Contracts for Securing SDN Ecosystem. Preprints 2024, 2024071200. https://doi.org/10.20944/preprints202407.1200.v1

Abstract

Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper presents an innovative approach to securing SDN environments using IOTA 2.0 smart contracts. The proposed system leverages the IOTA Tangle, a directed acyclic graph (DAG) structure, to enhance scalability and efficiency while eliminating transaction fees and reducing energy consumption. We introduce three smart contracts—Authority, Access Control, and DoS Detector—to ensure secure network operations, prevent unauthorized access, and mitigate denial-of-service attacks. Through comprehensive simulations using Mininet and the ShimmerEVM IOTA Test Network, we demonstrate the efficacy of our approach in enhancing SDN security. Our findings highlight the potential of IOTA 2.0 smart contracts to provide a robust, decentralized solution for securing SDN environments, paving the way for further integration of blockchain technologies in network management.

Keywords

Blockchain (BC); Distributed Ledger Technoloy (DLT); IOTA 2.0; Security; Smart Contracts (SCs); Software-Defined Networking (SDN).

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.