To Provide Privacy and Message Authentication Process Based Link Topology Discovery in Software Defined Network

International Journal of Computer Science and Engineering
© 2018 by SSRG - IJCSE Journal
Volume 5 Issue 3
Year of Publication : 2018
Authors : Thota Renuka Kalyani, G.Sivalakshmi

How to Cite?

Thota Renuka Kalyani, G.Sivalakshmi, "To Provide Privacy and Message Authentication Process Based Link Topology Discovery in Software Defined Network," SSRG International Journal of Computer Science and Engineering , vol. 5,  no. 3, pp. 19-23, 2018. Crossref,


Topology discovery is an essential service in software defined network and it underpins many higher layer services. When we refer to topology discovery, we actually mean link discovery, since the controller learns about the existence of network nodes during the Open Flow handshake. By implementing software defined network we can find routing and forwarding of transferred message. In the routing process we can find out link between source nodes to neighbour node. If the link in existing it can generate path and goes to next neighbour for finding link. If the link does not exist it will treat an attacker and source node will go to next neighbours. Like this we can find out routing from source node to destination node. After that we can transfer data from source node to destination before we can perform encryption process.. By performing encryption process we can convert plain format data in to cipher and send that cipher format to destination node. Before transferring cipher format data to destination node the source node will generate message authentication code for cipher data. The cipher format data and message authentication send to destination node. The destination node will retrieve cipher format data and message authentication code. The destination node will again generate message authentication code of cipher data and verify that code. If the code is verified it will perform the decryption process and get original plain format data. In this paper we are implementing secure link discovery protocol for finding routing and forward message. By implementing this protocol we can provide more security of transfer message or data and efficient routing of transfer message.


Put your keywords here, keywords are separated by comma.


[1] N. Feamster, J. Rexford, and E. Zegura, “The road to sdn,” Queue, vol. 11, no. 12, p. 20, 2013. 
[2] F. Pakzad, M. Portmann, W. L. Tan, and J. Indulska, “Efficient topology discovery in software defined networks,” in IEEE ICSPCS, 2015. 
[3] GENI Wiki. [Online]. Available: 
[4] N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, “Nox: Towards an operating system for networks,” SIGCOMM Comput. Commun. Rev., vol. 38, no. 3, Jul. 2008. 
[5] Open Flow Standard. [Online]. Available: 
[6] “IEEE standard for local and metropolitan area networks– station and media access control connectivity discovery,” IEEE Std 802.1AB-2009 (Revision of IEEE Std 802.1AB-2005), pp. 1–204, Sept 2009. 
[7] B. Lantz, B. Heller, and N. McKeown, “A network in a laptop: rapid prototyping for software-defined networks,” in Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. 
[8] Open vSwitch. [Online]. Available: 
[9] Scapy Library. [Online]. Available: 
[10] H. Krawczyk, M. Bellare, and R. Canetti, “HMAC: Keyed-hashing for message authentication,” IETF RFC 2104, pp. 1–11. , February 1997. 
[11] S. Turner and L. Chen, “Updated security considerations for the md5 message-digest and the hmac-md5 algorithms,” IETF RFC 6151, 2011. 
[12] M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, “Sphinx: Detecting security attacks in software-defined networks,” in NDSS’15, February 2015.