Enhancing Security in Software-Defined Networking: A Framework for Encryption

Authors

  • Mohammad Qassim Jawad University of Information Technology and Communication, Biomedical Informatics College, Baghdad, Iraq
  • Hayder Talib Jawad Al-sammak University of Information Technology and Communication, Biomedical Informatics College, Baghdad, Iraq

Keywords:

Network Security, Software-Defined Networking (SDN), SSL/TLS Encryption, Openflow Protocol, Role-Based Authorization, Authentication Mechanisms, AES, FortNOX

Abstract

Software-Defined Networking (SDN) will provide a higher network controllability and flexibility through decoupling of the control and data planes. Nonetheless, its centralized design presents security vulnerabilities and thus it is susceptible to threats like unauthorized access, data breaches and controller attacks. A secure SDN environment is achievable by having strong encryption, authentication and access control. Some of the protective measures that have been applied in this work are logging and security audit services, integration of the SSL/TLS and enforcing authentication of the graphical user interface (GUI). Also, encryptions are used based on cryptographic cipher like DES, AES and role-based authorization is done with the help of FortNOX to improve access controls. The suggested security model enhances the SDN controller by reducing possible threats and ensuring the entire system resiliency. Encryption methods coupled with access control measures provide a better level of data confidentiality and integrity lowering threats in SDN communication. These steps will help make SDN an environment that is more reliable.

References

M. Blessing and J. Olusegun, “The Impact of Software-Defined Networking (SDN) on Traditional Network Architectures : Opportunities and Challenges Author : Moses Blessing Date : 28 th August, 2024,” no. August, 2024.

A. A. Almazroi, E. A. Aldhahri, M. A. Al-Shareeda, and S. Manickam, “ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing,” PLoS One, vol. 18, no. 6 June, pp. 1–20, 2023, doi: 10.1371/journal.pone.0287291.

Y. Su, D. Xiong, K. Qian, and Y. Wang, “A Comprehensive Survey of Distributed Denial of Service Detection and Mitigation Technologies in Software-Defined Network,” Electron., vol. 13, no. 4, 2024, doi: 10.3390/electronics13040807.

Z. G. Al-Mekhlafi, M. A. Al-Shareeda, S. Manickam, B. A. Mohammed, and A. Qtaish, “Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks,” Mathematics, vol. 11, no. 2, pp. 1–17, 2023, doi: 10.3390/math11020399.

M. A. Al-shareeda et al., “NE-CPPA: A New and Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks (VANETs),” Appl. Math. Inf. Sci., vol. 14, no. 6, pp. 957–966, 2020, doi: 10.18576/amis/140602.

C. Serôdio, J. Cunha, G. Candela, S. Rodriguez, X. R. Sousa, and F. Branco, “The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges,” Futur. Internet, vol. 15, no. 11, pp. 1–32, 2023, doi: 10.3390/fi15110348.

A. H. Abdi et al., “Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI, and MTD Approaches to Security Solutions,” IEEE Access, vol. 12, no. March, pp. 69941–69980, 2024, doi: 10.1109/ACCESS.2024.3393548.

M. S. Farooq, S. Riaz, and A. Alvi, “Security and Privacy Issues in Software-Defined Networking (SDN): A Systematic Literature Review,” Electron., vol. 12, no. 14, 2023, doi: 10.3390/electronics12143077.

A. Hamarsheh, “An Adaptive Security Framework for Internet of Things Networks Leveraging SDN and Machine Learning,” Appl. Sci., vol. 14, no. 11, 2024, doi: 10.3390/app14114530.

S. Algarni, F. Eassa, K. Almarhabi, A. Algarni, and A. Albeshri, “BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking,” Electron., vol. 11, no. 7, pp. 1–27, 2022, doi: 10.3390/electronics11070996.

S. S. Mahdi and A. A. Abdullah, “Enhanced Security of Software-defined Network and Network Slice Through Hybrid Quantum Key Distribution Protocol,” Infocommunications J., vol. 14, no. 3, pp. 9–15, 2022, doi: 10.36244/ICJ.2022.3.2.

J. Li et al., “A Secured Framework for SDN-Based Edge Computing in IoT-Enabled Healthcare System,” IEEE Access, vol. 8, pp. 135479–135490, 2020, doi: 10.1109/ACCESS.2020.3011503.

Z. A. Bhuiyan, S. Islam, M. M. Islam, A. B. M. A. Ullah, F. Naz, and M. S. Rahman, “On the (in)Security of the Control Plane of SDN Architecture: A Survey,” IEEE Access, vol. 11, no. August, pp. 91550–91582, 2023, doi: 10.1109/ACCESS.2023.3307467.

S. N. Mjeat, M. Yousif, S. Bader, O. Mohammed, and A. H. Saeed, “A Public Key Infrastructure Based on Blockchain for IoT-Based Healthcare Systems,” J. Cybersecurity Inf. Manag., vol. 15, no. 1, 2025, doi: 10.54216/jcim.150118.

T. Sasi, A. H. Lashkari, R. Lu, P. Xiong, and S. Iqbal, “A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges,” J. Inf. Intell., vol. 2, no. 6, pp. 455–513, 2023, doi: 10.1016/j.jiixd.2023.12.001.

M. A. Al-Shareeda and S. Manickam, “Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation,” Symmetry (Basel)., vol. 14, no. 8, 2022, doi: 10.3390/sym14081543.

R. Bukhowah, A. Aljughaiman, and M. M. H. Rahman, “Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions,” Electron., vol. 13, no. 6, 2024, doi: 10.3390/electronics13061031.

M. A. Al-shareeda et al., “Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks,” in Advances in Cyber Security, M. Anbar, N. Abdullah, and S. Manickam, Eds., Singapore: Springer Singapore, 2021, pp. 588–603.

M. Q. Jawad and M. Yousif, “Improving Video Streaming Quality and Network Efficiency through Data Distribution Services,” vol. 1, no. 01, pp. 97–107, 2025.

E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms,” Sensors, vol. 24, no. 2, 2024, doi: 10.3390/s24020713.

A. Ataalla, M. Al-yousif, and A. S. Bader, “A Hybrid GA-GWO Method for Cyber Attack Detection Using RF Model,” J. Cybersecurity Inf. Manag., vol. 15, no. 1, 2025, doi: 10.54216/jcim.150117.

Downloads

Published

2026-03-05

How to Cite

Jawad, M. Q. ., & Al-sammak, H. T. J. . (2026). Enhancing Security in Software-Defined Networking: A Framework for Encryption. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 7(2), 155–165. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/896

Issue

Section

Articles