• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Electrical Engineering News and Products

Electronics Engineering Resources, Articles, Forums, Tear Down Videos and Technical Electronics How-To's

  • Products / Components
    • Analog ICs
    • Battery Power
    • Connectors
    • Microcontrollers
    • Power Electronics
    • Sensors
    • Test and Measurement
    • Wire / Cable
  • Applications
    • 5G
    • Automotive/Transportation
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Handbooks
    • EE Training Days
    • Tutorials
    • Learning Center
    • Tech Toolboxes
    • Webinars & Digital Events
  • Resources
    • White Papers
    • Design Guide Library
    • Digital Issues
    • Engineering Diversity & Inclusion
    • LEAP Awards
    • Podcasts
    • DesignFast
  • Videos
    • EE Videos and Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Bill’s Blogs
  • Advertise
  • Subscribe

Ensuring Security for Networks of the Future

January 6, 2015 By Fraunhofer

Company networks are inflexible – they are made up of many components that require a good deal of effort to be connected together.

Today’s company networks comprise hundreds of devices: routers for directing data packets to the right receiver, firewall components for protecting internal networks from the outside world, and network switches.

Such networks are extremely inflexible because every component, every router and every switch can carry out only the task it was manufactured for. If the network has to be expanded, the company has to integrate new routers, firewalls or switches and then program them by hand.

That’s why experts worldwide have been working on flexible networks of the future for the last five years or so, developing what is known as software-defined networking (SDN). It presents one disadvantage, however; it is susceptible to hacker attacks.

Researchers from the Fraunhofer Institute for Applied and Integrated Security AISEC in Garching, near Munich, will be showing how to make SDN secure at the CeBIT trade fair in Hannover, March 16-20.

A demonstrator at the Fraunhofer exhibition stand (Hall 9, Booth E40) will show how SDN and all related components can be monitored. One of these components is visualization software, which displays the network’s individual components and depicts in real time how the various applications are communicating with the controller.

“We can show how software influences the behavior of different components using the controller, or, in the case of an attack, how it disrupts them,” says Christian Banse, a security expert at AISEC.

But how exactly does SDN work, and why is it so vulnerable to attack?

“In the future, the plan is for a central control unit to tell the many network components what to do. To put it simply, routers, firewalls and switches lose their individual intelligence – they only follow orders from the controller,” says Banse.

This makes a network much more flexible, because the controller can allocate completely new tasks to a router or switch that were not intended when the component was manufactured.

Plus, the tedious task of manually configuring components during installation is eliminated because components no longer need to be assigned to a specific place in the network – the controller simply uses them as needed at the moment.

The Controller Is a Popular Target for Hackers

Manufacturers have begun offering the first routers and switches that are SDN-compatible and have the necessary flexibility.

“With all the hype surrounding the new adaptability made possible by a central control unit, SDN security has been neglected,” warns Banse. “That’s why we’re developing solutions to make SDN more secure from the outset, before such systems become firmly established.”

In the future, networks will be controlled solely by a central controller – Banse sees this as a problem, because it might provide the perfect loophole for attackers to access the entire network.

“On top of that, a whole set of new applications are being developed for SDN – for instance for firewall components or routing,” says Banse. “We have make sure that these applications are reliable.”

It would be disastrous if, for example, outsiders were able to gain access to the company network using software installed accessing the controller. 

That’s why Banse and his colleagues started off by analyzing the interaction of all SDN components to identify vulnerabilities. “You have to precisely define how deep into the network a new application is allowed to go, for example. Otherwise the stability and security of the network is not guaranteed.”

So far, there are no sufficient security standards for communication among individual SDN components, but AISEC researchers are lobbying hard for an international standard.

In addition to their visualization solution, at CeBIT Banse and his team will also present technical means for preventing unauthorized applications or malware from gaining access to SDN systems.

They are developing ways to monitor if an app really carries out only the task for which it was intended. If it performs unplanned or undesirable activities, i.e. malware, it is rejected and blocked by the system.

You Might Also Like

Filed Under: Artificial intelligence

Primary Sidebar

EE Engineering Training Days

engineering

Featured Contributions

Meeting demand for hidden wearables via Schottky rectifiers

GaN reliability milestones break through the silicon ceiling

From extreme to mainstream: how industrial connectors are evolving to meet today’s harsh demands

The case for vehicle 48 V power systems

Fire prevention through the Internet

More Featured Contributions

EE Tech Toolbox

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE Learning Center

EE Learning Center
“ee
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.
“bills

R&D World Podcasts

R&D 100 Episode 10
See More >

Sponsored Content

Advanced Embedded Systems Debug with Jitter and Real-Time Eye Analysis

Connectors Enabling the Evolution of AR/VR/MR Devices

Award-Winning Thermal Management for 5G Designs

Making Rugged and Reliable Connections

Omron’s systematic approach to a better PCB connector

Looking for an Excellent Resource on RF & Microwave Power Measurements? Read This eBook

More Sponsored Content >>

RSS Current EDABoard.com discussions

  • Power switches to replace Mechanical Relay in the HV pulse tester setup
  • Single Ended- Differential Ended LNA comparison
  • Help with HFSS: Mesh error, found 6 bodies without triangles
  • Input impedance matching network
  • Question LCD LED IPS display

RSS Current Electro-Tech-Online.com Discussions

  • Fuel Auto Shutoff
  • can a AT89C51 be used as a rom?
  • Telegram Based Alarm - Sensor cable protection
  • Chinese Tarrifs – 104%!?!
  • An Update On Tarrifs
Search Millions of Parts from Thousands of Suppliers.

Search Now!
design fast globle

Footer

EE World Online

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Engineer's Garage
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

EE WORLD ONLINE

  • Subscribe to our newsletter
  • Teardown Videos
  • Advertise with us
  • Contact us
  • About Us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy