iconOpen Access

ARTICLE

crossmark

Sea Turtle Foraging Optimization-Based Controller Placement with Blockchain-Assisted Intrusion Detection in Software-Defined Networks

Sultan Alkhliwi*

Department of Computer Science, Faculty of Science, Northern Border University, Arar, Saudi Arabia

* Corresponding Author: Sultan Alkhliwi. Email: email

Computers, Materials & Continua 2023, 75(3), 4735-4752. https://doi.org/10.32604/cmc.2023.037141

Abstract

Software-defined networking (SDN) algorithms are gaining increasing interest and are making networks flexible and agile. The basic idea of SDN is to move the control planes to more than one server’s named controllers and limit the data planes to numerous sending network components, enabling flexible and dynamic network management. A distinctive characteristic of SDN is that it can logically centralize the control plane by utilizing many physical controllers. The deployment of the controller—that is, the controller placement problem (CPP)—becomes a vital model challenge. Through the advancements of blockchain technology, data integrity between nodes can be enhanced with no requirement for a trusted third party. Using the latest developments in blockchain technology, this article designs a novel sea turtle foraging optimization algorithm for the controller placement problem (STFOA-CPP) with blockchain-based intrusion detection in an SDN environment. The major intention of the STFOA-CPP technique is the maximization of lifetime, network connectivity, and load balancing with the minimization of latency. In addition, the STFOA-CPP technique is based on the sea turtles’ food-searching characteristics of tracking the odour path of dimethyl sulphide (DMS) released from food sources. Moreover, the presented STFOA-CPP technique can adapt with the controller’s count mandated and the shift to controller mapping to variable network traffic. Finally, the blockchain can inspect the data integrity, determine significantly malicious input, and improve the robust nature of developing a trust relationship between several nodes in the SDN. To demonstrate the improved performance of the STFOA-CPP algorithm, a wide-ranging experimental analysis was carried out. The extensive comparison study highlighted the improved outcomes of the STFOA-CPP technique over other recent approaches.

Keywords


1  Introduction

The current advancements in information and communication technology (ICT), namely traffic growth, cloud computing (CC), video conferencing, social networks, the Internet of Things (IoT), and online gaming, demonstrate that conventional networks do not have the capability to meet the requirements of traffic-based to novel applications and network management necessities were confronting important challenges [1]. Owing to the proliferation of networks, the complexity of networks and the number of elements seems to be escalating; thus, the quality of service (QoS) and network management provision for novel applications faces significant difficulties [2]. As per the wireless network resource, there arise various kinds of necessities that certain research works paid to such complexities such as energy consumption and QoS, which is mentioned above. Thus, it becomes essential to provide, upgrade, and manage innovative services without including novel hardware in the next-generation network [3]. In recent times, the segregation of control planes from the data planes in Software-defined networking (SDN) and a central controller that has a universal view of the network have been formulated for improving and managing network resource management in next generation networks (NGN) [4]. Fig. 1 defines the process of SDN.

images

Figure 1: Process of SDN

The representative southbound interfaces of SDN can be OpenFlow, which will primarily assume that there will be just one controller in the network for simplicity [5]. It becomes difficult for one controller to meet the wide management requirements with the expansion of the SDN network. In contrast, in SDN-related network systems, controllers have the main role in handling network traffic and enhancing network resource efficiency [6]. To enhance the reliability and scalability of the network and prevent a single point of failure, logically centralized, physically distributed multi-control network structures emerge, namely Onix, HyperFlow, and Kandoo, among others. Therefore, the failure of the controller or controllers could affect network performance. Hence, the number of switches of controllers rises, and this progression can cause further complexities. Whenever a single point of failure begins to occur in a controller, it will induce problems in controlling multiple flow routing in the Wide Area Network (WAN) [7]. In contrast, a single controller could turn out to be a bottleneck in various dimensions—that is, bandwidth, processing, the number of input/output (I/O), and Random Access Memory (RAM) will cause a rise in propagation delay among functional electrical stimulation (FEs) and controllers. Therefore, the use of many controllers in WANs is unavoidable for maintaining reliability, efficiency, scalability, and diminishing the propagation delay among controllers and FEs.

As the location and several controller deployments have a massive effect on the performance of the network in a multi-controller network structure, the “controller placement problem” (CPP) is becoming a hotspot in present SDN research [8]. For a specified network, CPP mainly has three problems to resolve. The first is the location of the controllers. The second is the allotment between controller and switch, aiming to maximize performance variables such as shortening the latency, raising the energy efficiency, improving the reliability, and so on. Finally, CPP addresses the number of controllers required [9]. The problem includes identifying the best controllers, location optimization, and finding the set of switches that are handled by every controller. The issue of controller placement is relevant even for a network having a single physical controller; however, the problem is less pronounced [10]. The first researchers to study CPP were Heller et al., who developed the issue as a facility location problem and considered it as NP-hard. Since there were several efforts for placing the controllers optimally.

This article designs a novel sea turtle foraging optimization algorithm for the controller placement problem (STFOA-CPP) in an SDN. The STFOA-CPP technique mainly relies on the sea turtles’ food-searching characteristics of tracking the odour path of dimethyl sulphide (DMS) released from its food sources. Furthermore, the presented STFOA-CPP technique can adapt to the number of controllers required and the switch to controller mapping to variable network traffic. Finally, the blockchain can inspect data integrity, determine significantly malicious input, and improve the robust nature of developing a trust relationship between several nodes in the SDN. For assuring the enhanced outcomes of the STFOA-CPP algorithm, a series of simulations were executed.

2  Literature Review

The author in [11] developed a fault-tolerance metaheuristics-related technique for CPP in a wireless SDN, called fault-tolerance metaheuristic-based scheme (FTMBS). The objectives of the technique are to diminish the worst-case latency among associated nodes and controllers, maximize network connectivity, maximize lifetime of the network, and maximize the load balance amongst controllers. When handling a multi-objective system, a trade-off exists when these multi-objective metrics compete with one another, and the decision maker decides on these trade-offs. Wu et al. [12] introduced a deep Q-network (DQN) enabled dynamic flow data-driven methodology for the controller placement problem (D4CPP). D4CPP incorporates past network data learning into the real-time switch-controller mapping decision and controller deployment, to be adopted into the dynamic network environment with flow fluctuation. Specifically, D4CPP considered load balance, data latency, and flow fluctuation, and could accomplish an enhanced balance between these metrics.

The authors in [13] examined the CPP for multiple link failures (CPP-MLF). Initially, real link information of the present network was examined to formalize the connection failure rate and examine the features of link failures. Then, minimalizing the worst-case delay and the number of controllers as the optimization objective, a heuristic technique was developed based on enhanced non dominated sorting genetic algorithm II (NSGA-II) to efficiently resolve the presented algorithm. Li et al. [14] established a parameter optimization model (POM) using a heuristic technique employed in the CPP. The heuristic approach could efficiently resolve the CPP via the optimized parameter attained in the POM. In order to authenticate the efficiency of the POM, the authors first established a synthetically delayed CPP technique for reducing the delay among switches as well as controllers.

In [15], a novel multi-objective version of the marine predator algorithm (MOMPA) was proposed. This was then hybridized with non-dominated sorting genetic algorithm II (GA-II). The presented technique can be discretized with crossover and mutation functions. Subsequently, the presented hybrid discrete multi-objective model has been applied to resolve the CPP. In [16], a new CPP that considers control plane structure and relationships among data and control planes was designed. This architecture is regarded as a multi-objective optimization technique with two objective functions to reduce inter-controller latency and flow setup time. As a result, we adapted the best–worst multi-criteria decision-making technique, which considered three metrics—link utilization, hop count, and propagation latency—to allocate switches to the controller.

Kotachi et al. [17] developed a CPP technique that permits distribution against SDN controller failure. The presented technique defines the ratios of computation ability required by the SDN switches on the SDN controller linked to it. Furthermore, the presented technique defines the allocation of SDN switches to the SDN controller, the placement, and the number of SDN controllers. The CPP can be defined such that a network provider continues to lead each SDN switch if no more than a specific amount of SDN controller failure occurs. From this, two load-distribution techniques are devised: split and even-split. Guan et al. [18] developed the idea of a synthetic delay and took the controller ability as constrained conditions to establish a CPP technique. The feature selection (FA) was selected as the problem-solving technique for the CPP. As a result, we initially developed the dynamic parameter approach for controlling parameters of the random walk of FA, the light absorption co-efficient, and the light attractiveness. Next, the particle swarm optimization (PSO) technique is adopted to enhance the static parameter of the FA.

3  The Proposed Model

In this study, a new STFOA-CCP algorithm was devised for CPP in the SDN environment. The goal of the STFOA-CPP technique is to maximize lifetime, network connectivity, and load balancing with minimal latency. Moreover, the presented STFOA-CPP technique can adapt to the number of controllers mandated and the switch to controller mapping for variable network traffic. Finally, the blockchain can inspect data integrity, determine significantly malicious input, and improve the robust nature of developing a trust relationship between several nodes in the SDN.

3.1 Algorithmic Design of STFOA

The STFOA algorithm is inspired by the hunting behaviour of a sea turtle. This section, therefore, provides certain detail regarding the life of sea turtles. There are seven species of sea turtle in two families. Six species are in the Cheloniidae family; however, the leatherback belongs to the Dermochelyidae family [19]. Sea turtles are considered to be skilled ocean navigators. They can travel millions of kilometres in their lifetime, nesting and feeding. The sea turtle usually travels in open waters, wherein the current will affect its movement. It will be moving linearly from one point to another. Sea turtles might drift inactively with the ocean currents or swim determinedly towards a fixed point. At the time of their long-distance migration, sea turtles feed on jellyfish and other invertebrates that seem to be copious in frontal regions of the ocean, consisting of phytoplankton in high concentrations. When it is fed upon, phytoplankton releases a substance called dimethylsulfoniopropionate (DMSP), which can break down into dimethyl sulphide (DMS), an odorous chemical. As DMS is volatile, it can be detected in the air beyond an ocean area that contains phytoplankton in abundance. DMS can serve as a pointer for a high density of prey for sea turtles. In real-time, sea turtles detect DMS, using this sensing capability to find favourable foraging regions.

This research approach is modelled after the food-searching technique of sea turtles. They sense the odour of DMS originated from their food source and move towards the food source that discharges the strong odour. Furthermore, the turtle’s movement can be assisted by ocean currents. The presented technique, which is inspired by the abovementioned foraging process, is defined as follows:

Step 1: Specify a population of N turtles and arbitrarily determine the initial location of every turtle [20]:

Pi(0)=[p1i,p2i,pDi],(1)

where i=1 to N within a D dimension continuous search space.

Step 2: Randomly produce the initial velocity of sea turtles, Vi(0)=[v1i,v2i,vDi]. The velocity of turtles is constrained to be within the limit characterized in the following equation:

Vmax=α(XUBXLB),(2)

Vmin=Vmax,(3)

where XUB and XLB denote the upper and lower limits of the D dimension search space, and α represents a constant within [0,1].

Step 3: Randomly produce the initial position of M food source:

Kj(0)=[k1j,k2j,,kDj],(4)

where j =1 to M, within a D dimension continuous search space.

Step 4: Input the location of every food source into the objective function and estimate them to accomplish the fitness values of that food source.

Step 5: Input the location of every turtle into the objective function and evaluate them to achieve the fitness values; the one with the maximum fitness value, I, is recorded.

I=arg maxi(fPi(t)),(5)

where fPi(t) denotes the fitness value of turtle i at time t.

Step 6: Upgrade the velocity of every sea turtle using the following:

Vi(t)=Vi(t1)+(fPi(t)fPi(t1)fPi(t1))(Pi(t)Pi(t1)),(6)

where P(t) refers to the location of the turtle at time t and Pi(t1) represents its location at time t – 1.

Step 7: Evaluate the velocity of the ocean current, VCi(t)=[vc1i,vc2i,vcDi]:

VCi(t)=α(PI(t)Pi(t)).(7)

Step 8: Add the velocity of the turtle to the ocean current to obtain the combined velocity:

VMi(t)=Vi(t)+VCi(t).(8)

Step 9: Compare the fitness values of every turtle with the fitness values of every food source. When the fitness value of the turtle is greater than the food source, the contribution of the food source becomes zero. However, when the fitness value of the turtle is less than that of the food sources, the contribution of food sources is set as follows:

CKj=fKjq=1MfKq,(9)

where fKj indicates the fitness value of food source j.

Step 10: Evaluate the distance between the food source and the turtle:

dij=PiKj.(10)

Step 11: Evaluate the level of DMS odour from food source j perceived by the turtle, Cij(t). The level of DMS odour affects the movement of the turtle to its location:

Cij(t)=(CKj×exp (dij22σ2(t))),(11)

σ(t)=σ0exp (tT).(12)

From the expression, σ(t) denotes the fading of the level of DMS odour with passing time, σ0 denotes a constant equivalent to 1, and T shows the number of iterations after which the odor completely disappears.

Step 12: Define better food sources for the turtle i. The optimal food source is the one that has the maximum value of C(t) among each food source.

J=arg maxj(Cij)j.(13)

Step 13: Upgrade the location of every turtle based on the following expression:

Pi(t+1)=Pi(t)+ηVMi(t)+CiJ(t)(KJPi).(14)

Step 14: Check the termination condition. When the maximal number of iterations is accomplished, the process ends. Otherwise, the succeeding two criteria are checked: (i) when the value of t/T is an integer, return to step 3; (ii) when the value of t/T is not an integer, return to step 5.

3.2 Process Involved in STFOA-CPP Technique

Consider the SDN as an undirected graph G(V,E) with vertices |V| as a number of links E and sensor nodes. It consists of a number of controllers Cn, n=1,2,3; one fault-free executed at a sink termed Croot and the remainder to be chosen from cluster heads (CHs), {CH1,CH2,,CH} using a metaheuristic algorithm. The system constraint is given below:

•   Maximizing the flow amongst the controllers. The flow can be described by the average connectivity, which shows the network’s reliability. It is the sum of each flow message received at the Ci controller distributed from CH, signified as fCHi,Ci. It should be noted that when a disjoint path exists in a faulty node, the message could still reach its terminus because the forwarding table includes alternate paths to the controller. Maximizing the average connectivity might result in the maximization in global network consistency, and this is shown in the following expression:

f1=i=1#CHϵCifCHi,Ci#CH.(15)

•   Maximizing the load balance amongst controllers. A significant factor when applying multiple controllers to load balancing between the least loaded and the heaviest loaded controller is preventing overwhelming of the controllers, which adversely impacts controller response time and generates redundancy delays. This becomes a crucial problem that must be taken into account, particularly in the in-bound system, and it is expressed in the following equation:

f2= Max mink (loaddCiTn),(16)

where load CiTn indicates the load of i controller represented as Ci in chromosome k at time Tn, which is the sum of control plane load induced by CHrelated to Ci, indicated as fCHiTn, plus the sum of control plane load induced by CHof the adjacent controller j at time Tn, indicated as fCHjTn,ji; consequently, it is shown below:

LoadCiTn=CHiϵCifCHiTn+CHjϵCjfCHjTn.(17)

•   Minimizing the worst-case latency indicated as DT: DT represents the sum of the end-to-end delay of Ci and Hi, and the next delay is the queuing delay of the controller in chromosome k, namely, the average duration expended in the controller systems. Controllers are modelled as M/M/137; μ indicates service rates, and λ denotes arrival rates. Therefore, the final aim was to limit the overall latency to the provided threshold: DT<=Tthreshold as follows:

f3=DT=min(maxk(no.CHsdistance(CHi,Ci)1ightspeed+K1μλ)).(18)

s.tDT<=Tthreshold

•   Maximizing the lifetime of the network. This can be described as the duration required for the last node to die, where the node decreases when its residual energy (RE), represented as γi, falls under a certain energy threshold indicated by Eth. The network lifetime equation is shown in (19). Faulty nodes, represented as fnode, are eliminated by considering if a path represented by p occurs among a non-faulty CH and controller on one side and the link efficacy, represented by Leff, of these paths that are bounded to a threshold represented as Leffthreshold on the other side.

f4=maxkγi×Leff×p×fnode(19)

s.t.mask(γi)<Eth,LeffLeffthreshold

This objective function raises energy efficiency and fault tolerance. Consider the RE, and link efficacy is represented by Eq. (20), consider the energy consumed for communication represented as EN at d distance. The path condition between the controller and cluster head is shown below:

Leff=Blog2(1+SNR)EN×d.(20)

Similarly, the system considers whether the CH nodes are faulty or not; namely, it removes the faulty node for controller placement.

p={1000if path exists between CH and controller1otherwise(21)

fnode={1if CH is faulty1otherwise(22)

We adopt the scalarization technique to resolve the multi-objective fitness function that generates one solution, and the weight is defined beforehand using the optimization technique.

F=max(ω1f1+ω2f2+ω3f3+ω4f4)(23)

s.tω1+ω2+ω3+ω4=1.

•   The ROC weight is formulated as follows, with n=4; thus, it contains four functions.

ωi=1/nk=in1/k.(24)

where ω1=25/48, ω2=13/48, ω3=7/48, and ω4=3/48. For example, consider the maximum weight value f1 that characterizes the average network connectivity.

3.3 Blockchain Enabled Intrusion Detection

A blockchain is a distributed ledger technology that allows information to be globally distributed and stored on dissimilar servers and nodes that are shared openly in an unchanged record of transactions. A blockchain (electronic ledger) primarily involves a chronological order using discrete timestamps and a list of digital records (blocks) [21]. A digital record comprises numerous items, including cryptographic, payload, and timestamp values. The genesis block is the initial record in a blockchain, and the subsequent block may be linked to the preceding one via cryptographic hashing, making it an auditable and verifiable record. Furthermore, a blockchain can be upgraded through consensus algorithms amongst each party in the network, and when novel information is added, it remains unchanged. Every SDN node can interconnect with the others and interchange essential information or data. A node might have numerous components, including collaboration components (for exchanging data), connection components (for physical connection), trust management components (to measure node reputation), and blockchain components (to communicate with the chain). Both anomaly-based and rule-based detection techniques may be deployed in the node based on the requirements. A blockchain is established and updated through the consensus protocols and smart contracts agreed upon between each intrusion detection system (IDS) node. The consensus is expanded to the SDN controller and application. According to the scheme and requirements, different data may be chained, for example, rules, messages, and alarms. The blockchain guarantees the integrity of the data and facilitates the data being visible to others. For instance, each SDN plane could access the chain to retrieve predictable data. In real-time usage, a privacy-preserving technique is used for protecting privacy. SDN and blockchain can work and complement one another; namely, trust management is improved by retrieving data from the chain, and the SDN controller can enforce the policy. The architecture can preserve the advantages of trust-based IDS, SDN, and blockchain.

4  Experimental Validation

The experimental validation of the STFOA-CPP model is tested under two topologies: the Internet2 topology, with few nodes and few links (34 nodes and 42 links), and the PlanetlabV2 topology, with few nodes and a large number of links (41 nodes and 544 links). Table 1 offers a detailed CP cost analysis of the STFOA-CPP method based on the Internet2 topology with five controllers [6]. Finally, the performance of STFOA-CPP is compared with biogeography-based optimization (BBO) [22], biology and behaviour (BAT) algorithm [23], framework of fireworks algorithm (FWA) [24] and improved quantum-behavior particle swarm optimization algorithm (FE-QPSO) [25].

images

Table 2 presents a detailed CP cost analysis of the STFOA-CPP technique based on the Internet2 topology with 10 controllers. The results show that the STFOA-CPP method achieved effective outcomes with minimal cost compared against other methods under all fitness evaluations. For example, with 100 fitness evaluations, the STFOA-CPP approach demonstrated a lower cost of 2662686, whereas the BBO, BAT, FWA, and FE-QPSO approaches showed higher costs of 2760489, 2716320, 2705278, and 2697390, respectively. With 200 fitness evaluations, the STFOA-CPP method had a lower cost of 2627982, whereas the BBO, BAT, FWA, and FE-QPSO techniques showed higher costs of 2755756, 2713165, 2705278, and 2675306, respectively. Finally, with 300 fitness evaluations, the STFOA-CPP approach showed a lower cost of 2598010 compared to the BBO, BAT, FWA, and FE-QPSO techniques, which demonstrated higher costs of 2751024, 2702123, 2698968, and 2664264, respectively.

images

Table 3 provides a CP cost analysis of the STFOA-CPP method compared to existing approaches based on the Internet2 topology with 15 controllers. The results show that the STFOA-CPP approach achieved effective outcomes with minimal cost compared to other methods under all fitness evaluations. For example, with 100 fitness evaluations, the STFOA-CPP approach demonstrated a lower cost of 2670357, whereas the BBO, BAT, FWA, and FE-QPSO models had higher costs of 2602981, 2666334, 2722648, and 2657284, respectively. With 200 fitness evaluations, the STFOA-CPP method had a lower cost of 2684435, whereas the BBO, BAT, FWA, and FE-QPSO models showed higher costs of 2610021, 2670357, 2721643, and 2670357, respectively. Finally, with 300 fitness evaluations, the STFOA-CPP model had a lower cost of 2703542 compared to the BBO, BAT, FWA, and FE-QPSO methods, with higher costs of 2615049, 2672368, 2721643, and 2680413, respectively.

images

Table 4 shows a detailed CP cost study of the STFOA-CPP approach based on the PlanetV2 topology with five controllers. The results show that the STFOA-CPP technique attained effective outcomes with minimal cost compared to other models under all fitness evaluations. For instance, with 100 fitness evaluations, the STFOA-CPP method attained the lower cost of 0.1388, whereas the BBO, BAT, FWA, and FE-QPSO models showed higher costs of 0.1540, 0.1545, 0.1414, and 0.1450, respectively. With 200 fitness evaluations, the STFOA-CPP approach attained the lower cost of 0.1378, whereas the BBO, BAT, FWA, and FE-QPSO models attained higher costs of 0.1528, 0.1543, 0.1433, and 0.1424, respectively. Finally, with 300 fitness evaluations, the STFOA-CPP model showed a lower cost of 0.1369 compared to the BBO, BAT, FWA, and FE-QPSO models, which attained higher costs of 0.1519, 0.1540, 0.1424, and 0.1390, respectively.

images

Table 5 presents a CP cost inspection of the STFOA-CPP algorithm based on the PlanetV2 topology with 10 controllers. The results show that the STFOA-CPP method attained effective outcomes with minimal cost compared to other models under all fitness evaluations.

images

Fig. 2 shows the CP cost review of the STFOA-CPP method based on the PlanetV2 topology with three different quantities of controllers. The results showed that the STFOA-CPP method attained effective outcomes with minimal cost compared to other models under all fitness evaluations. For instance, with 100 fitness evaluations, the STFOA-CPP algorithm showed a lower cost of 0.1552, whereas the BBO, BAT, FWA, and FE-QPSO models have attained higher costs of 0.1597, 0.1564, 0.1565, and 0.1583, respectively. With 200 fitness evaluations, the STFOA-CPP technique attained the lower cost of 0.1543, whereas the BBO, BAT, FWA, and FE-QPSO methods showed higher costs of 0.1596, 0.1561, 0.1564, and 0.1565, respectively. Finally, with 300 fitness evaluations, the STFOA-CPP algorithm demonstrated a lower cost of 0.1537 compared to the BBO, BAT, FWA, and FE-QPSO models, which attained higher costs of 0.1592, 0.1562, 0.1564, and 0.1522, respectively.

images

Figure 2: CP Cost analysis of STFOA-CPP approach based on PlanetV2 topology (a) controllers = 5, (b) controllers = 10, and (c) controllers = 15

A detailed cost inspection of the STFOA-CPP model compared against recent models based on the Internet2 topology with varying numbers of controllers is given in Fig. 3. The results show that the STFOA-CPP model achieved effective outcomes with lower cost values for all quantities of controllers. For instance, with four controllers, the STFOA-CPP model exhibited a decreased cost of 2736740, whereas the BBO, BAT, FWA, and FE-QPSO models showed higher costs of 3144657, 3000686, 2888709, and 2808726, respectively. With five controllers, the STFOA-CPP approach demonstrated a decreased cost of 2440801, whereas the BBO, BAT, FWA, and FE-QPSO techniques showed higher costs of 3040678, 2952696, 2880711, and 2744739, respectively. Finally, with six controllers, the STFOA-CPP method displayed a decreased cost of 2352819 compared to the BBO, BAT, FWA, and FE-QPSO methods, which demonstrated higher costs of 2896708, 2760736, 2696749, and 2608767, respectively.

images

Figure 3: Cost analysis of STFOA-CPP approach based on Internet2 topology

A detailed cost inspection of the STFOA-CPP model compared against recent models based on the PlanetV2 topology with varying numbers of controllers is given in Fig. 4. The results show that the STFOA-CPP approach has effective outcomes with lower cost values under all controllers. For example, with for controllers, the STFOA-CPP model exhibited a decreased cost of 0.1354, whereas the BBO, BAT, FWA, and FE-QPSO techniques showed higher costs of 0.1541, 0.1514, 0.1516, and 0.1483, respectively. With five controllers, the STFOA-CPP method exhibited a decreased cost of 0.1346, whereas the BBO, BAT, FWA, and FE-QPSO models attained higher costs of 0.1450, 0.1541, 0.1390, and 0.1359, respectively. Finally, with six controllers, the STFOA-CPP model exhibited a decreased cost of 0.1401 compared to the BBO, BAT, FWA, and FE-QPSO models, which demonstrated higher costs of 0.1461, 0.1808, 0.1415, and 0.1361, respectively.

images

Figure 4: Cost analysis of STFOA-CPP approach based on PlanetV2 topology

A detailed comparison study of the STFOA-CPP technique against existing models is given in Fig. 5. The results show that the STFOA-CPP technique demonstrates enhanced performance over the baseline and existing techniques. For example, at 50 days, the presented STFOA-CPP model attained a higher trust value of 0.9473, whereas the baseline and existing methods attained lower trust values of 0.9382 and 0.9427, respectively. Therefore, the proposed STFOA-CPP model can be employed for optimal controller placement in SDN.

images

Figure 5: Comparative trust value analysis of the STFOA-CPP approach

5  Conclusion

In this study, a new STFOA-CCP technique has been developed for CPP in the SDN environment. The goal of the STFOA-CPP technique is to maximize lifetime, network connectivity, and load balancing with minimal latency. The STFOA-CPP technique is based on the sea turtles’ food-searching characteristics of tracking the odour path of DMS released by their food sources. Furthermore, the presented STFOA-CPP technique can adapt to the number of controllers necessary and the switch to controller mapping to adjustable network traffic. Finally, the blockchain can inspect data integrity, determine significantly malicious input, and improve the robust nature of developing a trust relationship between several nodes in the SDN. To demonstrate the enhanced performance of the STFOA-CPP technique, a wide-ranging experimental analysis was carried out. The extensive comparison study highlighted the improved outcomes of the STFOA-CPP technique over other recent approaches. Therefore, the STFOA-CPP technique can be applied to solve CPP in the SDN environment.

Funding Statement: The author received no specific funding for this study.

Conflicts of Interest: The author declares that they have no conflicts of interest to report regarding the present study.

References

1. A. Kumari and A. S. Sairam, “Controller placement problem in software-defined networking: A survey,” Networks, vol. 78, no. 2, pp. 195–223, 2021. [Google Scholar]

2. M. Dhar, A. Debnath, B. K. Bhattacharyya, M. K. Debbarma and S. Debbarma, “A comprehensive study of different objectives and solutions of controller placement problem in software-defined networks,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 5, pp. e4440, 2022. [Google Scholar]

3. A. Shirmarz and A. Ghaffari, “Taxonomy of controller placement problem (CPP) optimization in software defined network (SDNA survey,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 12, pp. 10473–10498, 2021. [Google Scholar]

4. G. Schütz and J. A. Martins, “A comprehensive approach for optimizing controller placement in software-defined networks,” Computer Communications, vol. 159, no. 8, pp. 198–205, 2020. [Google Scholar]

5. J. Chen, Y. -J. Xiong, X. Qiu, D. He, H. Yin et al., “A cross entropy based approach to minimum propagation latency for controller placement in software defined network,” Computer Communications, vol. 191, no. 99, pp. 133–144, 2022. [Google Scholar]

6. W. Li, J. Tan and Y. Wang, “A framework of blockchain-based collaborative intrusion detection in software defined networking,” in Network and System Security, NSS 2020, LNCS 12570, Cham: Springer, pp. 261–276, 2020. [Google Scholar]

7. M. Eskandari, Z. H. Janjua, M. Vecchio and F. Antonelli, “Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices,” IEEE Internet of Things Journal, vol. 7, no. 8, pp. 6882–6897, 2020. [Google Scholar]

8. W. Li, S. Tug, W. Meng and Y. Wang, “Designing collaborative blockchained signature-based intrusion detection in IoT environments,” Future Generation Computer Systems, vol. 96, no. 3, pp. 481–489, 2019. [Google Scholar]

9. A. A. Seyedkolaei, S. A. H. Seno, A. Moradi and R. Budiarto, “Cost-effective survivable controller placement in software-defined networks,” IEEE Access, vol. 9, pp. 129130–129140, 2021. [Google Scholar]

10. I. Koutsopoulos, “Learning the optimal controller placement in mobile software-defined networks,” in 2022 IEEE 23rd Int. Symp. on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Belfast, United Kingdom, pp. 70–79, 2022. [Google Scholar]

11. N. Samarji and M. Salamah, “A fault tolerance metaheuristic-based scheme for controller placement problem in wireless software-defined networks,” International Journal of Communication Systems, vol. 34, no. 4, pp. e4624, 2021. [Google Scholar]

12. Y. Wu, S. Zhou, Y. Wei and S. Leng, “Deep reinforcement learning for controller placement in software defined network,” in IEEE INFOCOM, 2020—IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, pp. 1254–1259, 2020. [Google Scholar]

13. T. Hu, Q. Ren, P. Yi, Z. Li, J. Lan et al., “An efficient approach to robust controller placement for link failures in software-defined networks,” Future Generation Computer Systems, vol. 124, no. 1, pp. 187–205, 2021. [Google Scholar]

14. Y. Li, S. Guan, C. Zhang and W. Sun, “Parameter optimization model of heuristic algorithms for controller placement problem in large-scale SDN,” IEEE Access, vol. 8, pp. 151668–151680, 2020. [Google Scholar]

15. N. firouz, M. Masdari, A. B. Sangar and K. Majidzadeh, “A hybrid multi-objective algorithm for imbalanced controller placement in software-defined networks,” Journal of Network and Systems Management, vol. 30, no. 3, pp. 51, 2022. [Google Scholar]

16. A. Jalili, M. Keshtgari and R. Akbari, “A new framework for reliable control placement in software-defined networks based on multi-criteria clustering approach,” Soft Computing, vol. 24, no. 4, pp. 2897–2916, 2020. [Google Scholar]

17. S. Kotachi, T. Sato, R. Shinkuma and E. Oki, “Fault-tolerant controller placement model by distributing switch load among multiple controllers in software-defined network,” IEICE Transactions on Communications, vol. 105, no. 5, pp. 533–544, 2022. [Google Scholar]

18. S. Guan, J. Li, Y. Li and Z. Wang, “A multi-controller placement method for software defined network based on improved firefly algorithm,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 7, pp. e4482, 2022. [Google Scholar]

19. C. S. Endres and K. J. Lohmann, “Perception of dimethyl sulfide (DMS) by loggerhead sea turtles: A possible mechanism for locating high-productivity oceanic regions for foraging,” Journal of Experimental Biology, vol. 215, no. 20, pp. 3535–3538, 2012. [Google Scholar] [PubMed]

20. D. Tansui and A. Thammano, “Hybrid nature-inspired optimization algorithm: Hydrozoan and sea turtle foraging algorithms for solving continuous optimization problems,” IEEE Access, vol. 8, pp. 65780–65800, 2020. [Google Scholar]

21. W. Li, Y. Wang, W. Meng, J. Li and C. Su, “BlockCSDN: Towards blockchain-based collaborative intrusion detection in software defined networking,” IEICE Transactions on Information and Systems, vol. 105, no. 2, pp. 272–279, 2022. [Google Scholar]

22. D. Simon, “Biogeography-based optimization,” IEEE Transactions on Evolutionary Computation, vol. 12, no. 6, pp. 702–713, 2008. [Google Scholar]

23. X. -S. Yang, “A new metaheuristic bat-inspired algorithm,” In: J. R. González, D. A. Pelta, C. Cruz, G. Terrazas, N. Krasnogor (Eds. Nature Inspired Cooperative Strategies for Optimization (NICSO 2010), Berlin, Heidelberg: Springer, Berlin, Heidelberg, pp. 65–74, 2010. [Google Scholar]

24. Y. Tan and Y. Zhu, “Fireworks algorithm for optimization,” Advances in Swarm Intelligence, vol. 6145, pp. 355–364, 2010. [Google Scholar]

25. Q. Zhang, L. Haolun, L. Yanli, S. Ouyang, C. Fang et al., “A new quantum particle swarm optimization algorithm for controller placement problem in software-defined networking,” Computers and Electrical Engineering, vol. 95, no. 1, pp. 107456, 2021. [Google Scholar]


Cite This Article

APA Style
Alkhliwi, S. (2023). Sea turtle foraging optimization-based controller placement with blockchain-assisted intrusion detection in software-defined networks. Computers, Materials & Continua, 75(3), 4735-4752. https://doi.org/10.32604/cmc.2023.037141
Vancouver Style
Alkhliwi S. Sea turtle foraging optimization-based controller placement with blockchain-assisted intrusion detection in software-defined networks. Comput Mater Contin. 2023;75(3):4735-4752 https://doi.org/10.32604/cmc.2023.037141
IEEE Style
S. Alkhliwi, "Sea Turtle Foraging Optimization-Based Controller Placement with Blockchain-Assisted Intrusion Detection in Software-Defined Networks," Comput. Mater. Contin., vol. 75, no. 3, pp. 4735-4752. 2023. https://doi.org/10.32604/cmc.2023.037141


cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 685

    View

  • 521

    Download

  • 0

    Like

Share Link