Open Access iconOpen Access



Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches

Jiajun Yan, Ying Zhou*, Anchen Dai, Tao Wang

School of Electronics and Communication Engineering, Sun Yat-sen University, Shenzhen, 518107, China

* Corresponding Author: Ying Zhou. Email: email

Computers, Materials & Continua 2024, 79(1), 563-580.


As an emerging network paradigm, the software-defined network (SDN) finds extensive application in areas such as smart grids, the Internet of Things (IoT), and edge computing. The forwarding layer in software-defined networks is susceptible to eavesdropping attacks. Route hopping is a moving target defense (MTD) technology that is frequently employed to resist eavesdropping attacks. In the traditional route hopping technology, both request and reply packets use the same hopping path. If an eavesdropping attacker monitors the nodes along this path, the risk of 100% data leakage becomes substantial. In this paper, we present an effective route hopping approach, called two-day different path (TDP), that turns communication paths into untraceable moving targets. This technology minimizes the probability of data leakage by transmitting request data and reply data through different paths. Firstly, a brief introduction to the network model and attack model involved in this paper is given. Secondly, the algorithm and processing method of the TDP are proposed. Thirdly, the paper proposes three different metrics to measure the effectiveness of the proposed approach. Finally, theoretical analysis and simulation results show that the TDP can effectively reduce the percentage of data exposure, decrease eavesdropping attack success probability, and improve the unpredictability of the path.


Cite This Article

APA Style
Yan, J., Zhou, Y., Dai, A., Wang, T. (2024). Securing forwarding layers from eavesdropping attacks using proactive approaches. Computers, Materials & Continua, 79(1), 563-580.
Vancouver Style
Yan J, Zhou Y, Dai A, Wang T. Securing forwarding layers from eavesdropping attacks using proactive approaches. Comput Mater Contin. 2024;79(1):563-580
IEEE Style
J. Yan, Y. Zhou, A. Dai, and T. Wang "Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches," Comput. Mater. Contin., vol. 79, no. 1, pp. 563-580. 2024.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 174


  • 172


  • 0


Share Link