Professional Documents
Culture Documents
BlockFlow Final Presentation
BlockFlow Final Presentation
SDN CONTROLLER
USING
BLOCKCHAIN
Theviyanthan K.
IT14004414
Introduction
Research problem
Research Question
CONTENT Solution
Methodology
S SDN Switches
App Server
Single Page Application
Smart Contract
Results
Complexity of compromising a network
Time taken
INTRODUCTION
SOFTWARE
DEFINED •The control and data plane are decoupled
1. The app was built using React Js. The app communicates with the server using
REST API service
SMART CONTRACT
•The smart contract is written using Solidity
•Smart Contract has two databases
• Switches
• Routing entries
• A user can
• Create
• Read
• Update
• Delete
Switches and routes
RESULTS
n number of controllers
hi the hash rate of a controller
H total hash rate of the block chain network
According to the bitcoin whitepaper, the probability P of an attacker compromising the network when
the probability of an authentic node mining the next block is A, and the probability of an attacker
mining the next block is Q:
COMPLEXITY OF
COMPROMISING OUR
NETWORK
The complexity of compromising a network is directly proportional to the hash rate
of the entire network. The probability of comprising a blockchain network is 100%,
if an attacker has more than 50% of the hash rate. So, to compromise a network, an
attacker needs to have a hash rate that is 50% of the network. Thus, complexity C
can be defined in terms of H as
600
500
400
Complexity
300
200
100
0
0 200 400 600 800 1000 1200
Time taken in ms
App to Server Server to Smart Contract Controller to Smart Contract Controller to Switch
CONCLUSION
Increasing the hash rate of a network will increase the complexity
of compromising the network.
The hash rate can be increased both vertically and horizontally.
However, the horizontal increase is favored over vertical increase,
since it also precludes networks being compromised by physical
attacks against blockchain controllers