MULTI-LEVEL VPN-TUNNELING METHOD FOR ENSURING REMOTE ACCESS TO EXTRANET NETWORK NODES

Authors

DOI:

https://doi.org/10.35546/kntu2078-4481.2025.3.2.66

Keywords:

SDN, Bittorrent, decentralization, security, latency

Abstract

The article proposes a method for organizing a secure segment of a private SDN network using the BitTorrent protocol for data transmission. This method combines the flexibility of centralized management, implemented through an SDN controller, with the high efficiency of distributed data transfer between Nodes of an isolated secure network segment. To achieve the stated goal, experimental modeling and the study of three variants of secure access organization to a segment of a corporate computer network were conducted based on the local network of the Department of Electronic Computers at Kharkiv National University of Radio Electronics. In the first model, access was implemented using the OpenVPN protocol, which provides basic data confidentiality and integrity but limits system scalability and fault tolerance. The second model involved the use of the BitTorrent protocol to organize secure and distributed data transfer between Nodes; however, it does Not provide centralized control. The third model, which underlies the proposed method, involves the construction of a logically isolated SDN segment that addresses the limitations of the previous models. Data transmission within this segment is carried out using the BitTorrent protocol, which helps offload central channels and ensure fault tolerance of individual Nodes. Simultaneously, the centralized SDN controller provides monitoring, routing, and access control, ensuring a high level of security. This combination minimizes latency, optimizes the use of network resources, and increases the overall throughput of the system. The evaluation of the proposed approach demonstrated that the use of logically isolated segments in SDN networks contributes to the reduction of internal delays and enhances control over traffic routing. The obtained results confirm the practical feasibility of applying the proposed method to construct secure and high-performance segments of corporate networks to ensure reliable data transmission.

References

Latif Z., Umer Q., Lee C., Sharif K, Li F., Biswas S. A Machine Learning-Based Anomaly Prediction Service for Software-Defined Networks. Sensors. 2022; vol. 22, No. 21. P. 8434.

Wadhwani P, Software Defined Networking Market – By Component (Solution [Physical Network Infrastructure, SDN Controller, SDN Application], Service [Professional, Managed]), By End Use (Enterprise, Cloud Service Provider, Telecom Service Provider) & Forecast, 2024–2032. URL https://www.gminsights.com/industry-analysis/softwaredefined-networking-sdn-market (дата звернення: 10.06. 2025).

Suliyanti W. N., Sari R. F. Blockchain-Based Double-Layer Byzantine Fault Tolerance for Scalability Enhancement for Building Information Modeling Information Exchange. Big Data Cogn. Comput. 2023. Vol. 7. P. 90.

Tanuja J., Goyal N., Ram M. An approach to analyze reliability indices in peer-to-peer communication systems. Cybernetics and Systems. 2022. Vol. 53. No. 8. P. 716–733.

Khalid M. I., Ehsan I., Al-Ani A., Iqbal J., Hussain S., Ullah S. S., Nayab A comprehensive survey on blockchainbased decentralized storage networks. IEEE Access. 2023.Vol. 11. P. 10995–11015.

М. Кренцін, Л. Куперштейн. Метод обміну ідентифікаційними даними між вузлами пірингової мережі на основі технології NFC. Кібербезпека: освіта, наука, техніка. 2024. вип. 1, № 25, С. 79–88.

Abdullahi Yari I, Dehling T, Kluge F, Geck J, Sunyaev A, Eskofier B. Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review. J Med Internet Res. 2021. Vol. 23. No. 11. P. e24460.

BitTorrent : The World’s Most Popular Torrent Client. URL:https://www.bittorrent.com/btt/btt-docs/BitTorrent_(BTT)_White_Paper_v0.8.7_Feb_2019.pdf (дата звернення: 21.07.2025).

Куперштейн Л. М. Аналіз тенденцій розвитку пірингових мереж. Вісник Хмельницького національного університету. Технічні науки. 2021. № 4. С. 25–29.

Aldabbas H. Efficient bandwidth allocation in SDN-based peer-to-peer data streaming using machine learning algorithm. The Journal of Supercomputing. 2023. Vol. 79. No. 6. P. 6802–6824.

Hill W., Acquaah Y. T., Mason, J., Limbrick D., Teixeira-Poit S., Coates C., Roy K. DDoS in SDN: A review of open datasets, attack vectors and mitigation strategies. Discover Applied Sciences. 2024. Vol. 6. No. 9. P. 472.

Pang S., Zeng D., Chen X. Research on SDN-based data center network traffic management and optimization. 2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA), Shenyang, China, 21–23 January 2022. 2022. URL: https://doi.org/10.1109/icpeca53709.2022.9718973 (date of access: 15.08.2025).

Suhail A., Mir Ajaz H. Scalability, consistency, reliability and security in SDN controllers: a survey of diverse SDN controllers. Journal of Network and Systems Management. 2021. Vol. 29. No 1. P. 9.

Hwang I.-S., Rianto A., Kharga R., Ab-Rahman M. S. Global P2P BitTorrent Real-Time Traffic Over SDN-Based Local-Aware NG-PON2. IEEE Access. 2022. Vol. 10, P. 76884–76894.

Vemasani P., Modi S. Building Resilient Distributed Systems: Fault-Tolerant Design Patterns for Stateful Workflows. International Journal of Computer Engineering and TechNology. 2024. Vol. 15. P. 169–181.

Ткачов В. М., Чепурна І. С., Фесенко Т. Г. Метод мультирівневого VPN-тунелювання для забезпечення віддаленого доступу до вузлів екстранет-мережі. Вісник Херсонського національного технічного університету. 2024. № 3(90). С. 299–308.

Published

2025-11-28