You are on page 1of 7

SUBMITTED TO THE IEEE, PROF. T. SZYMANSKI, AUG.

8, 2023, CONFIDENTIAL 1

A Software-Defined Deterministic Internet of


Things (IoT) with Artificial Intelligence (AI) for
Quantum-Safe Cyber-Security
Ted H. Szymanski, Dept. ECE, McMaster University, Canada (email: teds@mcmaster.ca)

Abstract—The next-generation Internet of Things (IoT) will Cyber-attacks against critical infrastructures can have severe
enable Industry 4.0 and Smart Cyber-Physical Systems, including consequences. In May 2021, the USA’s Colonial Pipeline
Smart Cities and Smart Manufacturing. These Smart Systems suffered a ransomware cyber-attack. This pipeline supplies
require ultra-low latencies, and immunity from cyber-attacks.
This paper explores a ”Software-Defined Deterministic IoT”, about 45% of the east coast’s energy needs. In response,
with Artificial Intelligence (AI) for Cyber-Security. It introduces a US Executive Order 14028 entitled ”Improving the Na-
a new sub-layer (3a) of ”Software Defined Deterministic Wide tion’s Cybersecurity” directed US industries to adopt a ”Zero
Area Networks” (SDD-WANs), using authenticated deterministic Trust Architecture” (ZTA). In a ZTA, access to any resource,
packet switches (i.e., low-cost FPGAs). A ”Software Defined however small, requires user authentication. According to the
Networking” (SDN) control-plane uses collaborative AI systems
to implement Zero Trust Architectures (ZTAs) and Guaranteed firms Cybersecurity Ventures and Statistica, the global costs
Intrusion Detection Systems, to control access to all critical of cyber-crime will reach $10.5 trillion and $17.6 trillion USD
resources. The approach has many benefits: (i) All interference, per year by 2025. Clearly, the cyber-security crisis is deep and
congestion, and ”Distributed Denial-of-Service” (DDoS) attacks deepening every year.
are eliminated; (ii) End-to-end delays are reduced to the speed of The prospect of Quantum Computers poses new threats
light in fiber; (iii) The SDD-WANs provide hardware support for
the US NIST ZTA and ”Post Quantum Cryptography” (PQC); to cyber-security, not considered by the NAE [2]. In 2019,
(iv) Deterministic traffic flows are encrypted and authenticated Google claimed to achieve ”Quantum Supremacy”, by demon-
with Quantum-Safe ciphers, to be immune to attacks from strating a Quantum Computer to solve a specialized problem
Quantum Computers; (v) The expected number of a successful in minutes, which would otherwise take 1,000s of years to
cyber-attacks per year against a nation’s critical infrastructure solve. Google’s claim initiated a race to build a programmable
from external cyber-attackers is zero; (vi) The introduction of
SDN, FPGAs and determinism into layer-3 can save potentially Quantum Computer. Both IBM and Google are developing
$100s of billions USD per year globally. super-conducting Quantum Computers, which can achieve
exponential speedups over traditional silicon supercomputers.
Index Terms—Deterministic, Internet of Things (IoT), cyber-
security, Industry 4.0, Artificial Intelligence (AI), Cyber Physical They can employ Shor’s algorithm to crack the ”Public Key
Systems, Software Defined Networking (SDN), FPGAs, Zero Cryptography” (PKC) used to secure communications in the
Trust Architecture, Post Quantum Cryptography, Quantum IoT, and throw the world into disarray.
Computing, Industrial/Tactile IoT According to the US government, Quantum Computers may
soon be able to ”jeopardize civilian and military communi-
cations, undermine the supervisory and control systems of
I. I NTRODUCTION
critical infrastructure, and defeat the security of the global
The next-generation ”Internet of Things” (IoT) will enable Internet-based financial markets”. To address this threat, the
the 4th wave of the Industrial Revolution, called Industry 4.0. US NIST (”National Institute for Standards and Technology”)
It will control the smart Cyber-Physical Systems of the 21- has adopted ”Post Quantum Cryptography” (PQC). In 2022 it
st century, including Smart Cities, and Smart Manufacturing. announced 4 ”Quantum-Safe” algorithms to be standardized.
According to General Electric, the future Industrial IoT will These algorithms will be incorporated into the BE-IP infras-
enable ≈ 50% of global economic activity by the year 2030. tructure to ensure that communications in the Transport Layer
In 2008, the US ”National Academy of Engineering” (NAE) (layer-4) are Quantum-Safe. However, layer-4 is subjected to
identified 14 ”Grand Challenge” problems for the 21st century, layer-3 problems and cyber-attacks, i.e., interference, conges-
including achieving: (i) Fusion Energy, (ii) Carbon Seques- tion, DoS and DDoS attacks. Hence, the original NAE problem
tration, and (iii) Security in Cyberspace [1]. Unfortunately, of Security in Cyberspace, focussing on layer-3 vulnerabilities,
in 2023 the world is in the midst of a cyber-security crisis, must still be solved [3].
and each year it deploys vast amounts of insecure ”Best- This paper explores a ”Software Defined Deterministic
Effort Internet-Protocol” (BE-IP) hardware, further deepening IoT”, based upon the ”Cyber-Security via Determinism”
the crisis. This paper proposes a solution to the NAE grand- paradigm proposed in [3]. It achieves strict cyber-security,
challenge problem of Security in Cyberspace for critical by exploiting the properties of determinism. It eliminates
infrastructure, i.e., a network architecture to eliminate external 3 major cyber-security vulnerabilities, that have existed in
cyber-attacks against critical infrastructure, such as nuclear IP layer-3 for decades, i.e., the use of: (i) unencrypted IP
reactors and the Smart Power Grid. packet headers, (ii) unauthenticated IP packet headers, and
SUBMITTED TO THE IEEE, PROF. T. SZYMANSKI, AUG. 8, 2023, CONFIDENTIAL 2

end-to-end delays, typically 100s of milliseconds [4], and poor


link utilization, typically <= 30%. Layer-3 is also vulnerable
to many cyberattacks. According to Cisco, there will be 15.4
million DDoS attacks in layer-3 in 2023 alone [5].
According to Akamai, a global Internet which operates
at the ”Speed-of-Light” would be truly transformational [4].
According to Cisco, BE-IP routers are manually configured
to improve cyber-security, with operational costs equalling
2...3 times the capital costs [5]. There is an immense need
to ”Transform the Infrastructure”, to include SDN technology,
to simply network control [5]. According to Meta, the world
needs ”vast enhancements in capacity and fundamental shifts
in how networks are architected and deployed”. According
to Huawei, layer-3 must evolve to support cyber-security,
ultra-low-latency, flexibility and deterministic services. The
ETSI (European Telecommunications Standards Institute) has
Fig. 1. Layer-3 and sub-layer-3a. The top half illustrates a ”Best-Effort” IP
network in layer-3, which consists of many BE-IP routers and one middle-
a ”Non-IP Networking” group exploring new infrastructure
box. The bottom-half illustrates sub-layer-3a, with an SDN Control-plane, and for the 21st century, and a ”Next Generation Protocols”
one (or more) SDD-WANs. The SDD-WAN consists of many FPGAs. group exploring a large-scale deterministic network. The ITU
(International Telecommunication Union) is exploring a future
”Network 2030” that supports determinism, reliability and in-
(iii) middle-boxes. It can create millions of programmable
telligence [6]. Clearly, many of the world’s largest corporations
authenticated ”deterministic traffic flows” (D-flows), through
are highlighting the urgent need for innovation in layer-3.
a network of 1000s of authenticated ”deterministic packet
switches” (D-switches), to support critical infrastructure.
The approach offers several key benefits [3]: (a) Each B. Layer 3 Cyber-Security Vulnerabilities and Features
nation can significantly strengthen its national security; The The global IoT is composed of the union of many ”Wide
expected number of successful cyber-attacks per year, by an Area Networks” (WANs), distributed world-wide. Major firms
external cyber-attacker against a nation’s critical infrastructure, such as Microsoft and Google often deploy their own WANs.
is zero. (An external cyber-attacker cannot access a secured
Fig. 1 illustrates a layer-3 BE-IP network, which consists
machine.) This benefit can have geo-political implications
of many BE-IP routers, and a ”middle-box”. Middle-boxes
world-wide, i.e., the USA, EU, China, Russia, Iran, Israel and
perform essential functions, such as ”Network Address Trans-
Ukraine could achieve immunity to cyber-attacks against crit-
lation” (NAT), firewalls and load-balancing, and they may
ical infrastructure (i.e., nuclear reactors) from external cyber-
modify unencrypted IP packet headers ”on-the-fly”. A new
attackers, relatively quickly. (b) It introduces a forwarding
sub-layer-3a is shown below layer-3, consisting of an SDN
layer for authenticated D-flows (i.e., sub-layer-3a), comprising
Control-plane, and one SDD-WAN (”Software Defined Deter-
an SDN control-plane, and many authenticated D-switches,
ministic Wide Area Network”). The SDD-WAN implements a
realized with FPGAs. The introduction of SDN, FPGAs and
forwarding-layer for authenticated D-flows, consisting of many
determinism into layer-3 can improve security, and reduce
authenticated D-switches (i.e., FPGAs).
global costs by $100s of billions USD per year (see section
MPLS WANs have been widely deployed since year 2000.
IV). (c) It provides hardware support in layers 3 and 4 for the
A MPLS (”Multi-Protocol-Label-Switching”) WAN introduces
US NIST ZTA and PQC, for compliance with US Executive
an MPLS control-plane and a forwarding-plane with many
Order 14028; (d) It can reduce the costs to society of cyber-
MPLS switches. The MPLS WAN is typically deployed in
crime, estimated to exceed $10 trillion USD per year by 2025.
a separate sub-layer, similar to Fig. 1. MPLS WANs can
Section II reviews relevant technologies. Section III presents
achieve high link utilizations and very low delays, i.e., 1-10
the key features. Section IV addresses cost savings. Sections
milliseconds, and they are quite secure, as they are isolated
V and VI conclude the paper and list acronyms.
from the BE-IP WANs. However, they are expensive, con-
tributing to the very high capital costs of $100s of billions
II. S UPPORTING T ECHNOLOGIES
USD per year (see section IV). The recent IETF DetNet
A. The Need for Innovation in Layer 3 (”Deterministic Networking”) WAN introduces ”Converged-
According to Cisco, the layer-3 BE-IP network will support Routers” into layer-3, which support both Best-Effort and
about 30 billion devices and 30 billion traffic flows by 2023 Deterministic services [7]. The IETF DetNet WANs can also
[5]. It carried about 9.1 billion Gigabytes of traffic each day achieve higher link utilizations and low delays, i.e., 1-10
in 2021, with IP video accounting for 82% of all traffic. The milliseconds. However, they are subject to cyber-attacks and
average global Internet traffic rate was ≈ 847 Tbps (Terabits also quite expensive.
per second) in 2021. BE-IP WANs forward packets using IP versions 4 or 6 (IPv4
Unfortunately, the BE-IP network suffers from interference or IPv6), and suffer from three serious cyber-security vul-
and congestion. Congestion causes ”BufferBloat” with large nerabilities: (i) They use unencrypted packet headers, which
SUBMITTED TO THE IEEE, PROF. T. SZYMANSKI, AUG. 8, 2023, CONFIDENTIAL 3

TABLE I 5) Guaranteed Intrusion Detection: The BE-IP and Det-


C YBER -S ECURITY V ULNERABILITIES AND F EATURES (T RUE /FALSE ) Net WANs do not provide any ”Intrusion Detection Sys-
tem” (IDS). Malicious traffic from a compromised middle-
Network (horizontally) BE-IP MPLS DNET SDD
Criterion (vertically) WAN WAN WAN WAN box may traverse the network undetected. In contrast, the
Avoids Unencrypted headers F F F T SDD-WAN provides a hardware-based ”Guaranteed Intrusion
Avoids Unauthenticated headers F T F T Detection System”, where every malicious packet is detected.
Avoids IP Middle-Boxes F T F T 6) Customized Services using SDN: The BE-IP, MPLS and
Immunity to DoS,DDoS Attacks F T F T
Guaranteed Deterministic Service F F F T
DetNet WANs do not provide a programmable environment,
Guaranteed Intrusion Detection F F F T where services can be customized. In contrast, the SDD-WAN
Customized Services via SDN F F F T relies upon SDN, and is completely programmable.
Exploits Low-Cost FPGAs F F F T
7) Exploits Low-Cost FPGAs: Finally, the BE-IP, MPLS
and DetNet WANs rely upon expensive hardware, where
global capital costs exceed $100s of billions USD per year (see
they must process to make layer-3 routing decisions [8]; (ii) section IV). In contrast, the SDD-WANs use SDN and FPGAs,
They use unauthenticated packet headers: There is no means to achieve a significant cost-reduction. These techniques can
to authenticate the sender, i.e., to verify that it is who it claims also be used to secure optical, electrical and wireless networks,
to be. Hence, cyber-attackers can easily masquerade as trusted in Wide Area, Regional Area, and Local Area Networks.
peers in layer-3, by inserting malicious packets claiming to be
from a different sender; (iii) They use middle-boxes to perform
C. Authentication and Privacy via Cryptography
various functions, which are often insecure.
Table 1 illustrates cyber-security vulnerabilities and fea- 1) Symmetric (Secret) Key Cryptography (SKC): In SKC,
tures, for four types of layer-3 WANs (please note DNET the sender and receiver share a secret symmetric key, to
denotes DetNet). The SDD-WAN can be viewed as a encrypt and decrypt messages using Quantum-Safe ciphers.
highly-optimized software-programmable version of the well- SKC also achieves authentication of each end. The need to
established MPLS WAN, that uses low-cost FPGAs. share a secret key is a drawback, and motivates the ”Public Key
Cryptography” (PKC) described ahead. SKC is more efficient
1) Packet Headers: The BE-IP, MPLS and DetNet WANs
than PKC; it typically uses smaller key sizes, the security is
use unencrypted packet headers. The BE-IP and the DetNet
stronger, and the computations are faster. Popular SKC ciphers
WANs also use unauthenticated packet headers. These ma-
are the US Advanced Encryption Standard (AES) block cipher,
jor cyber-security vulnerabilities have existed in layer-3 for
and the Chacha20 stream cipher.
decades. A cyber-attacker with access to fiber can read and
The US NIST defines several security levels for ciphers.
modify unencrypted layer-3 packet headers, to masquerade as
The AES-256 security-level implies that a cipher is at least as
a trusted peer [3]. These vulnerabilities are so entrenched into
hard to crack, as the AES cipher with a 256-bit key. Grover’s
BE-IP layer-3, that even the latest IETF DetNet WAN still
quantum-search algorithm can crack AES, with a quadratic
relies upon them [7]. In contrast, the SDD-WAN eliminates
speedup. To crack AES with a 256-bit key, a brute force
processing packet headers in switches, to eliminate these
search requires 2256 ≈ 1077 √ evaluations of the AES function.
vulnerabilities.
Grover’s algorithm requires 1077 = 1038.5 quantum-queries
2) Middle-Boxes: The traffic in the BE-IP and DetNet of the AES function. The minimum time for a quantum-gate
WANs may pass through ”middle-boxes”. Middle-boxes are operation is ≈ 10−9 seconds. The minimum time to crack
unregulated, and represent a major cyber-security vulnerabil- this cipher, using a super-conducting Quantum Computer, is
ity, that has also existed in layer-3 for decades. A cyber- ≈ 1029.5 seconds. The life of the universe is ≈ 13.8 billion
attacker can compromise a middle-box, and thereby read and years, or 1021 seconds. Hence, there is not enough time in the
modify all traffic passing through it. In contrast, the SDD- life of the universe, to crack the NIST AES-256 security level,
WAN eliminates middle-boxes, to eliminate this vulnerability. with a super-conducting Quantum Computer [3].
3) DoS and DDoS Attacks: In a DoS or DDoS attack, a 2) Public Key Cryptography (PKC): Currently, PKC is
cyber-attacker will attempt to overwhelm a target (i.e., a web- used to secure most internet communications. In PKC, keys
server, or a router) with a large volume of malicious traffic. For are generated in pairs, with a Public Key and a Private Key. A
example, a cyber-attacker in a compromised middle-box can web-site may generate a pair of keys, and advertise its Public
generate a DoS attack against a DetNet Converged-Router, by Key to the world, on a Web-Certificate. The Web-Certificate
generating a large volume of malicious DetNet packets. The contains a Digital Signature, to ensure it cannot be tampered
targeted Converged-Router will then reduce or deny service with. Any user wishing to connect to the web-site uses the
to legitimate DetNet packets. In contrast, the SDD-WAN Public Key to encrypt its data. The web-site uses its Private-
eliminates middle-boxes, to eliminate these vulnerabilities. Key to decrypt the data. Unfortunately, Quantum Computers
4) Guaranteed Deterministic Service: Middle-boxes do not are expected to crack PKC by about 2030.
provide guaranteed deterministic-service. Hence, the IETF 3) Post-Quantum Cryptography (PQC): In 2017, NIST
acknowledges that the DetNet WAN may not provide true started a PQC Standardization Process, to standardize (i)
guaranteed deterministic service, when DetNet traffic flows public-key encryption algorithms, and (ii) digital signature
pass through middle-boxes [7]. algorithms. The final selections were made after 3 rounds of
SUBMITTED TO THE IEEE, PROF. T. SZYMANSKI, AUG. 8, 2023, CONFIDENTIAL 4

TABLE II
F IBER VS . Q UEUING D ELAYS , ON S ELECTED D- FLOWS ( IN µ- SEC )

dst Seattle Los New Miami


src Angeles York
Seattle -na- (8,957 (20,831 (23,794
vs. 4.8) vs. 3.3) vs. 3.1)
Los (8,957 -na- (21,140 (22,726
Angeles vs. 6.1) vs. 4.6 ) vs. 5.2)
New (22,207 (21,140 -na- (1,587
York vs. 4.2) vs. 4.3) vs. 3.4)
Miami (23,794 (22,726 (1,587 -na-
vs. 4.4) vs. 4.5) vs. 2.5)

III. T HE SDD-WAN - K EY F EATURES


As shown in Fig. 1, a BE-IP WAN in layer-3 represents
an ”Open System”, with billions of traffic flows, transmitting
Fig. 2. An SDD-WAN supporting 26 cities in the USA. 2 DVPNs are shown,
each with 26 D-flows, originating at Seattle (red lines) or Miami (blue lines). billions of Gigabytes of data per day, all using unencrypted
and unauthenticated IP packet headers. There is considerable
research into AI-based ”Machine Learning and Deep Learn-
competition, in July 2022. In the class of public-key encryption ing” algorithms, to implement ”Intrusion Detection Systems”
algorithms, the Crystals-Kyber submission was selected. In to detect cyber-attackers in this environment [11][12][13]. The
the class of digital signature algorithms, 3 submissions were task of detecting intrusions by cyber-attackers from such a
selected: (i) Crystals-Dilithium, (ii) Falcon, and (iii) Sphincs+. vast amount of unauthenticated data is extremely difficult, and
These PQC algorithms will be integrated into the BE-IP requires vast amounts of computing power, time and energy.
protocol suite, into the ”Best-Effort VPNs” (BE-VPNs) used Fig. 1 also illustrates an SDD-WAN in sub-layer-3a [3],
in the Transport Layer (4), over the next several years [9]. Typ- which uses 3 types of secured (authenticated) components:
ically, a BE-VPN in layer 4 will be adapted to use both PQC (i) the SDN Control-Plane; (ii) the D-switches; and (iii) the
and traditional PKC, and will thus be immune to cryptography- ”Deterministic Transceivers” (D-transceivers). The commu-
based attacks from Quantum Computers [9]. However, a nications between the SDN control-plane and the secured
Quantum-Safe BE-VPN in layer-4 is still vulnerable to all components use Quantum-Safe ciphers, for both authentication
layer-3 problems and cyber-attacks, i.e., interference, conges- and privacy (see ahead).
tion, DoS and DDoS attacks [3]. Hence, the original NAE Each D-switch is connected to one D-transceiver (not
problem of achieving ”Security in Cyberspace”, focussing on shown in Fig. 1), which transmits data into (and receives
layer-3 vulnerabilities, must still be addressed. data from) the network. The D-switches do not process any
unencrypted and unauthenticated IP packet headers, to per-
form routing or scheduling functions. In contrast, the SDN
D. FPGAs with Tbps of IO Capacity control-plane precomputes the routing and scheduling for D-
flows in advance, and downloads ”Deterministic Schedules”
It is impossible to fit a BE-IP router with Tbps capacity on (D-schedules) to the D-switches and D-transceivers [3]. Rout-
an FPGA, as it experiences ”BufferBloat” [4], and requires ing information is contained in a D-schedule, based upon a
buffers for 10s of millions of packets. However, determinism packet’s arrival time within a periodic (repeating) scheduling
can reduce buffer sizes by ≈ 100,000 times [3][10]. Hence, frame [3]. Each D-switch and D-transceiver maintain a D-
a simple authenticated D-switch, with buffers for 100s of schedule for each incident link that specifies which D-flow has
packets, can realized on a single low-cost FPGA. a reservation for data transmission/reception, for each time-slot
The Intel Stratix 10 TX FPGA is fabricated with a 14 within the scheduling-frame. The D-schedule also identifies
nanometer tri-gate CMOS technology. One FPGA supports the desired output link for each incoming packet to a D-switch.
computations at 9 TeraFlops/sec, and 60 electrical transceivers The use of pre-computed D-schedules removes the need to
operating at 57.8 Gbps, for a peak IO bandwidth of ≈ 3.5 process unencrypted and unauthenticated IP packet headers,
Tbps. The price is ≈ $7,500 USD per FPGA. A D-switch with and the need for middle-boxes, which thus eliminates 3 major
≈ 3.5 Tbps capacity can fit on a single FPGA, and consume cyber-security vulnerabilities that have existed in layer-3 for
≤ 225 watts. decades. (Please see [3][10] for more details.)
For comparison purposes, a Cisco CRS-3 (Carrier Router A ”Deterministic Virtual Private Network” (DVPN) is a
System) BE-IP router chassis that was commercially-available collection of D-flows, under the control of a single enterprise
in 2015 had a capacity of 4.5 Tbps, occupied 56 cubic feet (analogous to a ”VPN” in the BE-IP). DVPNs are logically
of volume, weighed 1,630 pounds, and used 7.66 kW of isolated, interference-free and secure. When a new D-flow in
power. These FPGAs have only been available since 2018, a DVPN is created, the D-transceivers are assigned a secret
and provide an unprecedented opportunity for innovation and Quantum-Safe cipher, from the SDN control-plane, over a
cost-reduction. highly-encrypted control channel. The cipher provides both
SUBMITTED TO THE IEEE, PROF. T. SZYMANSKI, AUG. 8, 2023, CONFIDENTIAL 5

encryption and authentication, for every D-flow in a DVPN flows between different SDD-WANs. The IoT-Controller is
(please see [3] for details). managed by industry or government.
Sub-layer-3a represents a ”Closed System”. The SDD-WAN Each WAN-Controller stores the Knowledge Base needed to
can create thousands (or millions) of programmable, authenti- maintain secure D-flows between different enterprises within
cated D-flows, through 100s (or 1000s) of authenticated D- one SDD-WAN. It is managed by the WAN service-provider.
switches. The task of identifying cyber-attacks within this Each Enterprise-Controller stores the Knowledge Base that
closed system is relatively easy, as every D-flow is authen- each enterprise uses to manage its own resources. It typically
ticated. includes the following objects, each with its associated at-
Fig. 2 illustrates an SDD-WAN for the USA, with 26 tributes:
cities and 82 links [3]. The bold lines represent fiber-optic • Employees; Secured Computers; Databases;
links between cities, and the dotted lines represent ”ultra- • D-Transceivers; DVPNs
low-latency links” (i.e., D-flows). (Our technologies work For example, each employee may have a list of attributes in-
with fiber-optic, electrical or wireless links.) To test the SDN cluding: a name, a unique employee number, an address, a cell-
control-plane, an SDD-WAN with 26 D-switches for the USA phone number for dual-factor authentication, other biometric
topology shown in Fig. 2 was implemented on a single Altera data, i.e., a picture for facial recognition; a ”finger-print”, a
FPGA, and the system worked perfectly [3][10]. ”voice-print” for voice-recognition; a traditional password, a
The SDN control-plane can program millions of authen- longer Quantum-Safe password, a hash of each password, the
ticated D-flows into the SDD-WAN. Each D-flow receives employee’s speciality, bits denoting permissions to read or
deterministic service, and is immune to interference, conges- write the Knowledge Base; and a list of secured computers
tion, and cyber-attacks from external cyber-attackers. Table II and databases which the employee can access. Similarly, a
compares the fiber-delay versus the experimental deterministic secured machine and secured data-bases have many attributes,
queuing-delay, for selected D-flows. Assume each fiber-optic which can be used in rules to control access. The use of AI-
link operates at 800 Gbps, packets have 1K bytes, and the based ZTAs with biometric data will also significantly reduce
network is heavily loaded (98% utilization) [3]. The D- the number of successful internal cyber-attacks. (Please see
flow from Seattle to Miami has an end-to-end fiber-delay of [3] for details.)
23.8 milliseconds, and a queueing-delay of 3.1 microseconds.
Observe that for all D-flows, the end-to-end delay is deter-
mined by the ”speed-of-light” in fiber, as the queuing-delay is B. Security Properties
negligible. The SDD-WAN supports an ”Internet at the Speed Property 1 - Parallel AI Controllers with Majority Voting:
of Light” as envisioned by Akamai [4]. (Please see [3][10] for Copies of each AI controller execute in several data-centers,
additional experimental results.) and majority voting is used to make decisions. For example,
The scheduling algorithms in the SDN control-plane are 5 copies of a controller may exist, and 3+ copies must agree
highly-optimized to achieve 100% throughput with near- on each decision. This parallelism provides immunity from
minimal delay; please see [3] for details. For example, the cyber-attacks (or catastrophes, terrorist attacks or earthquakes)
D-transceivers split large IP packets into smaller fragments against any one AI controller or data-center.
(i.e., 1 Kbytes), to achieve very low delays in sub-layer-3a. Property 2 - Packet Headers & Middle-Boxes are Elimi-
nated: The SDN control-plane pre-computes the routing and
A. The Collaborative AI Controllers scheduling of D-flows, and it downloads D-schedules to the D-
switches and D-transceivers. This property eliminates: (i) the
According to the US NIST, an ”Attribute-Based Access need to process unencrypted and un-authenticated IP packet
Control System” (AB-ACS) comprises: (a) A set of objects, headers, (ii) the need for middle-boxes. Middle-boxes are a
where each object is associated with a list of attributes; (b) major cause of the ”ossification” of layer-3. This property
A set of requestors, where requestors can request access to eliminates 3 major cyber-security vulnerabilities, that have
objects; (c) A set of rules, in the form of ”if...then” clauses; (d) existed in IP layer-3 for decades. This property also eliminates
A ”Policy-Engine”, to process the rules, perform logical infer- DoS and DDoS attacks in layer-3.
ences and determine the decisions / outcomes, i.e., ultimately Property 3 - Only Authorized D-flows are Delivered: Only
grant (or deny) a requestor’s requests for access to objects; authorized and authenticated D-flows are routed and sched-
and (e) A set of ”Policy Enforcement Points”, i.e., devices uled by the SDN control-plane. Each Enterprise-Controller
which enforce the policy decisions [14]. The AB-ACS is an requests a D-flow from the WAN-Controller. If the request
AI rule-based ”Expert System”, which is used to implement is granted, the D-switches and D-transceivers will receive
Zero Trust Architectures [15], in the proposed SDD-WANs. updated D-schedules, which define the precise time-slots in a
The sets (a), (b) and (c) comprise the ”Knowledge Base” of periodic scheduling frame, in which authorized data transmis-
the Expert System. sions/receptions may occur. Data transmitted at any other times
The SDN Control-Plane is organized hierarchically into are un-authorized, and are immediately detected in hardware.
three types of Collaborative AI rule-based Controllers: Property 4 - The Guaranteed Intrusion Detection System:
• the IoT, WAN, and Enterprise Controllers The D-switches and D-transceivers implement a ”Guaran-
The IoT-Controller stores the Knowledge Base (i.e., all the teed Intrusion Detection System”, where any un-authorized
rules, objects, and attributes), needed to maintain secure D- transmission by a cyber-attacker is detected in real-time. A
SUBMITTED TO THE IEEE, PROF. T. SZYMANSKI, AUG. 8, 2023, CONFIDENTIAL 6

TABLE III Consider an SDD-WAN for the USA as shown in Fig. 2a,
R EVENUE FOR G LOBAL BE-IP E QUIPMENT S ALES (B ILLIONS OF USD) with 26 D-switches. Let each D-switch use 8 Intel Stratix
FPGAs, operating in parallel, for a peak capacity of 28
Company 2018 2019 2020 2021
Tbps. The cost of the 208 FPGAs is ≈ $1.6 million USD.
Arista 2.15 2.41 2.32 2.95
Ciena 3.09 3.57 3.53 3.62 The network also requires D-transceivers, transducers (i.e.,
Cisco 49.3 51.9 49.3 49.8 electrical-to-optical) and power supplies (costing ≈ $100K per
Ericsson 24.23 24.03 25.23 27.07 FPGA). The total capital cost is ≈ $23 million USD. The peak
Huawei 105.19 122.97 136.7 99.89
Juniper 4.65 4.45 4.45 4.74
capacity is ≈ 728 Tbps, nearly equal to the average global
Nokia 26.61 26.11 24.92 26.24 Internet traffic rate of 847 Tbps (in 2021). The SDD-WAN
Total 215.22 235.44 246.55 214.31 offers a considerable increase in capacity, for a negligible cost.
The same technology can achieve cyber-security in smaller
Regional Area Networks, Metro Area Networks and Local
malicious packet that arrives during a time-slot in which no Area Networks. If ten times as many FPGAs are introduced
arrival is scheduled is clearly an anomaly, i.e., a cyber-attack. into the USA (i.e., 2080 FPGAs), then the peak capacity is
The packet is not forwarded, and the SDN control-plane is ≈ 7,280 Tbps, and the capital cost is ≈ $230 million USD
immediately informed. A malicious packet that overwrites a (which is very small).
legitimate packet is handled in Property 7. According to Cisco, the operational costs of manually
Property 5 - Zero Trust Architectures: In the older ”Trusted- configuring BE-IP routers for cyber-security are ≈ 2.5 times
Zone” security model, which is now considered insecure, a the capital costs [5]. Hence, the combined global capital and
user is authenticated once when it enters a ”Trusted-Zone”, and operational costs of the layer-3 BE-IP network were ≈ $430
thereafter it can access all resources within the zone without billion USD, in 2020. (This figure is less than 1% of global
further authentication. In the proposed SDD-WAN, the AI economic output, so it seems reasonable [3].)
Controllers implement many ZTAs; The AI controllers will According to Cisco, about 82% of layer-3 BE-IP traffic
authenticate a user for every request to any resource, however was IP video in 2021. Let this IP video traffic be migrated
small. There is no Trusted-Zone. down to sub-layer-3a, where it is transported by D-flows. This
Property 6 - D-flows use Quantum-Safe Ciphers: The D- migration will lower the capital and operational costs in layer-3
flows do not use unencrypted and unauthenticated IP packet by ≈ 82% each. The global savings in capital and operational
headers, to perform layer-3 routing. Hence, packets in a costs together can reach $100s of billions USD per year.
D-flow can be completely encrypted from end-to-end with
Quantum-Safe ciphers. The ciphers provide both encryption V. C ONCLUSIONS
and authentication, for every packet in a D-flow. The Internet has used an inefficient Best-Effort commu-
Property 7 - Authorization-Checks at D-sinks: Every legit- nications paradigm for the last 40 years. Akamai, Cisco,
imate packet in a D-flow must pass an Authorization Check Meta, Huawei, the ETSI and the ITU have all highlighted
when received at a D-transceiver. The packet will be decrypted the urgent need to innovate the layer-3 BE-IP. This paper
and thereby authenticated. The minimum requirements for an explores a ”Software-Defined Deterministic IoT”, to address
external cyber-attacker to successfully insert an undetected the NAE grand-challenge problem of Security in Cyberspace,
malicious packet are: (a) it over-writes an authorized packet for critical infrastructure. A new forwarding sub-layer-3a is
with a malicious packet (to avoid detection), and (b) it has proposed, with an SDN control-plane and many SDD-WANs.
cracked the Quantum-Safe cipher used to encode the packet Each SDD-WAN consists of many authenticated D-switches,
(i.e., with AES-256 security). There is not enough time in i.e., low-cost FPGAs. It exploits several collaborative AI-
the life of the universe, for a Quantum Computer to crack based Zero Trust Architectures, to control access to critical
AES-256. Therefore, the probability that a cyber-attacker can resources. Each SDD-WAN supports many ”speed-of-light”
successfully insert a malicious packet into a D-flow using programmable, authenticated and encrypted D-flows, over a
AES-256 ciphers is zero. All cyber-attacks by external cyber- network of authenticated D-switches. (These innovations are
attackers are thereby eliminated. also described in more depth in several US patents by the
author.) The approach eliminates cyber-security vulnerabilities
IV. C APITAL AND O PERATIONAL C OSTS OF L AYER -3 IP that have existed in layer-3 for decades, and offers several ben-
Table 2 shows the yearly revenue for several major BE- efits: (i) The expected number of successful cyber-attacks per
IP equipment manufacturers, from their annual reports. Table year against a nation’s critical infrastructure by external cyber-
2 is not exhaustive. Cisco reports revenues of $49.3 billion attackers is zero. This benefit can have geo-political implica-
USD in 2020. About 70% represents BE-IP products, and 30% tions world-wide, as every nation, rich or poor, can achieve
represents services. The combined global revenue in 2020 is immunity to cyber-attacks against critical infrastructure from
≈ $246.55 billion USD. Assuming that 50% represents layer- external cyber-attackers. (ii) The introduction of SDN, FPGAs
3 BE-IP hardware, then the global capital costs of layer-3 and determinism into layer-3 can save potentially $100s of
hardware were ≈ $123 billion USD, in 2020. billions per year in reduced costs. (iii) It can reduce the costs
Reference [10] explored the cost savings for IP video of cyber-crime to society, estimated at over $10 trillion USD
distribution over a Deterministic Industrial Internet. A similar per year by 2025. (iv) It can support the ”Metaverse”, by
methodology is used next, using recent statistics. significantly increasing IoT capacity.
SUBMITTED TO THE IEEE, PROF. T. SZYMANSKI, AUG. 8, 2023, CONFIDENTIAL 7

R EFERENCES IETF : Internet Engineering Task Force


IP : Internet Protocol (equivalent to BE-IP)
[1] US National Academy of Engineering, ”NAE Grand Challenges for
Engineering: Secure Cyberspace”. http://www.engineeringchallenges.org
ITU : International Telecommunication Union
[2] M. Mosca, ”Cybersecurity in an Era with Quantum Computers: Will MPLS : Multi-Protocol Label Switching
We Be Ready?,” IEEE Security and Privacy, Vol. 16, No. 5, pp. 38-41, NAE : National Academy of Engineering
Sept./Oct. 2018, NAT : Network Address Translation
[3] T.H. Szymanski, ”The ”Cyber Security via Determinism” Paradigm for NIST : National Institute of Standards and Technology
a Quantum Safe Zero Trust Deterministic Internet of Things (IoT) ”, PKC : Public Key Cryptography
IEEE Access, Vol. 10, pp. 43586-45930, April 2022. PQC : Post Quantum Cryptography
[4] A. Singla, B. Chandrasekaran, P.B. Godfrey, and B. Maggs, ”The SDD : Software Defined Deterministic
Internet at the Speed of Light”, Proc. 13th ACM Workshop on Hot SDN : Software Defined Networking
Topics in Networks, Oct. 2014, pp. 1-7.
[5] Cisco, ”Cisco Annual Internet Report (2018-2023)”, https://cisco.com
SKC : Symmetric Key Cryptography
[6] ITU (International Telecommunications Union), “FG-NET2030 - Arch TBPS : Terabits per second
: Network 2030 Architecture Framework”, June 2020, pp. 1-165. USD : US Dollars
[7] N. Finn, P. Thubert, B. Varga, J. Farkas, ”Deterministic Networking VPN : Virtual Private Network
Architecture”, IETF RFC 8655, Oct. 2019. WAN : Wide Area Network
[8] S. Goldberg, ”Why is it Taking So Long to Secure Internet Routing?”, ZTA : Zero Trust Architecture
CACM, Vol. 57, No. 10, pp. 56-63, Oct. 2014.
[9] ETSI (European Telecommunications Standards Institute), Technical
Report, ”Quantum Safe Virtual Private Networks”, ETSI TR 103 617
v1.1.1, Aug. 2018
[10] T.H. Szymanski, ”Supporting Consumer Services in a Deterministic
Industrial Internet Core Network”, IEEE Communications Magazine,
Vol. 54, No. 6, pp. 110-117, June 2016.
[11] Z. Zhang, H. Ning, F. Shi, et al., ”Artificial Intelligence in Cyber
Security: Research Advances, Challenges, and Opportunities”, Artif.
Intell. Rev., 55, pp. 1029–1053, 2022
[12] AL Buczak, E. Guven, ”A Survey of Data Mining and Machine Learning
Methods for Cyber Security Intrusion Detection”, IEEE Comm. Surveys
and Tutorials, Vol. 18, No. 2, pp. 1153-1176, Oct. 2015.
[13] F. Liang, W. G. Hatcher, W. Liao, W. Gao and W. Yu, ”Machine Learning
for Security and the Internet of Things: The Good, the Bad, and the
Ugly,”, IEEE Access, Vol. 7, pp. 158126-158147, 2019.
[14] V. Hu, D. Feraiolo, R. Kuhn, et-al, “Guide to Attribute Based Access
Control (ABAC) Definitions and Considerations”, US NIST Pub. SP
800-162, Jan. 2014 (updated Aug. 2019).
[15] S. Rose, O. Borchert, S. Mitchell, S. Connelly, ”Zero Trust Architec-
ture”, US NIST Publication SP-800-207, Aug. 2020.

Biography
T.H. Szymanski completed a PhD degree at the University of Toronto.
From 1987-1998, he was at Columbia and McGill universities. From
1999-2023, he was at McMaster University. From 2001...2011, he
held the Bell Canada Chair in Data Communications at McMaster.
From 1993-2003, he led the Optical Architectures project within a
10-year national research program funded by the Networks of Centers
of Excellence (NCE) of Canada. Collaborators included Nortel Net-
works (now Ericsson), Newbridge Networks (now Nokia), Lockheed-
Martin/Sanders, and 4 universities. His research group demonstrated
the first photonic FPGA, fabricated through the US ARPA/Lucent
Technologies foundry service. He holds 16 US patents on determinis-
tic internet technologies, covering deterministic switches, scheduling,
wireless networks, the SDN control-plane, and ultra-strong cyber-
security, which have been cited as Prior Art several hundred times in
subsequent US patents. He is listed in the top 2% of researchers in the
field of Networking and Telecommunications, according to Stanford
University.

VI. A PPENDIX : ACRONYMS


AB-ACS: Attribute-Based Access Control System
AES : Advanced Encryption Standard
AI : Artificial Intelligence
BE-IP : Best-Effort Internet Protocol (equivalent to IP)
BE-VPN : Best-Effort Virtual Private Network
D (as in D-switch, D-flow): Deterministic
DetNet (DNET) : the IETF Deterministic Networking group
DoS,DDoS : Denial of Service, Distributed DoS
DVPN : Deterministic Virtual Private Network
ETSI : European Technology Standards Association
FPGA : Field Programmable Gate Array
IDS : Intrusion Detection System

You might also like