![]() |
Zero Trust IoT library
|
NS-3 simulation demonstrating Zero Trust principles using secure communication and policy enforcement. More...
#include "ns3/core-module.h"
#include "ns3/network-module.h"
#include "ns3/internet-module.h"
#include "ns3/point-to-point-module.h"
#include "ns3/applications-module.h"
#include "ns3/zt-certificate.h"
#include "ns3/zt-policy-engine.h"
#include "ns3/zt-encryption-utils.h"
#include "ns3/zt-logger.h"
#include "ns3/zt-tls-handshake.h"
Go to the source code of this file.
Functions | |
void | ReceiveAtGateway (Ptr< Socket > socket) |
Receives an encrypted packet at the gateway and performs decryption and validation. | |
void | SendFromSensor (Ptr< Socket > socket, Address gatewayAddr, uint32_t nodeId) |
Simulates a sensor device sending an encrypted payload to the gateway after policy and handshake validation. | |
void | AttackerSpoof (Ptr< Socket > socket, Address gatewayAddr) |
Simulates an attacker sending a spoofed plaintext message to the gateway without encryption. | |
int | main (int argc, char *argv[]) |
Main entry point for the simulation. Sets up network topology, installs security components, and executes events. | |
Variables | |
Ptr< ZtTlsHandshake > | handshake |
TLS handshake manager for establishing secure sessions. | |
Ptr< ZtPolicyEngine > | policyEngine |
Policy engine for authorization based on identity and roles. | |
CertificateAuthority | ca |
Certificate authority for signing identity certificates. | |
uint16_t | port = 9000 |
UDP communication port used by gateway. | |
NS-3 simulation demonstrating Zero Trust principles using secure communication and policy enforcement.
Definition in file mitm-mitigation.cc.
void AttackerSpoof | ( | Ptr< Socket > | socket, |
Address | gatewayAddr | ||
) |
Simulates an attacker sending a spoofed plaintext message to the gateway without encryption.
socket | The attacker's socket used to send the spoofed message. |
gatewayAddr | The address of the gateway. |
Definition at line 107 of file mitm-mitigation.cc.
int main | ( | int | argc, |
char * | argv[] | ||
) |
Main entry point for the simulation. Sets up network topology, installs security components, and executes events.
Topology: Sensor <-> Gateway <-> Attacker
Demonstrates: Certificate signing, Zero Trust policy enforcement, secure TLS handshake, encrypted communication, and spoofing attempt.
Definition at line 122 of file mitm-mitigation.cc.
void ReceiveAtGateway | ( | Ptr< Socket > | socket | ) |
Receives an encrypted packet at the gateway and performs decryption and validation.
socket | The receiving socket on the gateway node. |
Definition at line 37 of file mitm-mitigation.cc.
void SendFromSensor | ( | Ptr< Socket > | socket, |
Address | gatewayAddr, | ||
uint32_t | nodeId | ||
) |
Simulates a sensor device sending an encrypted payload to the gateway after policy and handshake validation.
socket | The socket used to send the encrypted message. |
gatewayAddr | The address of the gateway node. |
nodeId | The ID of the sensor node. |
Definition at line 74 of file mitm-mitigation.cc.
Certificate authority for signing identity certificates.
Definition at line 28 of file mitm-mitigation.cc.
Ptr<ZtTlsHandshake> handshake |
TLS handshake manager for establishing secure sessions.
Definition at line 22 of file mitm-mitigation.cc.
Ptr<ZtPolicyEngine> policyEngine |
Policy engine for authorization based on identity and roles.
Definition at line 25 of file mitm-mitigation.cc.
uint16_t port = 9000 |
UDP communication port used by gateway.
Definition at line 31 of file mitm-mitigation.cc.