Security Improvement Mechanisms in Software-Defined Internet of Things

Seyedakbar Mostafavi - Yazd University, Yazd, Iran
Hussaindad Saadat - Yazd University, Yazd, Iran
Razieh Allamehzadeh - Yazd University, Yazd, Iran


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.4.2.363

Abstract


The IoT contains millions of heterogeneous smart objects that are connected together through the Internet platform. These heterogeneous smart objects deal with different protocols, technologies and resources, therefore each of them requires diverse security services in heterogeneous environments. Therefore, providing security services in heterogeneous environments is a daunting task for network providers that cannot be guaranteed through the traditional network architecture. Wide distribution and openness of IoT smart objects makes them very vulnerable to attacks and it can be easily targeted by cyber-attacks. Software-Defined Networking (SDN) is a new paradigm that separates the control plane from data plane t a global network view by centralized controller. Integrating the software-defined network with the Internet of Things can provide better access control and security mechanisms. Software-defined networking provides better control and management possibilities to manage and secure Internet of Things in a good manner. In this paper, we discuss about IoT architecture, security challenges in IoT, SDN architecture, security challenges in each layers of the SDN and software-defined IoT. In addition, we provide solutions to security problems in IoT through software-defined networking approach.

Keywords


Software-defined networking; Internet-of-Things; security mechanisms; network architecture

Full Text:

PDF

References


A. C. Sarma and J. Girão, “Identities in the future internet of things,” Wirel. Pers. Commun., vol. 49, no. 3, pp. 353–363, 2009.

S. Rizvi, A. Kurtz, J. Pfeffer, and M. Rizvi, “Securing the Internet of Things (IoT): A Security Taxonomy for IoT,” Proc. - 17th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. 12th IEEE Int. Conf. Big Data Sci. Eng. Trust. 2018, no. August, pp. 163–168, 2018.

M. Liyanage, A. Gurtov, and M. Ylianttila, “SoftwareDefined Mobile Networks (SDMN): Beyond LTE Network Architecture,” Softw. Defin. Mob. Networks Concepts Challenges, pp. 1–390, 2015.

A. D. Ferguson, A. Guha, C. Liang, R. Fonseca, and S. Krishnamurthi, “Participatory networking,” ACM SIGCOMM Comput. Commun. Rev., vol. 43, no. 4, pp. 327–338, 2013.

H. Elhammouti, E. Sabir, M. Benjillali, L. Echabbi, and H. Tembine, “Self-Organized Connected Objects: Rethinking QoS Provisioning for IoT Services,” IEEE Commun. Mag., vol. 55, no. 9, pp. 41–47, 2017.

A. Kingatua, “Top 10 IoT Applications,” Electronics, Information & Communications Technology. [Online]. Available: https://electronicsandict.com/top-10-iot-applications/.

L. Da Xu, W. He, and S. Li, “Internet of things in industries: A survey,” IEEE Trans. Ind. Informatics, vol. 10, no. 4, pp. 2233–2243, 2014.

I. Yaqoob et al., “Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges,” IEEE Wirel. Commun., vol. 24, no. 3, pp. 10–16, 2017.

A. Haroon, M. Ali, Y. Asim, W. Naeem, M. Kamran, and Q. Javaid, “Constraints in the IoT: The World in 2020 and Beyond,” Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 11, 2016.

V. Schmidt, “Impact Analysis of the Internet of Things on the Value Chain in Manufacturing Industries,” no. July, 2016.

M. M. J. Krishnamurthy, “Constrained Device,” Science Direct, 2016. [Online]. Available: https://www.sciencedirect.com/topics/computer-science/constrained-device.

B. Cheng, M. Wang, S. Zhao, Z. Zhai, D. Zhu, and J. Chen, “Situation-Aware Dynamic Service Coordination in an IoT Environment,” IEEE/ACM Trans. Netw., vol. 25, no. 4, pp. 2082–2095, 2017.

B. R. Srinivasan, “Internet of Things in Smart Cities,” 2014.

M. Gloukhovtsev, “Iot Security : Challenges , Solutions & Future Prospects,” 2018.

S. Mostafavi and M.A. Dawlatnazar and F. Paydar, "Edge Computing for IoT: Challenges and Solutions", Journal of Communications Technology, Electronics and Computer Science, Vol. 25, pp. 5-8, 2019.

F. Chahlaoui, M. Raiss El-Fenni, and H. Dahmouni, “Performance analysis of load balancing mechanisms in SDN networks,” ACM Int. Conf. Proceeding Ser., vol. Part F1481, 2019.

B. Darabinejad, “An Introduction to Software-Defined Networking,” Int. J. Intell. Inf. Syst., vol. 3, no. 6, p. 71, 2014.

O. Akpovi A., E. Seun, A. A. O., and O. F. Y., “Introduction to Software Defined Networks (SDN),” Int. J. Appl. Inf. Syst., vol. 11, no. 7, pp. 10–14, 2016.

W. Braun and M. Menth, “Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices,” Futur. Internet, vol. 6, no. 2, pp. 302–336, 2014.

D. L. Love, “Wireless Evolution, Software Defined Networks and Network Function Virtualization: Enablers of IoT,” Stanford University. [Online]. Available: https://mse238blog.stanford.edu/2017/07/dllove/software-defined-networks-and-network-function-virtualization-precursors-to-5g/.

ONF, “SDN Architecture (TR-521),” ONF White Pap., no. 1.1, 2016.

ONF, “OpenFlow Switch Specification 1.4.0,” Current, vol. 0, pp. 1–3205, 2013.

O. Oladunjoye, “SOftware Defined Networking– The Emerging Paradigm To Computer Networking,” p. 38, 2017.

K. Raghunath and P. Krishnan, “Towards A Secure SDN Architecture,” 2018 9th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT 2018, no. July 2018, 2018.

H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: A review,” Proc. - 2012 Int. Conf. Comput. Sci. Electron. Eng. ICCSEE 2012, vol. 3, pp. 648–651, 2012.

X. F. Wang, “Research on security issues of the internet of things,” Adv. Mater. Res., vol. 989–994, no. 6, pp. 4261–4264, 2014.

Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wirel. Networks, vol. 20, no. 8, pp. 2481–2501, 2014.

K. Zhao and L. Ge, “A survey on the internet of things security,” Proc. - 9th Int. Conf. Comput. Intell. Secur. CIS 2013, pp. 663–667, 2013.

S. Kraijak and P. Tuwanut, “A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends,” Int. Conf. Commun. Technol. Proceedings, ICCT, vol. 2016-Febru, pp. 26–31, 2016.

G. S. Matharu, P. Upadhyay, and L. Chaudhary, “The Internet of Things: Challenges & security issues,” Proc. - 2014 Int. Conf. Emerg. Technol. ICET 2014, pp. 54–59, 2014.

O. Said and M. Masud, “Towards internet of things: Survey and future vision,” Int. J. Comput. Networks, vol. 5, no. 1, pp. 1–17, 2013.

A. W. Atamli and A. Martin, “Threat-based security analysis for the internet of things,” Proc. - 2014 Int. Work. Secur. Internet Things, SIoT 2014, pp. 35–43, 2014.

J. Granjal, E. Monteiro, and J. Sa Silva, “Security for the internet of things: A survey of existing protocols and open research issues,” IEEE Commun. Surv. Tutorials, vol. 17, no. 3, pp. 1294–1312, 2015.

D. Clark et al., “New Arch : Future Generation Internet Architecture,” Security, vol. 0553, no. August, 2004.

A. S. Mustafa, D. Mkpanam, and A. Abdullahi, “Security in Software Defined Networks (SDN): Challenges and Research Opportunities for Nigeria.,” Int. J. Comput. Appl. Technol. Res., vol. 7, no. 8, pp. 297–300, 2018.

P. Joshi, “Software-Defined-Networks-Security-An-Analysis-of-Issues-and-Solutions.docx,” Int. J. Sci. Eng. Res., vol. 6, no. 5, pp. 1270–1275, 2015.

D. Kreutz, F. M. V. Ramos, and P. Verissimo, “Towards secure and dependable software-defined networks,” HotSDN 2013 - Proc. 2013 ACM SIGCOMM Work. Hot Top. Softw. Defin. Netw., pp. 55–60, 2013.

S. Shin, P. Porras, V. Yegneswaran, and G. Gu, “A Framework For Integrating Security Services into Software-Defined Networks,” Proc. 2013, vol. 1, no. 1, pp. 11–12, 2013.

S. Mostafavi and M. Dehghan, "Decentralized Adaptive Helper Selection in Multi-channel P2P Streaming Systems," IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), Madrid, 2014, pp. 1-7

S. Mostafavi and V. Hakami, "A new rank-order clustering algorithm for prolonging the lifetime of wireless sensor networks", International Journal of Communication Systems, 2019.

S. Mostafavi and W. Shafik, "Fog Computing Architectures, Security and Privacy", Journal of Communications Technology, Electronics and Computer Science, Vol. 26, pp. 1-9, 2019.

X. Wen, Y. Chen, C. Hu, C. Shi, and Y. Wang, “Towards a secure controller platform for OpenFlow applications,” HotSDN 2013 - Proc. 2013 ACM SIGCOMM Work. Hot Top. Softw. Defin. Netw., pp. 171–172, 2013.

M. W. and D. Z. S. Hartman, “Software driven networks problem statement,” Network Working Group Internet-Draft. [Online]. Available: https://tools.ietf.org/html/drafthartman-%0Asdnsec-requirements-00.

V. G. H. Xie, T. Tsou, D. Lopez, H. Yin, “Use cases for ALTO with software defined networks,” Working Draft, IETF Secretariat, Internet-Draft, 2012. [Online]. Available: https://tools.ietf.org/%0Ahtml/draft-xie-alto-sdn-use-cases-01.

S. Mostafavi, M. Dehghan, "Game-theoretic Bandwidth Procurement Mechanisms in Live P2P Streaming Systems", Multimedia Tools and Applications, vol. 75, no. 14, pp. 8545-8568, 2016.

S. Mostafavi, M. Dehghan, "Game-theoretic Auction Design for Bandwidth Sharing in Helper-assisted P2P Streaming", International Journal of Communication Systems, vol. 29, no. 6, pp. 1057-1072, 2016.

M. Sanaei and S. Mostafavi, "Multimedia Delivery Techniques over Software-Defined Networks: A Survey," 5th International Conference on Web Research (ICWR), 2019, pp. 105-110.

S. Mostafavi, W. Shafik, “Fog Computing Architectures, Privacy and Security Solutions”, Journal of Communications Technology, Electronics and Computer Science, Vol. 24, pp. 1-14.

J. Naous, D. Erickson, G. A. Covington, G. Appenzeller, and N. McKeown, “Implementing an OpenFlow switch on the NetFPGA platform,” Proc. 4th ACM/IEEE Symp. Archit. Netw. Commun. Syst. ANCS ’08, pp. 1–9, 2008.

M. Jarschel, S. Oechsner, D. Schlosser, R. Pries, S. Goll, and P. Tran-Gia, “Modeling and performance evaluation of an OpenFlow architecture,” Proc. 2011 23rd Int. Teletraffic Congr. ITC 2011, pp. 1–7, 2011.

M. Douglass, “Endometrial tumors in abdominal scars,” J. Am. Med. Assoc., vol. 90, no. 23, pp. 1853–1856, 1928.

S. Shin and G. Gu, “Attacking software-defined networks,” p. 165, 2013.

P. Fonseca, R. Bennesby, E. Mota, and A. Passito, “A replication component for resilient OpenFlow-based networking,” Proc. 2012 IEEE Netw. Oper. Manag. Symp. NOMS 2012, pp. 933–939, 2012.

H. Hu, W. Han, G. J. Ahn, and Z. Zhao, “FLOWGUARD: Building robust firewalls for software-defined networks,” HotSDN 2014 - Proc. ACM SIGCOMM 2014 Work. Hot Top. Softw. Defin. Netw., pp. 97–102, 2014.

S. Scott-Hayward, G. O’Callaghan, and S. Sezer, “SDN security: A survey,” SDN4FNS 2013 - 2013 Work. Softw. Defin. Networks Futur. Networks Serv., 2013.

S. Son, S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “Model checking invariant security properties in OpenFlow,” IEEE Int. Conf. Commun., pp. 1974–1979, 2013.

S. Mostafavi, M. Dehghan, "A Stochastic Approximation Resource Allocation Approach for HD Live Streaming", Telecommunication Systems, vol. 64, no. 1, pp.

S. Mostafavi, M. Dehghan, "Optimal visual sensor placement for coverage based on target location profile", Ad Hoc Networks, vol. 9, no. 4, pp. 528-541, 2011.

B. A. A. Nunes, M. Mendonca, X. N. Nguyen, K. Obraczka, and T. Turletti, “A survey of software-defined networking: Past, present, and future of programmable networks,” IEEE Commun. Surv. Tutorials, vol. 16, no. 3, pp. 1617–1634, 2014.

R. Skowyra, S. Bahargam, and A. Bestavros, “Software-Defined IDS for securing embedded mobile devices,” 2013 IEEE High Perform. Extrem. Comput. Conf. HPEC 2013, 2013.

N. McKeown et al., “OpenFlow: enabling innovation in campus networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, p. 69, 2008.

S. Mostafavi, V. Hakami, "A new rank-order clustering algorithm for prolonging the lifetime of wireless sensor networks", International Journal of Communication Systems, vol. 33, https://doi.org/10.1002/dac.4313, 2020.

S. Mostafavi, V. Hakami, "A stochastic approximation approach for foresighted task scheduling in cloud computing", Wireless Personal Communications, https://doi.org/10.1007/s11277-020-07398-9, 2020.

S. Mostafavi, V. Hakami, F. Paydar, "Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study", Journal of Computer and Knowledge Engineering, 2020.

S. Mostafavi, V. Hakami, F. Paydar, "A QoS-Assured and Mobility-Aware Routing Protocol for MANETS", JOIV: International Journal on Informatics Visualization, vol. 4, no. 1, pp. 1-9, 2020.




Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610  (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
Published by Department of Information Technology - Politeknik Negeri Padang
W : http://joiv.org
E : joiv@pnp.ac.id, hidra@pnp.ac.id, rahmat@pnp.ac.id

View JOIV Stats

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.