Advertisement

A Survey on SDN Based Security in Internet of Things

  • Renuga KanagaveluEmail author
  • Khin Mi Mi Aung
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 887)

Abstract

Internet of Things (IoT) is an emerging technology where tens of billions of devices that include everything from small wearable fitness bands, medical devices, smart devices to factory automobiles can be connected to the Internet which makes the life easy without or with little human intervention. Though IoT has proven to be more transformative, as its market size increases, it is really a big challenge to secure such a large number of devices that are connected by a complex heterogeneous network with a variety of access protocols. Software defined networking (SDN) decouples the control plane from the data plane, enabling fast reaction to security threats and security policy enforcement. IoT security can be achieved by the integration of SDN with IoT. SDN is an intelligent network paradigm which can open up ways to secure IoT and different access control mechanisms. This survey paper analyzes SDN based IoT security mechanisms to secure communications in IoT and present open research issues.

Keywords

Internet of Things Software defined networking Security Access control 

References

  1. 1.
    Gartner Says 4.9 Billion Connected “Things” Will Be in Use (2015). http://www.gartner.com/newsroom/id/2905717
  2. 2.
    Bremner, D.: Analysing the IoT ecosystem: the barriers to commercial traction. In: Embedded World Exhibition & Conference 2016, Nuremberg, Germany, pp. 23–24 (2016)Google Scholar
  3. 3.
    Tarkoma, S.: The Internet of Things Program: the finnish perspective (2013)CrossRefGoogle Scholar
  4. 4.
    Hewlett-Packard, Internet of things research study 2015 report. http://www8.hp.com/h20195/V2/GetPDF.aspx/4AA5-4759ENW.pdf
  5. 5.
    Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. Comput. Soc. 44, 58 (2011). https://www.nics.uma.es/sites/default/files/papers/1633.pdfCrossRefGoogle Scholar
  6. 6.
    Escribano, B.: Privacy and security in the Internet of Things: challenge or opportunity. http://www.olswang.com/media/48315339/privacy_and_security_in_the_iot.pdf
  7. 7.
    Wu, C.: A preliminary investigation on the security architecture of the Internet of Things. Bull. Chin. Acad. Sci. 25(4), 411–419 (2010)Google Scholar
  8. 8.
    Yu, T., Sekar, V., Seshan, S., Agarwal, Y., Xu, C.: Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the Internet-of-Things. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV (2013)Google Scholar
  9. 9.
    Openflow.org. Pantou. Pantou: OpenFlow 1.0 for OpenWRT. http://www.openflow.org/wk/index.php/
  10. 10.
    Stout, W.M.S., Urias, V.E.: Challenges to securing the Internet of Things. In: Proceedings of IEEE International Carnahan Conference on Security Technology (ICCST) (2016)Google Scholar
  11. 11.
    Kloti, R., Kotronis, V., Smith, P.: OpenFlow: a security analysis. In: Proceedings of the 8th Workshop on Secure Network Protocols (NPSec 2013) (2013)Google Scholar
  12. 12.
    Conner, M.: Sensors empower the “Internet of Things”, pp. 32–38 (2010). ISSN 0012-7515Google Scholar
  13. 13.
    Xiaohui, X.: Study on security problems and key technologies of the Internet of Things. In: International Conference on Computational and Information Sciences (2013)Google Scholar
  14. 14.
    Yan, L., Zhang, Y., Yang, L.T.: The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems. Auerbach Publications, Boston (2008)Google Scholar
  15. 15.
    Jose, C.: Internet of Things (IoT) - security challenges and possible security approaches (2016)Google Scholar
  16. 16.
    Amine, A., Mohamed, O.A., Benatellah, B.: Network Security Technologies: Design and Applications. IGI Global, Hershey (2014)Google Scholar
  17. 17.
    Weber, M., Boban, M.: Security challenges of the Internet of Things. In: Proceedings of MIPRO (2016)Google Scholar
  18. 18.
    McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev. 38, 69–74 (2008)CrossRefGoogle Scholar
  19. 19.
    Tavakoli, A., Casado, M., Koponen, T., Shenker, S.: Applying NOX to data center. In: Proceedings of 8th ACM Workshop on Hot Topics in Networks (2009)Google Scholar
  20. 20.
    The Pox Controller. https://github.com/noxrepo/pox
  21. 21.
    The Ryu Controller. https://osrg.github.io/ryu/
  22. 22.
    Shin, S., Xu, L., Hong, S., Gu, G.: Enhancing network security through software defined networking (SDN). In: ICCCN (2016)Google Scholar
  23. 23.
    Chakrabarty, S., Engels, D.W., Thathapudi, S.: Black SDN for the Internet of Things. In: Proceedings of the IEEE 12th International Conference on Mobile Ad Hoc Sensor System (MASS), Dallas, TX, USA, October 2015, pp. 190–198 (2015)Google Scholar
  24. 24.
    Choi, S., Kwak, J.: Enhanced SDIoT security framework models. Int. J. Distrib. Sens. Netw. 2016, 1–12 (2016)Google Scholar
  25. 25.
    Qin, Z., Denker, G., Giannelli, C., Bellavista, P., Venkatasubramanian, N.: A software defined networking architecture for the Internet-of-Things. In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS) (2014)Google Scholar
  26. 26.
    Li, Y., Su, X., Riekki, J., Kanter, T., Rahmani, R.: A SDN-based architecture for horizontal Internet of Things services. In: Proceedings of IEEE International Conference on Communications (ICC) (2016)Google Scholar
  27. 27.
    Bull, P., Austin, R., Popov, E., Sharma, M., Watson, R.: Flow based security for IoT devices using an SDN gateway. In: Proceedings of the IEEE 4th International Conference on Future Internet Things Cloud (FiCloud), Vienna, Austria, August 2016, pp. 157–163 (2016)Google Scholar
  28. 28.
    Flauzac, O., González, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and improvement of the security. In: Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Gwangiu, South Korea, March 2015, pp. 688–693 (2015)Google Scholar
  29. 29.
    Sándor, H., Genge, B., Sebestyén-Pál, G.: Resilience in the Internet of Things: the software defined networking approach. In: Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj-Napoca, Romania, September 2015, pp. 545–552 (2015)Google Scholar
  30. 30.
    Ahmed, M.E., Kim, H.: DDoS attack mitigation in Internet of Things using software defined networking. In: 2017 IEEE Third International Conference on Big Data Computing Service and Applications (BigDataService) (2017)Google Scholar
  31. 31.
    Jararweh, Y., Mahmoud, A., Darabseh, A., Benkhelifa, E., Vouk, M., Rindos, A.: SDIoT: a software defined based Internet of things framework. J. Ambient Intell. Humaniz. Comput. 6(4), 453–461 (2015)CrossRefGoogle Scholar
  32. 32.
    Li, J., Altman, E., Touati, C.: A general SDN-based IoT framework with NVF implementation. ZTE Commun. 13, 42–45 (2015). ZTE CorporationGoogle Scholar
  33. 33.
    Li, C., Qin, Z., Novak, E., Li, Q.: Securing SDN infrastructure of IoT-fog networks from MitM attacks. IEEE Internet Things J. 4, 1156–1164 (2017)CrossRefGoogle Scholar
  34. 34.
    Open Network Operating System Project. http://onosproject.org/
  35. 35.
    Curtis, A.R., Mogul, J.C., Tourrilhes, J., Yalagandula, P., Sharma, P., Banerjee, S.: Devoflow: scaling flow management for high-performance networks. In: Proceedings of the ACM SIGCOMM 2011 Conference (2011)Google Scholar
  36. 36.
    Al-Fares, M., Radhakrishnan, S., Raghavan, B., Huang, N., Vahdat, A.: Hedera: dynamic flow scheduling for data center networks. In: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI 2010 (2010)Google Scholar
  37. 37.
    Bizanis, N., Kuipers, F.A.: SDN and virtualization solutions for the Internet of Things: a survey. IEEE Access 4, 5591–5606 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Data Center Technology DivisionA*STAR Data Storage InstituteSingaporeSingapore

Personalised recommendations