IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking

  • Mehdi Gheisari
  • Guojun WangEmail author
  • Shuhong Chen
  • Hamidreza Ghorbani
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11337)


Internet of Things (IoT) era appeared to connect all the digital and non-digital devices around the globe through the Internet. Based on predictions, billions of devices will be connected with each other by 2050 with the aim of providing high-level and humanized services. One application of IoT is a smart city that means IT-enabled cities running by themselves without human interventions. These large number of devices, especially in a smart city environment, may sense sensitive and personal data which makes the system vulnerable. We have to protect private information so that unwanted parties would not be able to find original data, which is a part of privacy-preserving. Meanwhile, a new networking paradigm evolved called Software Defined Networking (SDN) that aimed to separate the Control Plane and the Data Plane of the network results in much more flexibility to manage the network. Most of the existing works are deficient in flexibility or very tedious. In this paper, we facilitated IoT-based smart city with SDN paradigm to leverage the benefits of SDN. Then, based on the environment, we propose IoT-SDN Privacy-Preserving, IoT-SDNPP, to keep private data safe. We have done extensive experiments, and the experimental results have demonstrated the effectiveness of our approach.


Privacy-preserving Software Defined Networking Smart city Privacy rules Internet of Things 



This work is supported in part by the National Natural Science Foundation of China under Grants 61632009 and 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006, and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01.


  1. 1.
    Dataprotection. Technical report, DLA piper (2017).
  2. 2.
    Alinani, K., Alinani, A., Narejo, D.H., Wang, G.: Aggregating author profiles from multiple publisher networks to build a list of potential collaborators. IEEE Access 6, 20298–20308 (2018)CrossRefGoogle Scholar
  3. 3.
    Arif, M., Wang, G., Balas, V.E.: Secure vanets: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inform. Control 27(2), 235–246 (2018)Google Scholar
  4. 4.
    Broadhurst, R.: Developments in the global law enforcement of cyber-crime. Polic. Int. J. Police Strat. Manag. 29(3), 408–433 (2006)CrossRefGoogle Scholar
  5. 5.
    Bull, P., Austin, R., Popov, E., Sharma, M., Watson, R.: Flow based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 157–163. IEEE (2016)Google Scholar
  6. 6.
    Chase, J.: The evolution of the internet of things. Texas Instruments, pp. 1–5 (2013)Google Scholar
  7. 7.
    Dai, Y., Wang, G., Li, K.C.: Conceptual alignment deep neural networks. J. Intell. Fuzzy Syst. 34(3), 1631–1642 (2018)CrossRefGoogle Scholar
  8. 8.
    Flauzac, O., Gonzlez, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and improvement of the security. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp. 688–693 (2015)Google Scholar
  9. 9.
    GhadakSaz, E., Amini, M.R., Porkar, P., Gheisari, M.: Design, implement and compare two proposed sensor datas storages named SemHD and SSW. From Editor in Chief, p. 78 (2012)Google Scholar
  10. 10.
    Gheisari, M.: The effectiveness of schema therapy integrated with neurological rehabilitation on reducing early maladaptive schemas and symptoms of depression in patients with chronic depressive disorder. Health Sci. J. 10(4) (2016)Google Scholar
  11. 11.
    Gheisari, M., Baloochi, H., Gharghi, M., Khajehyousefi, M.: An evaluation of two proposed systems of sensor datas storage in total data parameter. Int. Geoinformatics Res. Dev. J. (2012)Google Scholar
  12. 12.
    Higginbotham, S.: Ericsson CEO predicts 50 billion internet connected devices by 2020. Ericsson (2011).
  13. 13.
    Hunt, T., Song, C., Shokri, R., Shmatikov, V., Witchel, E.: Chiron: privacy- preserving machine learning as a service. arXiv preprint arXiv:1803.05961 (2018)
  14. 14.
    Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: DASC 2009, pp. 711–716. IEEE (2009)Google Scholar
  15. 15.
    Karim, A., Shah, S.A.A., Salleh, R.B., Arif, M., Noor, R.M., Shamshirband, S.: Mobile botnet attacks-an emerging threat: classification, review and open issues. TIIS 9(4), 1471–1492 (2015)Google Scholar
  16. 16.
    Liu, Q., Guo, Y., Wu, J., Wang, G.: Effective query grouping strategy in clouds. J. Comput. Sci. Technol. 32(6), 1231–1249 (2017)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Low, Y., Gonzalez, J.E., Kyrola, A., Bickson, D., Guestrin, C.E., Hellerstein, J.: GraphLab: a new framework for parallel machine learning. arXiv preprint arXiv:1408.2041 (2014)
  18. 18.
    Gheisari, M., Esnaashari, M.: Data storages in wireless sensor networks to deal with disaster management. In: Emergency and Disaster Management: Concepts, Methodologies, Tools, and Applications, pp. 655–682. IGI Global (2019)Google Scholar
  19. 19.
    Mekky, H., Hao, F., Mukherjee, S., Zhang, Z.L., Lakshman, T.: Application-aware data plane processing in SDN. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, pp. 13–18. ACM (2014)Google Scholar
  20. 20.
    Nobakht, M., Sivaraman, V., Boreli, R.: A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: ARES, pp. 147–156, August 2016Google Scholar
  21. 21.
    Porkar, P., Gheisari, M., Bazyari, G.H., Kaviyanjahromi, Z.: A comparison with two sensor data storagesin energy. In: ICCCI. ASME Press (2011)Google Scholar
  22. 22.
    Raza, M., Chowdhury, S., Robertson, W.: SDN based emulation of an academic networking testbed. In: CCECE, pp. 1–6. IEEE (2016)Google Scholar
  23. 23.
    Rezaeiye, P.P., Gheisari, M.: Performance analysis of two sensor data storages. In: Proceedings of 2nd International Conference on Circuits, Systems, Communications & Computers (CSCC), pp. 133–136 (2011)Google Scholar
  24. 24.
    Rezaeiye, P.P., Rezaeiye, P.P., Karbalayi, E., Gheisari, M.: Statistical method used for doing better corneal junction operation. In: Material and Manufacturing Technology III. Advanced Materials Research, vol. 548, pp. 762–766. Trans Tech Publications, September 2012Google Scholar
  25. 25.
    Rezaeiye, P.P., et al.: Agent programming with object oriented (c ++). In: ICECCT, pp. 1–10. IEEE (2017)Google Scholar
  26. 26.
    Salman, O., Abdallah, S., Elhajj, I.H., Chehab, A., Kayssi, A.: Identity-based authentication scheme for the internet of things. In: ISCC, pp. 1109–1111. IEEE (2016)Google Scholar
  27. 27.
    Shanahan, D., et al.: Variation in experiences of nature across gradients of tree cover in compact and sprawling cities. Landsc. Urban Plann. 157, 231–238 (2017)CrossRefGoogle Scholar
  28. 28.
    Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRefGoogle Scholar
  29. 29.
    Wang, F., Jiang, W., Li, X., Wang, G.: Maximizing positive influence spread in online social networks via fluid dynamics. Future Gener. Comput. Syst. 86, 1491–1502 (2018)CrossRefGoogle Scholar
  30. 30.
    Wang, T., Li, Y., Wang, G., Cao, J., Bhuiyan, M.Z.A., Jia, W.: Sustainable and efficient data collection from WSNs to cloud. IEEE Trans. Sustain. Comput. 1 (2018)Google Scholar
  31. 31.
    Zhang, Q., Liu, Q., Wang, G.: PRMS: a personalized mobile search over encrypted outsourced data. IEEE Access 6, 31541–31552 (2018)CrossRefGoogle Scholar
  32. 32.
    Zhang, S., Wang, G., Liu, Q.: A dual privacy preserving scheme in continuous location-based services. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 402–408, August 2017Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Mehdi Gheisari
    • 1
  • Guojun Wang
    • 1
    Email author
  • Shuhong Chen
    • 1
  • Hamidreza Ghorbani
    • 2
  1. 1.School of Computer Science and TechnologyGuangzhou UniversityGuangzhouChina
  2. 2.Department of Electrical Engineering and Information TechnologyAzad University of Tehran-Electronic BranchTehranIran

Personalised recommendations