Advertisement

Prognostic Views on Software Defined Networks Based Security for Internet of Things

  • Antony TaurshiaEmail author
  • Jaspher W. Kathrine
  • D. Shibin
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1116)

Abstract

Security is very crucial to enhance the privacy and secrecy of the data and applications that are used in routine life. Human life, has been transformed into a much smarter one with the advent of several smart applications based on Internet of Things (IoT). The evolution of the Internet of computer to the Internet of Things was made possible by the involvement of Radio Frequency Identification (RFID), Wireless Sensor Networks (WSN), Lightweight Communication Protocols (LWCP) and cloud services. These major technologies enable IoT to associate with cloud technologies in order to provide advanced real-time applications that could improve our day to day life activities. Software-Defined Networks (SDN) is a technology capable of providing a bird’s eye view of the network. Integrating SDN with IoT has several benefits including security. This paper studies the state of art research efforts in securing the IoT environment with SDN based solutions and highlights the advantages of using SDN for security. Further, a novel SDN based framework which segregates the IoT network based on applications with similar security needs is also proposed to enhance the overall security of the system.

Keywords

Security Internet of Things Protocol Software Defined Networks 

References

  1. 1.
    Gupta, S., Mudgal, N., Mehta, R.: Analytical study of IoT as emerging need of the modern era. In: 2016 International Conference on Computing for Sustainable Global Development, pp. 233–235 (2016)Google Scholar
  2. 2.
    Riahi Sfar, A., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digit. Commun. Networks 4, 118–137 (2018).  https://doi.org/10.1016/j.dcan.2017.04.003CrossRefGoogle Scholar
  3. 3.
    Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4, 1125–1142 (2017).  https://doi.org/10.1109/JIOT.2017.2683200CrossRefGoogle Scholar
  4. 4.
    Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H.: Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Humaniz. Comput. 0, 1–18 (2017).  https://doi.org/10.1007/s12652-017-0494-4CrossRefGoogle Scholar
  5. 5.
    Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. 32, 17–31 (2015).  https://doi.org/10.1016/j.adhoc.2015.01.006CrossRefGoogle Scholar
  6. 6.
    Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018).  https://doi.org/10.1016/j.future.2017.11.022CrossRefGoogle Scholar
  7. 7.
    Rawat, D.B., Reddy, S.R.: Software defined networking architecture, security and energy efficiency: a survey. IEEE Commun. Surv. Tutorials 19, 325–346 (2017).  https://doi.org/10.1109/COMST.2016.2618874CrossRefGoogle Scholar
  8. 8.
    Sadeeq, M.A.M., Zeebaree, S.R.M., Qashi, R., Ahmed, S.H., Jacksi, K.: Internet of Things security: a survey. In: ICOASE 2018 - International Conference on Advanced Science and Engineering, vol. 88, pp. 162–166 (2018).  https://doi.org/10.1109/ICOASE.2018.8548785
  9. 9.
    Atlam, H.F., Alenezi, A., Alharthi, A., Walters, R.J., Wills, G.B.: Integration of cloud computing with Internet of Things: challenges and open issues. In: Proceeding of the 2017 IEEE International Conference on Internet Things, IEEE Green Computing and Communications, IEEE Cyber, Physical and Social Computing, IEEE Smart Data, iThings-GreenCom-CPSCom-SmartData 2017, January 2018, pp. 670–675 (2018).  https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.105
  10. 10.
    Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and Internet of Things: a survey. Futur. Gener. Comput. Syst. 56, 684–700 (2016).  https://doi.org/10.1016/j.future.2015.09.021CrossRefGoogle Scholar
  11. 11.
    Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for Internet of Things applications: challenges and solutions. IEEE Commun. Surv. Tutorials 20, 601–628 (2018).  https://doi.org/10.1109/COMST.2017.2762345CrossRefGoogle Scholar
  12. 12.
    Hu, P., Dhelim, S., Ning, H., Qiu, T.: Survey on fog computing: architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 98, 27–42 (2017).  https://doi.org/10.1016/j.jnca.2017.09.002CrossRefGoogle Scholar
  13. 13.
    Santos, L., Rabadão, C., Gonçalves, R.: Intrusion detection systems in Internet of Things. Found. Sci. Technol. (2016)Google Scholar
  14. 14.
    Chakrabarty, S., Engels, D.W.: A secure IoT architecture for Smart Cities. In: 2016 13th IEEE Annual Consumer Communications & Networking Conference, CCNC 2016, pp. 812–813 (2016).  https://doi.org/10.1109/CCNC.2016.7444889
  15. 15.
    Flauzac, O., Gonzalez, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and improvement of the security. In: Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2015, pp. 688–693 (2015).  https://doi.org/10.1109/WAINA.2015.110
  16. 16.
    Gonzalez, C., Charfadine, S.M., Flauzac, O., Nolot, F.: SDN-based security framework for the IoT in distributed grid. In: 2016 International Multidisciplinary Conference on Computer and Energy Science, Split 2016 (2016).  https://doi.org/10.1109/SpliTech.2016.7555946
  17. 17.
    Irfan, A., Taj, N., Mahmud, S.A.: A novel secure SDN/LTE based architecture for smart grid security. In: Proceedings of the 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 762–769 (2015).  https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.112
  18. 18.
    Aggarwal, C., Srivastava, K.: Securing IOT devices using SDN and edge computing. In: Proceedings of the 2016 2nd International Conference on Next Generation Computing Technologies, NGCT 2016, pp. 877–882 (2017).  https://doi.org/10.1109/NGCT.2016.7877534
  19. 19.
    Kalkan, K., Zeadally, S.: Securing Internet of Things with software defined networking. IEEE Commun. Mag. 56, 186–192 (2018).  https://doi.org/10.1109/MCOM.2017.1700714CrossRefGoogle Scholar
  20. 20.
    Sharma, P.K., Chen, M.Y., Park, J.H.: A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6, 115–124 (2018).  https://doi.org/10.1109/ACCESS.2017.2757955CrossRefGoogle Scholar
  21. 21.
    Chou, L.D., Tseng, C.W., Huang, Y.K., Chen, K.C., Ou, T.F., Yen, C.K.: A security service on-demand architecture in SDN. In: 2016 International Conference on Information and Communication Technology Convergence, ICTC 2016, pp. 287–291 (2016).  https://doi.org/10.1109/ICTC.2016.7763487
  22. 22.
    Jeong, J., Seo, J., Cho, G., Kim, H., Park, J.S.: A framework for security services based on software-defined networking. In: Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2015, pp. 150–153 (2015).  https://doi.org/10.1109/WAINA.2015.102
  23. 23.
    Salman, O., Abdallah, S., Elhajj, I.H., Chehab, A., Kayssi, A.: Identity-based authentication scheme for the Internet of Things. In: Proceedings of the IEEE Symposium on Computers and Communication, August 2016, pp. 1109–1111 (2016).  https://doi.org/10.1109/ISCC.2016.7543884
  24. 24.
    Zarca, A.M., Garcia-carrillo, D., Bernabe, J.B., Ortiz, J.: Managing AAA in NFV/SDN-enabled IoT scenariosGoogle Scholar
  25. 25.
    Chakrabarty, S., Engels, D.W., Thathapudi, S.: Black SDN for the Internet of Things. In: Proceedings of the 2015 IEEE 12th International Conference on Mobile Ad hoc and Sensor Systems, MASS 2015, pp. 190–198 (2015).  https://doi.org/10.1109/MASS.2015.100
  26. 26.
    Chakrabarty, S., John, M., Engels, D.W.: Black routing and node obscuring in IoT. In: 2016 IEEE 3rd World Forum Internet Things, WF-IoT 2016, pp. 323–328 (2017).  https://doi.org/10.1109/WF-IoT.2016.7845477
  27. 27.
    Liu, Y., Kuang, Y., Xiao, Y., Xu, G.: SDN-based data transfer security for Internet of Things. IEEE Internet Things J. 5, 257–268 (2018).  https://doi.org/10.1109/JIOT.2017.2779180CrossRefGoogle Scholar
  28. 28.
    Nobakht, M., Sivaraman, V., Boreli, R.: A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: Proceedings of the 2016 11th International Conference on Availability, Reliability and Security, ARES 2016, pp. 147–156 (2016).  https://doi.org/10.1109/ARES.2016.64
  29. 29.
    Madhawa, S., Balakrishnan, P., Arumugam, U.: Employing invariants for anomaly detection in software defined networking based industrial Internet of Things. J. Intell. Fuzzy Syst. 35, 1267–1279 (2018).  https://doi.org/10.3233/JIFS-169670CrossRefGoogle Scholar
  30. 30.
    Mansour, A., Azab, M., Rizk, M.R.M., Abdelazim, M.: Biologically-inspired SDN-based Intrusion Detection and Prevention Mechanism for heterogeneous IoT networks. In: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018, pp. 1120–1125 (2019).  https://doi.org/10.1109/IEMCON.2018.8614759
  31. 31.
    Bull, P., Austin, R., Popov, E., Sharma, M., Watson, R.: Flow based security for IoT devices using an SDN gateway. In: Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, FiCloud 2016, pp. 157–163 (2016).  https://doi.org/10.1109/FiCloud.2016.30
  32. 32.
    Sándor, H., Genge, B., Sebestyén-Pál, G.: Resilience in the Internet of Things: the Software Defined Networking approach. In: Proceedings of the 2015 IEEE 11th International Conference on Intelligent Computer Communication and Processing, ICCP 2015, pp. 545–552 (2015).  https://doi.org/10.1109/ICCP.2015.7312717
  33. 33.
    Babiceanu, R.F., Seker, R.: Cyber resilience protection for industrial Internet of Things: a software-defined networking approach. Comput. Ind. 104, 47–58 (2019).  https://doi.org/10.1016/j.compind.2018.10.004CrossRefGoogle Scholar
  34. 34.
    Ouaddah, A., Mousannif, H., Abou Elkalam, A., Ait Ouahman, A.: Access control in the Internet of Things: big challenges and new opportunities. Comput. Netw. 112, 237–262 (2017).  https://doi.org/10.1016/j.comnet.2016.11.007CrossRefGoogle Scholar
  35. 35.
    Ustundag, A., Cevikcan, E.: Industry 4.0: managing the digital transformation (2018).  https://doi.org/10.1007/978-3-319-57870-5CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Karunya Institute of Technology and SciencesCoimbatoreIndia

Personalised recommendations