Skip to main content

RF-IoT: A Robust Framework to Optimize Internet of Things (IoT) Security Performance

  • Conference paper
  • First Online:
Software Engineering Methods in Intelligent Algorithms (CSOC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 984))

Included in the following conference series:

Abstract

The current development in data-driven technology has significantly standardized the software defined networking aspects for various cloud enabled streamlined applications. The enormous growth in the statistics associated with the rate of connected devices over computer networks has led to the origins of ides and conceptual notions behind Internet-of-things. The evolution of IoT applications and their potential aspects is witnessed since last 5–6 years, which has made it an active area of research. The diverse and dynamic user requirement instances through on-line services supported with software defined networks (SDN) also leverages the operational cost of IoT. However, the collaboration of different wireless networking components has made IoT vulnerable to different types of security attacks while operated with SDN. The study has introduced a robust security framework namely (Framework for Internet of Things Security) abbreviated as RF-IoT to address security loopholes in IoT networking environment. The secure mechanism in the context of SDN targeted to resist maximum possible attacks in IoT. A numerical simulation environment in created to validate the performance of the RF-IoT in contrast with existing baseline.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  2. McKeown, N.: Software-defined networking. In: IEEE INFOCOM Keynote Talk, vol. 17(2), pp. 30–32, April 2009

    Google Scholar 

  3. Dacier, M.C., Konig, H., Cwalinski, R., Kargl, F., Dietrich, S.: Security challenges and opportunities of software-defined networking. IEEE Secur. Priv. 15(2), 96–100 (2017)

    Article  Google Scholar 

  4. Scott-Hayward, S., O’Callaghan, G., Sezer, S.: SDN security: a survey. In: IEEE SDN for future networks and services

    Google Scholar 

  5. Fayazbakhsh, S.K., Chiang, L., Sekar, V., Yu, M., Mogul, J.C.: Enforcing network-wide policies in the presence of dynamic middle-box actions using FlowTags. In: 11th USENIX Symposium on Networked Systems Design and Implement

    Google Scholar 

  6. Bates, A., Butler, K., Haeberlen, A., Sherr, M., Zhou, W.: Let SDN be your eyes: secure forensics in data center networks. In: The Workshop on Security of Emerging Network Technologies

    Google Scholar 

  7. Guo, L., Pang, J., Walid, A.: Dynamic service function chaining in SDN-enabled networks with middleboxes. In: 2016 IEEE 24th International Conference on Network Protocols

    Google Scholar 

  8. Kulkarni, S.G., et al.: Name enhanced SDN framework for service function chaining of elastic network functions. In: 2016 IEEE Conference on Computer Communications Workshops

    Google Scholar 

  9. Xiong, G., Sun, P., Hu, Y., Lan, J., Li, K.: An optimized deployment mechanism for virtual middleboxes in NFV-and SDN-enabling network. KSII Trans. Internet Inf. Syst. 10, 3474–3497 (2016)

    Google Scholar 

  10. Jamshed, M.A., Kim, D., Moon, Y., Han, D., Park, K.: A case for a stateful middlebox networking stack. ACM SIGCOMM Comput.

    Google Scholar 

  11. He, D., Zeadally, S.: An analysis of RFID authentication schemes for Internet of Things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things J. 2(1), 72–83 (2015)

    Article  Google Scholar 

  12. Ning, H., Liu, H., Yang, L.: Aggregated-proof based hierarchical authentication scheme for the Internet of Things. IEEE Trans. Parallel Distrib. Syst. 1, 1 (2015)

    Google Scholar 

  13. Liu, Y., Kuang, Y., Xiao, Y., Xu, G.: SDN-based data transfer security for Internet of Things. IEEE Internet of Things J. 5(1), 257–268 (2018)

    Article  Google Scholar 

  14. Pinto, S., Gomes, T., Pereira, J., Cabral, J., Tavares, A.: IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput. 21(1), 40–47 (2017)

    Article  Google Scholar 

  15. Raza, S., Seitz, L., Sitenkov, D., Selander, G.: S3K: scalable security with symmetric keys—DTLS key establishment for the Internet of things. IEEE Trans. Autom. Sci. Eng. 13(3), 1270–1280 (2016)

    Article  Google Scholar 

  16. Siegel, J.E., Kumar, S., Sarma, S.E.: The future Internet of Things: secure, efficient, and model-based. IEEE Internet of Things J. 5(4), 2386–2398 (2018)

    Article  Google Scholar 

  17. Shahzad, M., Singh, M.P.: Continuous authentication and authorization for the Internet of Things. IEEE Internet Comput. 21(2), 86–90 (2017)

    Article  Google Scholar 

  18. Sarigiannidis, P., Karapistoli, E., Economides, A.A.: Modeling the Internet of Things under attack: a G-network approach. IEEE Internet of Things J. 4(6), 1964–1977 (2017)

    Article  Google Scholar 

  19. Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106(1), 9–20 (2018)

    Article  Google Scholar 

  20. Wu, H., Wang, W.: A game theory based collaborative security detection method for Internet of Things systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1432–1445 (2018)

    Article  Google Scholar 

  21. Zhang, S., Xu, X., Peng, J., Huang, K., Li, Z.: Physical layer security in massive Internet of Things: delay and security analysis. IET Commun. 13(1), 93–98 (2018)

    Article  Google Scholar 

  22. Zhang, M., Leng, W., Ding, Y., Tang, C.: Tolerating sensitive-leakage with larger plaintext-space and higher leakage-rate in privacy-aware Internet-of-Things. IEEE Access 6, 33859–33870 (2018)

    Article  Google Scholar 

  23. Yang, X., Wang, X., Wu, Y., Qian, L.P., Lu, W., Zhou, H.: Small-cell assisted secure traffic offloading for Narrowband Internet of Thing (NB-IoT) systems. IEEE Internet of Things J. 5(3), 1516–1526 (2018)

    Article  Google Scholar 

  24. Zhang, P., Nagarajan, S.G., Nevat, I.: Secure Location of Things (SLOT): mitigating localization spoofing attacks in the Internet of Things. IEEE Internet of Things J. 4(6), 2199–2206 (2017)

    Article  Google Scholar 

  25. Xu, G., Cao, Y., Ren, Y., Li, X., Feng, Z.: Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things. IEEE Access 5, 21046–21056 (2017)

    Article  Google Scholar 

  26. Ulz, T., Pieber, T., Höller, A., Haas, S., Steger, C.: Secured and easy-to-use NFC-based device configuration for the Internet of Things. IEEE J. Radio Freq. Identif. 1(1), 75–84 (2017)

    Article  Google Scholar 

  27. Wazid, M., Das, A.K., Odelu, V., Kumar, N., Conti, M., Jo, M.: Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet of Things J. 5(1), 269–282 (2018)

    Article  Google Scholar 

  28. Yang, A., Li, Y., Kong, F., Wang, G., Chen, E.: Security control redundancy allocation technology and security keys based on Internet of Things. IEEE Access 6, 50187–50196 (2018)

    Article  Google Scholar 

  29. Roy, S., Chatterjee, S., Das, A.K., Chattopadhyay, S., Kumari, S., Jo, M.: Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J. 5, 2884–2895 (2017)

    Article  Google Scholar 

  30. Salameh, H.B., Almajali, S., Ayyash, M., Elgala, H.: Spectrum assignment in cognitive radio networks for Internet-of-Things delay-sensitive applications under jamming attacks. IEEE Internet of Things J. 5, 1904–1913 (2018)

    Article  Google Scholar 

  31. Manimuthu, A., Ramesh, R.: Privacy and data security for grid-connected home area network using Internet of Things. IET Netw. 7(6), 445–452 (2018)

    Article  Google Scholar 

  32. Mughal, M.A., Luo, X., Ullah, A., Ullah, S., Mahmood, Z.: A lightweight digital signature based security scheme for human-centered Internet of Things. IEEE Access 6, 31630–31643 (2018)

    Article  Google Scholar 

  33. Sajid, A., Abbas, H., Saleem, K.: Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4, 1375–1384 (2016)

    Article  Google Scholar 

  34. Xu, Q., Ren, P., Song, H., Du, Q.: Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 4, 2840–2853 (2016)

    Article  Google Scholar 

  35. Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 6, 24694–24705 (2018)

    Article  Google Scholar 

  36. Anil, G.N.: FAN: framework for authentication of nodes in mobile adhoc environment of Internet-of-Things. In: Computer Science On-line Conference, pp. 56–65. Springer, Cham (2018)

    Google Scholar 

  37. Anil, G.N., Venugopal Reddy, A.: Strategical modelling with virtual competition for analyzing behavior of malicious node in mobile Adhoc network to prevent decamping. Int. J. Comput. Sci. Issues (IJCSI) 8(6), 173 (2011)

    Google Scholar 

  38. Muneshwara, M.S., Swetha, M.S., Thungamani, M., Anil, G.N.: Digital genomics to build a smart franchise in real time applications. In: 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1–4. IEEE (2017)

    Google Scholar 

  39. Swetha, M.S., Muneshwara, M.S., Anil, G.N.: Mobile cloud computing (MCC) enables storage smartness for every smart mobile agent. Int. J. Innov. Res. Comput. Commun. Eng. 3(11) (2015)

    Google Scholar 

  40. Hegde, S., Sonal, T.G., Swetha, M.S., Muneshwara, M.S., Anil, G.N.: Efficient way of managing the data for cloud storage applications depending on the internet speed in cloud environment. IJEIR 3(1), 8–11 (2014)

    Google Scholar 

  41. Rath, P.K., Anil, G.N.: Proposed challenges and areas of concern in operating system research and development (2012). arXiv preprint: arXiv:1205.6423

  42. Anil, G.N., Jindal, P., Rafik, J., Barwade, S.S.: Self organized public key certificate in ad hoc networks. Semantic Scholar. Accessed 11 Jan 2019

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. N. Anil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Anil, G.N. (2019). RF-IoT: A Robust Framework to Optimize Internet of Things (IoT) Security Performance. In: Silhavy, R. (eds) Software Engineering Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-030-19807-7_21

Download citation

Publish with us

Policies and ethics