Abstract
The current development in data-driven technology has significantly standardized the software defined networking aspects for various cloud enabled streamlined applications. The enormous growth in the statistics associated with the rate of connected devices over computer networks has led to the origins of ides and conceptual notions behind Internet-of-things. The evolution of IoT applications and their potential aspects is witnessed since last 5–6 years, which has made it an active area of research. The diverse and dynamic user requirement instances through on-line services supported with software defined networks (SDN) also leverages the operational cost of IoT. However, the collaboration of different wireless networking components has made IoT vulnerable to different types of security attacks while operated with SDN. The study has introduced a robust security framework namely (Framework for Internet of Things Security) abbreviated as RF-IoT to address security loopholes in IoT networking environment. The secure mechanism in the context of SDN targeted to resist maximum possible attacks in IoT. A numerical simulation environment in created to validate the performance of the RF-IoT in contrast with existing baseline.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
McKeown, N.: Software-defined networking. In: IEEE INFOCOM Keynote Talk, vol. 17(2), pp. 30–32, April 2009
Dacier, M.C., Konig, H., Cwalinski, R., Kargl, F., Dietrich, S.: Security challenges and opportunities of software-defined networking. IEEE Secur. Priv. 15(2), 96–100 (2017)
Scott-Hayward, S., O’Callaghan, G., Sezer, S.: SDN security: a survey. In: IEEE SDN for future networks and services
Fayazbakhsh, S.K., Chiang, L., Sekar, V., Yu, M., Mogul, J.C.: Enforcing network-wide policies in the presence of dynamic middle-box actions using FlowTags. In: 11th USENIX Symposium on Networked Systems Design and Implement
Bates, A., Butler, K., Haeberlen, A., Sherr, M., Zhou, W.: Let SDN be your eyes: secure forensics in data center networks. In: The Workshop on Security of Emerging Network Technologies
Guo, L., Pang, J., Walid, A.: Dynamic service function chaining in SDN-enabled networks with middleboxes. In: 2016 IEEE 24th International Conference on Network Protocols
Kulkarni, S.G., et al.: Name enhanced SDN framework for service function chaining of elastic network functions. In: 2016 IEEE Conference on Computer Communications Workshops
Xiong, G., Sun, P., Hu, Y., Lan, J., Li, K.: An optimized deployment mechanism for virtual middleboxes in NFV-and SDN-enabling network. KSII Trans. Internet Inf. Syst. 10, 3474–3497 (2016)
Jamshed, M.A., Kim, D., Moon, Y., Han, D., Park, K.: A case for a stateful middlebox networking stack. ACM SIGCOMM Comput.
He, D., Zeadally, S.: An analysis of RFID authentication schemes for Internet of Things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things J. 2(1), 72–83 (2015)
Ning, H., Liu, H., Yang, L.: Aggregated-proof based hierarchical authentication scheme for the Internet of Things. IEEE Trans. Parallel Distrib. Syst. 1, 1 (2015)
Liu, Y., Kuang, Y., Xiao, Y., Xu, G.: SDN-based data transfer security for Internet of Things. IEEE Internet of Things J. 5(1), 257–268 (2018)
Pinto, S., Gomes, T., Pereira, J., Cabral, J., Tavares, A.: IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput. 21(1), 40–47 (2017)
Raza, S., Seitz, L., Sitenkov, D., Selander, G.: S3K: scalable security with symmetric keys—DTLS key establishment for the Internet of things. IEEE Trans. Autom. Sci. Eng. 13(3), 1270–1280 (2016)
Siegel, J.E., Kumar, S., Sarma, S.E.: The future Internet of Things: secure, efficient, and model-based. IEEE Internet of Things J. 5(4), 2386–2398 (2018)
Shahzad, M., Singh, M.P.: Continuous authentication and authorization for the Internet of Things. IEEE Internet Comput. 21(2), 86–90 (2017)
Sarigiannidis, P., Karapistoli, E., Economides, A.A.: Modeling the Internet of Things under attack: a G-network approach. IEEE Internet of Things J. 4(6), 1964–1977 (2017)
Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106(1), 9–20 (2018)
Wu, H., Wang, W.: A game theory based collaborative security detection method for Internet of Things systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1432–1445 (2018)
Zhang, S., Xu, X., Peng, J., Huang, K., Li, Z.: Physical layer security in massive Internet of Things: delay and security analysis. IET Commun. 13(1), 93–98 (2018)
Zhang, M., Leng, W., Ding, Y., Tang, C.: Tolerating sensitive-leakage with larger plaintext-space and higher leakage-rate in privacy-aware Internet-of-Things. IEEE Access 6, 33859–33870 (2018)
Yang, X., Wang, X., Wu, Y., Qian, L.P., Lu, W., Zhou, H.: Small-cell assisted secure traffic offloading for Narrowband Internet of Thing (NB-IoT) systems. IEEE Internet of Things J. 5(3), 1516–1526 (2018)
Zhang, P., Nagarajan, S.G., Nevat, I.: Secure Location of Things (SLOT): mitigating localization spoofing attacks in the Internet of Things. IEEE Internet of Things J. 4(6), 2199–2206 (2017)
Xu, G., Cao, Y., Ren, Y., Li, X., Feng, Z.: Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things. IEEE Access 5, 21046–21056 (2017)
Ulz, T., Pieber, T., Höller, A., Haas, S., Steger, C.: Secured and easy-to-use NFC-based device configuration for the Internet of Things. IEEE J. Radio Freq. Identif. 1(1), 75–84 (2017)
Wazid, M., Das, A.K., Odelu, V., Kumar, N., Conti, M., Jo, M.: Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet of Things J. 5(1), 269–282 (2018)
Yang, A., Li, Y., Kong, F., Wang, G., Chen, E.: Security control redundancy allocation technology and security keys based on Internet of Things. IEEE Access 6, 50187–50196 (2018)
Roy, S., Chatterjee, S., Das, A.K., Chattopadhyay, S., Kumari, S., Jo, M.: Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J. 5, 2884–2895 (2017)
Salameh, H.B., Almajali, S., Ayyash, M., Elgala, H.: Spectrum assignment in cognitive radio networks for Internet-of-Things delay-sensitive applications under jamming attacks. IEEE Internet of Things J. 5, 1904–1913 (2018)
Manimuthu, A., Ramesh, R.: Privacy and data security for grid-connected home area network using Internet of Things. IET Netw. 7(6), 445–452 (2018)
Mughal, M.A., Luo, X., Ullah, A., Ullah, S., Mahmood, Z.: A lightweight digital signature based security scheme for human-centered Internet of Things. IEEE Access 6, 31630–31643 (2018)
Sajid, A., Abbas, H., Saleem, K.: Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4, 1375–1384 (2016)
Xu, Q., Ren, P., Song, H., Du, Q.: Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 4, 2840–2853 (2016)
Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 6, 24694–24705 (2018)
Anil, G.N.: FAN: framework for authentication of nodes in mobile adhoc environment of Internet-of-Things. In: Computer Science On-line Conference, pp. 56–65. Springer, Cham (2018)
Anil, G.N., Venugopal Reddy, A.: Strategical modelling with virtual competition for analyzing behavior of malicious node in mobile Adhoc network to prevent decamping. Int. J. Comput. Sci. Issues (IJCSI) 8(6), 173 (2011)
Muneshwara, M.S., Swetha, M.S., Thungamani, M., Anil, G.N.: Digital genomics to build a smart franchise in real time applications. In: 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1–4. IEEE (2017)
Swetha, M.S., Muneshwara, M.S., Anil, G.N.: Mobile cloud computing (MCC) enables storage smartness for every smart mobile agent. Int. J. Innov. Res. Comput. Commun. Eng. 3(11) (2015)
Hegde, S., Sonal, T.G., Swetha, M.S., Muneshwara, M.S., Anil, G.N.: Efficient way of managing the data for cloud storage applications depending on the internet speed in cloud environment. IJEIR 3(1), 8–11 (2014)
Rath, P.K., Anil, G.N.: Proposed challenges and areas of concern in operating system research and development (2012). arXiv preprint: arXiv:1205.6423
Anil, G.N., Jindal, P., Rafik, J., Barwade, S.S.: Self organized public key certificate in ad hoc networks. Semantic Scholar. Accessed 11 Jan 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Anil, G.N. (2019). RF-IoT: A Robust Framework to Optimize Internet of Things (IoT) Security Performance. In: Silhavy, R. (eds) Software Engineering Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-030-19807-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-19807-7_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19806-0
Online ISBN: 978-3-030-19807-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)