A Survey on SDN Based Security in Internet of Things

Internet of Things (IoT) is an emerging technology where tens of billions of devices that include everything from small wearable fitness bands, medical devices, smart devices to factory automobiles can be connected to the Internet which makes the life eas

  • PDF / 1,589,151 Bytes
  • 15 Pages / 439.37 x 666.142 pts Page_size
  • 46 Downloads / 247 Views

DOWNLOAD

REPORT


Abstract. Internet of Things (IoT) is an emerging technology where tens of billions of devices that include everything from small wearable fitness bands, medical devices, smart devices to factory automobiles can be connected to the Internet which makes the life easy without or with little human intervention. Though IoT has proven to be more transformative, as its market size increases, it is really a big challenge to secure such a large number of devices that are connected by a complex heterogeneous network with a variety of access protocols. Software defined networking (SDN) decouples the control plane from the data plane, enabling fast reaction to security threats and security policy enforcement. IoT security can be achieved by the integration of SDN with IoT. SDN is an intelligent network paradigm which can open up ways to secure IoT and different access control mechanisms. This survey paper analyzes SDN based IoT security mechanisms to secure communications in IoT and present open research issues.

Keywords: Internet of Things Security · Access control

1

· Software defined networking

Introduction

With the rapidly growing Internet during the past decades, more and more devices are connected to the Internet. Gartner predicted that the number of devices connected to the Internet will grow exponentially up to 25 billion by 2020 [1]. The fact behind this growth includes smart devices that we use every day from small chips to large machines that are used on the industry floor are becoming the connected entities across the globe. Internet of Things (IoT) refers to a network that connects not only smart phones and laptops but also the smart devices used at home automation, office, healthcare, e-learning, factories and even at nuclear reactors to the Internet [2]. These devices gathered and shared the required information autonomously between other devices. IoT provides the interaction between these devices by using different protocols. The common feature of IoT is to combine embedded c Springer Nature Switzerland AG 2019  K. Arai et al. (Eds.): FICC 2018, AISC 887, pp. 563–577, 2019. https://doi.org/10.1007/978-3-030-03405-4_39

564

R. Kanagavelu and K. M. M. Aung

sensory objects and ability to transfer data over a mix of wired and wireless networks without human-to-human or human-to-computer interaction [3]. Because of this, the physical devices are able to stay connected and without human intervention, machines can communicate with each other leading to a timely output. While IoT brings in advantages in terms of time efficiency, money savings, and improved quality of life, it is prone to risks as the IoT devices can become the entry points to many critical infrastructures giving hackers and cyber criminals more entry points to exploit the sensitive information. The increase in automation may make the system more vulnerable. That is, more data will be transferred over IoT for automation. The greater the volume of sensitive data we transfer over the IoT, the greater the risk of data and identity theft, device manipulatio