Figure 2 - available via license: CC BY
Content may be subject to copyright.
Source publication
There has been an increase in the usage of Internet of Things (IoT), which has recently become a rising area of interest as it is being extensively used for numerous applications and devices such as wireless sensors, medical devices, sensitive home sensors, and other related IoT devices. Due to the demand to rapidly release new IoT products in the...
Context in source publication
Context 1
... much as IoT plays an important role in our current lives, it is evident that the use of IoT will play a critical part in the infrastructure of technology in the coming years [21]. According to a recent prediction, in 2025 the total number of connected devices in the world will approximately be 75.44 billion, Figure 2 [22]. While companies are racing to produce new IoT devices with creative applications, in many cases, unfortunately, security comes as an afterthought. ...
Similar publications
Network resource management is one of the key technologies needed to ensure that multiple applications in edge networks provide reliable and stable performance. Although throughput has previously been seen as the primary network performance metric, recent applications do not focus on throughput alone. Instead, Quality of Experience (QoE) is attract...
Citations
... Researchers need to take this into account so that users' privacy is protected as they use a unified platform across various devices. Security and privacy of network traffic are improved by SDN's fine-grained control of flows [57]. ...
Security networks as one of the biggest issue for network managers with the exponential growth of devices connected to the internet. Keeping a big and diverse network running smoothly and securely is no easy feat. With this in mind, emerging technologies like software defined networking (SDN) and internet of things (IoT) hold considerable promise for information service innovation in the cloud and big data era. Therefore, this paper describes the model of SDN and the architecture of IoT. Then this review does not only review the research studies in SDN-IoT but also provides an explanation of the SDN-IoT solution in terms of architecture, main consideration, model, and the implementation of SDN controllers for IoT. Finally, this review discusses the challenges and future directions. This paper can be used as a starting point for thinking about how to improve SDN-IoT security and privacy. This is an open access article under the CC BY-SA license.
... The authors also discuss various security issues such as DDoS for switch overload, the need for Deep Packet Inspection (DPI) before routing, and other mechanisms such as authentication, trust systems, and intrusion detection systems (IDS) [6]. Al-Hayajneh et al. focus on the use of SDN to protect IoT devices that use HTTP and provide a solution for the mitigation of man-in-the-middle (MITM) attacks that arise due to separating IoT traffic from normal traffic using the SDN controller and filtering MAC addresses and directing it through a proxy [7]. Flowbased security for IoT devices proposed by Bull et al. suggests SDN as an IoT gateway and performs traffic analysis to find patterns and pre-emptively install rules, intended mainly for DDoS mitigation by reducing flow table size [8]. ...
With an emphasis on the role of automation in Industry 4.0, there has been widespread growth in the adoption of industrial Internet of Things (IoT). However, as IoT networks become larger with billions of heterogeneous devices, scalability and efficient data routing become issues, especially in the context of existing blockchain models. Managing network traffic, latency as well as facilitating high throughput is essential for the fluid functioning of real-time systems. This paper aims to deal with such existing issues by discussing newer hierarchical blockchain models over existing SDN and fog-based networking frameworks for large-scale IoT applications. We also prove the model’s feasibility through performance testing through both native and platform-based implementations to support our quest for enhanced scalability and security.
... Owing to its role in controlling both layers and separating the other layers from the control layer, SDN technology enhances intelligence in the network [1]. The data layer includes vehicles, roadside units (RSUs), and many other devices [2] that forward packets by following instructions in the flow rules of the MC. The application layer includes all the services (routing, addressing, etc.) that control the behavior of all devices in the data layer [3]. ...
... An optimal path is the one which has maximum path time. This path time depends on link duration (L D) as mentioned in (2). It can be clearly observed from Fig. 15, the P T 1 has minimum number of hops. ...
The controller selection problem (CSP) in software-defined vehicular networks (SDVNs) causes a long delay and large overhead due to sporadic links, especially when vehicles are outside the coverage of the main controller (MC) or a local controller (LC) and when distribution of the load among LCs is unequal. We solve the CSP using a support vector machine (SVM) algorithm for heterogeneous communications. The MC runs the algorithm based on vehicle density to select an optimal controller (OC) in both highway and city scenarios. After this selection, the OC is responsible for selecting a stable path to deliver packets from source to destination. This machine-learning-based SDVN scheme selects the minimum link duration (
$LD$
) for communication between nodes, but selects the path with the maximum path time between source and destination. The protocol has two phases: OC selection and path selection. The OC is also responsible for distributing the load equally to the other LCs. The two-phase selection scheme improves the network performance in terms of delivery ratio (maximum value of 94.2%), end-to-end delay (minimum value of 0.11 ms), and routing overhead ratio (maximum incurred is 10%), which is proved by our simulation results in comparison to an existing scheme.
... Dependencies on the internet and internet-based services are increasing rapidly worldwide. Approximately 75.44 billion devices will be appended worldwide through the internet by 2025 [3]. IoT shoves an unbounded number of new applications in a wide range of fields like smart home systems, animal farms, productivity, supply chains, precision agriculture, environmental monitoring (low energy monitoring systems and telemetry), e-health, industrial applications, informatics, automobiles and transportation systems, high-security applications, law enforcement, defense, logistics systems, space research, entertainment systems, and wearable gadgets. ...
In the internet of things (IoT), there are resource-constrained and immense heterogeneous electronic gadgets worldwide. Till now, no single IoT application layer messaging protocol is the best, nor axiomatic for every requirement. This paper exhaustively summarizes information on the messaging protocols from the available previous research sources online. Our goal is to encapsulate a simple guideline so that users can choose an optimal messaging protocol quickly according to development requirements and specifications. For this purpose, we have reviewed the literature on six enabling and evolving application layer messaging protocols used for IoT systems namely, message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), the constrained application protocol (CoAP), extensible messaging and presence protocol (XMPP), data distribution service (DDS), and simple text-oriented messaging protocol (STOMP) in terms of some interrelated metrics. Additionally, we represented a critical analysis of the application layer messaging protocols. This study will be helpful to readers with valuable insights and guide research scholars and developers in choosing optimal application layer messaging protocols based on development specifications and requirements.
... Therefore, using SDN is an apparent solution to enhance IoT networking performance and overcome existing challenges. Al Hayajneh et al. explained a system paradigm for using SDN with IoT networks [14]. Additionally, it suggests a way to prevent crucial and challenging-to-defend man-in-the-middle assaults against IoT devices that can only use HTTP. ...
Data centers and business networks are rapidly using SDN (Software Defined Networking), an emerging technology. It isolates the control plane from the underlying data or forwarding plane to allow more efficient and customized network control with a global view of the underlying network. A variety of encryption algorithms created for network-level data encryption and decryption must be used in a PC network for every application communication to be encrypted at the transmission end and decrypted at the receiving end. Unfortunately, the time it takes to transform plain text into encrypted text due to encryption computations might slow down the performance of the communication protocol stack. This study aims to simulate and investigate the effects of encryption delay caused by encryption calculations on TCP and UDP transport layer protocols in an SDN network environment. We will consider and investigate performance measures including data, throughput, and end-to-end packet delay under the suggested SDN simulation settings using a realistic network simulator. Keywords: ABE attribute-based encryption, CP-ABE ciphertext policy attribute-based encryption, CS cloud server, PK public key, RK retrieving key, SK secret key, TK transformation key, TCT transformed ciphertext INTRODUCTION As computer networks have developed, PC systems and server farms have become more elaborate, complicated, and information heavy. As a result, as time goes on, programming must be updated to meet the needs. The needs of the clients cannot be met by traditional system paradigms. When different system parts are unable to incorporate any new system gadgets due to the basic leadership of the inheritance networks being communicated, organized arrangement results in mistakes being made in system administration. System engineers have created Software Defined Networking (SDN) as a solution to these issues. To the degree that designers, framework architects, and executives who run the system can do so, SDN makes the system framework design programmable and provides controls for the applications.
... devices that are only Hyper Text Terminal Protocol (HTTP) capable [140]. Moreover, the global view of SDN enables network wide centralized control of encryption and key management schemes [141]. ...
... Likewise, secure control of OpenFlow channel can be used for countering the potential risks of MitM attacks in SDN architecture. [137] 2022 Confidentiality Block chain technology base confidentiality mechanism [140] 2020 Confidentiality in devices that are only HTTP [141] 2023 Centralized control of encryption and key management [144] 2023 ...
Modern communication systems are probable to surface new challenges while introducing innovative fronts concerning context consciousness in wireless networks. The main outcome behind this expected technological jump will be a whole novel set of intuiting aptitudes forecasted for Fifth Generation (5G) enabled devices. In line with 5G, Software Defined Networking (SDN) is also rising as an intrinsically novel phenomenon. SDN is an unconventional methodology and key technology in modern communication. SDN maintains favorable novelty about network programmability, where network administration is permitted with extraordinary intellections. SDN architecture has the prospective to allow, simplify or augment security implementations in network through instantly reprogrammable centralized view of the data plane. In the near future, 5G and SDN will ripe mobile communication through the development of state-of-the-art implementations such as a smart city, advanced military security, modern national defense, intelligent traffic, etc.; thereby, these emerging mobile communication concepts invoke various significant topics, where security is a paramount implication. Therefore, we initiate our focus from basic architecture of 5G and SDN. Next, we analyze security requirements, solutions and challenges in joint paradigm of 5G and SDN. Further, considering the modern communication technological shift, we discuss future trends and research directions in the joint era of 5G and SDN technologies.
... SDN's software, rather than having predefined functionalities, can be swiftly and readily updated as needed. The SDN controller interacts with switches to centrally manage packet flow based on its configuration for SDN [13]. Furthermore, SDN gives the administrator complete control over the IoT-Fog network's overall behavior and eliminates data layer overload. ...
... The administrator should update each of the fog gateways. To overcome these issues, Al Hayajneh et al. [13] implemented SDN in IoT by handling the security layer with a TLS/SSL upgrading proxy (also known as a proxy or upgrading proxy). To avoid the issue of reconfiguring the IoT device, the resources neces-sary for the TLS/SSL channel are offloaded to the proxy device and function. ...
... On the other hand, it may cause several caches misses on a membership query when the scale of the network increases. Work [13] uses a TLS/SSL upgrading proxy to overcome HTTPS limitations. It has an accrued anomaly detection due to employing deep packet inspection. ...
The utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a notion that solves cloud computing’s limitations by offering low latency to IoT network user applications. However, the significant number of networked IoT devices, the large scale of the IoT, security concerns, users’ critical data, and heterogeneity in this extensive network significantly complicate the implementation. The IoT-Fog architecture consists of fog devices (servers) at the fog layer, which decreases network utilization and response time due to their closeness to IoT devices. However, as the number of IoT and fog devices under the IoT-Fog architecture grows, new security concerns and requirements emerge. Because incorporating fog computing into IoT networks introduces some vulnerabilities to IoT-Fog networks, the nodes in the fog layer are the target of security threats. Software-Defined Networking (SDN) is a novel paradigm that decouples the data plane from control plane, resulting in better programmability and manageability. Attack defense mechanisms can be implemented in the IoT-Fog network without SDN. But SDN paradigm provides the IoT-Fog with some characteristics that facilitate counterattacks. This survey briefly explains some works that utilized the SDN features in the IoT-Fog network for security threats in the IoT-Oriented fog layer. To this end, we examine IoT-Fog, SDN, and SDN-based IoT-Fog networks. We describe security threats in IoT-Fog networks and briefly explain the vulnerabilities and attacks in the fog layer. Then, we describe the fog layer’s most common IoT-Fog security defense mechanisms. Following that, we present the SDN features, explore how SDN can help defensive mechanisms in IoT-Fog networks, and categorize the works based on the SDN features they use. We explain their features and present a comparison between them. Finally, we discuss the disadvantages of SDN in IoT-Fog networks.
... It is currently entering and influencing millions of people's daily lives in different aspects, like monitoring health and fitness systems, security devices, connected cars, and home appliances. IoT security has been given special attention, due to the nature of the Internet of Things, such as complex heterogeneous networks, devices with limited resources [3]. Communication may take place without confidentiality and credibility, leaving it vulnerable to attacks. ...
The Internet of Things (IoT) is one of the most important modern technological practical sciences that contains a large number of heterogeneous devices that have the ability to communicate with each other through the Internet. Many different devices and protocols, as well as various types of technologies, participate in accomplishing this task. Information security is very difficult in this environment, which integrates with different environments especially Software-Defined Networking (SDN) is based on the Internet of Things. Unfortunately, SDN/IOT faces many security issues that affect the network components and the provided services, especially the attacks related to refusing of service DDoS attack. Alongside, to prevent consume controller resources and provide a solution to detect such attacks, the present paper proposes a method depending on DDoS attack detection plus mitigation with RYU and FloodLight controllers. The proposed method uses the Entropy-threshold technique programmed in python within the controllers and DDoS attacks executed from IoT sensors. The controller’s use the entropy value to block that specific port in the switch if it falls below a given threshold value and then shut down the port. The results show that Floodlight is better than dealing with DDoS attack cases compared with the RYU controllers. Alongside, the Throughput decreased from 0.1158 KB/s to 0.08916 KB/s in the Floodlight controller, while it decreased in the RYU controller from 0.0646 KB/s to 0.03294 KB/s.
... Many network technologies, namely cloud computing, IoT, and others, demand more attention to network design and implementations [23]. IoT is continuously adapting many applications related to smart environments [24]. It is essential to reduce the total cost of the network installation and simplify the network connections [25]. ...
A networking program established to meet current network needs within an extensive network with new architectures. This study presents a novel model of network connections with various devices such as mobile phones and laptops to control overall network management. This study compares and contrasts two home networks, each with its uses. Three linked Alcatel-Lucent 7750 IP service edge routers connect each network to an ISP network. This study builds on multi-carrier assured-service-quality connection tunnels to accommodate multi-ISP scenarios. In this regard, logical manipulation is taken for all connected devices with device abstraction and network programs. Software-Defined Networking (SDN) is a potential option for the future Internet. Two features can define SDN: one is the elimination from the data plane of the control plane, and the other includes programming for the optimization of network applications. SDN can provide additional architecture, efficiency, and versatility for complex applications to meet modern network architectures.
... In one another research SDN provides a flexible and scalable framework for implementing security policies and improving the visibility of network activities. The authors also highlight the potential of SDN to simplify the management of IoT devices and reduce the risk of security breaches (Al Hayajneh et al., 2020). In another research the authors propose an SDN-based architecture for IoT security. ...
IOT (Internet of Things) and SDN (Software Defined Network) are the two most outstanding concepts which are predicted to dominate the technology market in near future. The purpose of this survey is to study how does SDN can assist IoT concerns which can be raised from threefold growth in IoT industry that is a sharp mutation in networked devices and presumably will end up to generate shortcomings including security related challenges. Using cross-sectional analysis in this survey will present several security mechanisms which have been recommended so far by different networking pioneers in purpose of security optimization for IoT and IoT devices. Based on previous researches, we found that using SDN can mitigate the IoT and IoT devices' security concerns efficiently. However, the security enhancement of IoT devices is the main axis of this paper, the general structure of this paper is as follows: (i) First, we present some previous scientific works done around SDN-base IoT archit-ectures. (ii) Secondly, we provide a brief introduction to IOT and IOT architecture. (iii) Then, we discuss the IoT and IOT devices current security challenges. (iv) furthermore, we express an Introduction to SDN and SDN architecture (v) Finally, we conclude the paper by expressing SDN-based recommended solutions for IOT devices security enhancement.