An SDN-Enabled IoT Architecture with Fog Computing and Edge Encryption Support

Internet of Things (IoT) is supposed to be the future form of communication where objects can communicate with each other via the Internet. Due to heterogeneous network technologies and infrastructures, the overall IoT system is getting more complex than the traditional system. This research discusses about integrating SDN in IoT system for better network functionalities in terms of optimization, controlling, dynamic resource management, etc., whereas fog computing provides quick time response for real-time applications with security where computation is done at the edge of the network. Also, adding edge encryption provides better security, privacy, and sharing of sensitive data where data is encrypted before sending to the cloud. Thus, a four-layered IoT architecture is proposed and explained here with two use cases where each layer is capable to respond to specific security requirements as well as open for adding new security frameworks.

[1]  Jeremy Hilton,et al.  A Reference Model of Information Assurance & Security , 2013, 2013 International Conference on Availability, Reliability and Security.

[2]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[3]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[4]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[5]  Geng Wu,et al.  M2M: From mobile to embedded internet , 2011, IEEE Communications Magazine.

[6]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[7]  David C. Keezer,et al.  A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs , 2015, WESS.

[8]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[9]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[10]  Jari Arkko,et al.  Media Types for Sensor Markup Language (SenML) , 2012 .

[11]  Minghui Zhang,et al.  Architecture of Internet of Things and Its Key Technology Integration Based-On RFID , 2012, 2012 Fifth International Symposium on Computational Intelligence and Design.

[12]  Miao Wu,et al.  Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[14]  Daniel W. Engels,et al.  A secure IoT architecture for Smart Cities , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[15]  Igor Radusinovic,et al.  Software-Defined Fog Network Architecture for IoT , 2016, Wireless Personal Communications.

[16]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[17]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .

[18]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[19]  Erik Wilde,et al.  A resource oriented architecture for the Web of Things , 2010, 2010 Internet of Things (IOT).

[20]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[21]  Aikaterini Mitrokotsa,et al.  Classification of RFID Attacks , 2008, IWRT.

[22]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[23]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[24]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[25]  Manas Ranjan Patra,et al.  Cloud Computing: Security Issues and Research Challenges , 2011 .

[26]  Christian Bonnet,et al.  An IoT gateway centric architecture to provide novel M2M services , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[27]  Saqib Rasool Chaudhry,et al.  IoT architecture challenges and issues: Lack of standardization , 2016, 2016 Future Technologies Conference (FTC).

[28]  Raj Kulkarni,et al.  Internet of Things: Architecture and Security , 2014 .

[29]  Lan Li Study on security architecture in the Internet of Things , 2012 .

[30]  Niraj K. Jha,et al.  Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.

[31]  Meng Zhang,et al.  Trustworthiness of Medical Devices and Body Area Networks , 2014, Proceedings of the IEEE.

[32]  R. Venkatesha Prasad,et al.  A scalable distributed architecture towards unifying IoT applications , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[33]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[34]  Susmita Sur-Kolay,et al.  Physiological Information Leakage: A New Frontier in Health Information Security , 2016, IEEE Transactions on Emerging Topics in Computing.

[35]  Lizhong Jin,et al.  A Novel Secure Architecture for the Internet of Things , 2011, 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS).

[36]  Nalini Venkatasubramanian,et al.  A Software Defined Networking architecture for the Internet-of-Things , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).

[37]  Michael S. Hsiao,et al.  Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.