A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems

The explosive rise of Internet of Things (IoT) systems have notably increased the potential attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices, traditional security countermeasures can be inefficient in dynamic IoT environments. In this vein, the advantages introduced by software defined networking (SDN) and network function virtualization (NFV) have the potential to reshape the landscape of cybersecurity for IoT systems. To this aim, we provide a comprehensive analysis of security features introduced by NFV and SDN, describing the manifold strategies able to monitor, protect, and react to IoT security threats. We also present lessons learned in the adoption of SDN/NFV-based protection approaches in IoT environments, comparing them with conventional security countermeasures. Finally, we deeply discuss the open challenges related to emerging SDN- and NFV-based security mechanisms, aiming to provide promising directives to conduct future research in this fervent area.

[1]  Hyoungshick Kim,et al.  Security challenges with network functions virtualization , 2017, Future Gener. Comput. Syst..

[2]  Syed Ali Khayam,et al.  Revisiting Traffic Anomaly Detection Using Software Defined Networking , 2011, RAID.

[3]  Ehab Al-Shaer,et al.  Efficient Random Route Mutation considering flow and network constraints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[4]  Wenjuan Li,et al.  A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures , 2016, J. Netw. Comput. Appl..

[5]  Shin-Ming Cheng,et al.  Traffic-Aware Patching for Cyber Security in Mobile IoT , 2017, IEEE Communications Magazine.

[6]  Ayman I. Kayssi,et al.  IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[7]  Prem Prakash Jayaraman,et al.  OpenIoT: Open Source Internet-of-Things in the Cloud , 2014, OpenIoT@SoftCOM.

[8]  Stéphane Dauzère-Pérès,et al.  A literature review on the impact of RFID technologies on supply chain management , 2010 .

[9]  Sherali Zeadally,et al.  Securing Internet of Things with Software Defined Networking , 2018, IEEE Communications Magazine.

[10]  Audrey A. Gendreau,et al.  Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[11]  Yu Chen,et al.  Ultra-lightweight deep packet anomaly detection for Internet of Things devices , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[12]  Tarik Taleb,et al.  Survey on Multi-Access Edge Computing for Internet of Things Realization , 2018, IEEE Communications Surveys & Tutorials.

[13]  Cheng Li,et al.  Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks , 2017, IEEE Internet of Things Journal.

[14]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[15]  Michele Zorzi,et al.  Web Services for the Internet of Things through CoAP and EXI , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[16]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[17]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[18]  Tarik Taleb,et al.  On Enabling 5G Automotive Systems Using Follow Me Edge-Cloud Concept , 2018, IEEE Transactions on Vehicular Technology.

[19]  Tarik Taleb,et al.  End-to-end Network Slicing for 5G Mobile Networks , 2017, J. Inf. Process..

[20]  Victor C. M. Leung,et al.  A Survey of Recent Developments in Home M2M Networks , 2014, IEEE Commun. Surv. Tutorials.

[21]  Ioannis G. Askoxylakis,et al.  A Reactive Security Framework for operational wind parks using Service Function Chaining , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[22]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[23]  Hwee Pink Tan,et al.  Sensor OpenFlow: Enabling Software-Defined Wireless Sensor Networks , 2012, IEEE Communications Letters.

[24]  Biswanath Mukherjee,et al.  A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications , 2016, IEEE Communications Surveys & Tutorials.

[25]  Mukhtiar Memon,et al.  Ambient Assisted Living Healthcare Frameworks, Platforms, Standards, and Quality Attributes , 2014, Sensors.

[26]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[27]  Muhammad Sabir Idrees,et al.  HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems , 2013, Inf. Secur. Tech. Rep..

[28]  Ahmed Meddahi,et al.  A First Step Towards Security Extension for NFV Orchestrator , 2017, SDN-NFV@CODASPY.

[29]  Mohamed Cheriet,et al.  Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns , 2019, IEEE Transactions on Services Computing.

[30]  Fernando A. Kuipers,et al.  SDN and Virtualization Solutions for the Internet of Things: A Survey , 2016, IEEE Access.

[31]  Guy Pujolle,et al.  Virtualizing vehicular node resources: Feasibility study of virtual machine migration , 2016, Veh. Commun..

[32]  Rodrigo Braga,et al.  Lightweight DDoS flooding attack detection using NOX/OpenFlow , 2010, IEEE Local Computer Network Conference.

[33]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[34]  Cataldo Basile,et al.  A novel approach for integrating security policy enforcement with dynamic network virtualization , 2015, Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft).

[35]  Jukka Riekki,et al.  A SDN-based architecture for horizontal Internet of Things services , 2016, 2016 IEEE International Conference on Communications (ICC).

[36]  Cynthia E. Irvine,et al.  Security as a dimension of quality of service in active service environments , 2001, Proceedings Third Annual International Workshop on Active Middleware Services.

[37]  Fernando M. V. Ramos,et al.  Towards secure and dependable software-defined networks , 2013, HotSDN '13.

[38]  Marcelo G. Rubinstein,et al.  Proposing and evaluating the performance of a firewall implemented as a virtualized network function , 2016, 2016 7th International Conference on the Network of the Future (NOF).

[39]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[40]  Gerhard P. Hancke,et al.  A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements , 2017, IEEE Access.

[41]  Mauro Conti,et al.  Security and Privacy Analysis of National Science Foundation Future Internet Architectures , 2018, IEEE Communications Surveys & Tutorials.

[42]  Muhammad Khurram Khan,et al.  Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues , 2017, IEEE Communications Magazine.

[43]  Nalini Venkatasubramanian,et al.  A Software Defined Networking architecture for the Internet-of-Things , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).

[44]  Tarik Taleb,et al.  On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration , 2017, IEEE Communications Surveys & Tutorials.

[45]  Mabry Tyson,et al.  FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.

[46]  Jiannong Cao,et al.  SDVN: enabling rapid network innovation for heterogeneous vehicular communication , 2016, IEEE Network.

[47]  Ayman M. Bahaa-Eldin,et al.  A survey on deep packet inspection , 2017, 2017 12th International Conference on Computer Engineering and Systems (ICCES).

[48]  Vinod Yegneswaran,et al.  AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks , 2013, CCS.

[49]  Srinivasan Seshan,et al.  Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.

[50]  Antonio Iera,et al.  Social Virtual Objects in the Edge Cloud , 2015, IEEE Cloud Computing.

[51]  Athanasios V. Vasilakos,et al.  A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.

[52]  Tarik Taleb,et al.  Assuring virtual network function image integrity and host sealing in Telco cloue , 2017, 2017 IEEE International Conference on Communications (ICC).

[53]  Wei Yang,et al.  A survey on security in network functions virtualization , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).

[54]  Alberto Schaeffer-Filho,et al.  ANSwer: Combining NFV and SDN features for network resilience strategies , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[55]  Tarik Taleb,et al.  User mobility-aware Virtual Network Function placement for Virtual 5G Network Infrastructure , 2015, 2015 IEEE International Conference on Communications (ICC).

[56]  Mabry Tyson,et al.  A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.

[57]  Hossam S. Hassanein,et al.  On the recruitment of smart vehicles for urban sensing , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[58]  Tarik Taleb,et al.  Toward carrier cloud: Potential, challenges, and solutions , 2014, IEEE Wireless Communications.

[59]  Antonella Molinaro,et al.  From Theory to Experimental Evaluation: Resource Management in Software-Defined Vehicular Networks , 2017, IEEE Access.

[60]  Sasu Tarkoma,et al.  A gap analysis of Internet-of-Things platforms , 2015, Comput. Commun..

[61]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[62]  Yousof Al-Hammadi,et al.  Secure lightweight ECC-based protocol for multi-agent IoT systems , 2017, 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[63]  Tarik Taleb,et al.  Optimal VNFs Placement in CDN Slicing Over Multi-Cloud Environment , 2018, IEEE Journal on Selected Areas in Communications.

[64]  Bernd Jaeger Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture , 2015, TrustCom 2015.

[65]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[66]  Antonio F. Gómez-Skarmeta,et al.  Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[67]  Burkhard Stiller,et al.  AAA: a survey and a policy-based architecture and framework , 2002 .

[68]  Stefano Giordano,et al.  A SDN-IoT Architecture with NFV Implementation , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[69]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[70]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[71]  Rob Sherwood,et al.  FlowVisor: A Network Virtualization Layer , 2009 .

[72]  Guofei Gu,et al.  A First Step Toward Network Security Virtualization: From Concept To Prototype , 2015, IEEE Transactions on Information Forensics and Security.

[73]  Kpatcha M. Bayarou,et al.  OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).

[74]  Arijit Mukherjee,et al.  ANGELS for distributed analytics in IoT , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[75]  Katia Obraczka,et al.  A flexible in-network IP anonymization service , 2012, 2012 IEEE International Conference on Communications (ICC).

[76]  Massimo Rimondini,et al.  Leveraging SDN to monitor critical infrastructure networks in a smarter way , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[77]  Gulshan Kumar,et al.  The use of artificial intelligence based techniques for intrusion detection: a review , 2010, Artificial Intelligence Review.

[78]  Adam J. Aviv,et al.  Enabling Practical Software-defined Networking Security Applications with OFX , 2016, NDSS.

[79]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[80]  Danda B. Rawat,et al.  Software Defined Networking Architecture, Security and Energy Efficiency: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[81]  Laura Galluccio,et al.  Towards a software-defined Network Operating System for the IoT , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[82]  Guevara Noubir,et al.  Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.

[83]  Chiara Buratti,et al.  Testing Protocols for the Internet of Things on the EuWIn Platform , 2016, IEEE Internet of Things Journal.

[84]  Antonio Iera,et al.  Evaluating Performance of Containerized IoT Services for Clustered Devices at the Network Edge , 2017, IEEE Internet of Things Journal.

[85]  Sigrid Schefer-Wenzl,et al.  A Highly Scalable IoT Architecture through Network Function Virtualization , 2017, Open J. Internet Things.

[86]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[87]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[88]  Minlan Yu,et al.  SIMPLE-fying middlebox policy enforcement using SDN , 2013, SIGCOMM.

[89]  Tarik Taleb,et al.  UAV-Based IoT Platform: A Crowd Surveillance Use Case , 2017, IEEE Communications Magazine.

[90]  Lei Xu,et al.  Enhancing Network Security through Software Defined Networking (SDN) , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[91]  Hardik Upadhyay,et al.  Intrusion Detection System for Internet of Things , 2016 .

[92]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[93]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[94]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[95]  Flauzac Olivier,et al.  New Security Architecture for IoT Network , 2015, ANT/SEIT.

[96]  Kuang-Ching Wang,et al.  VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls , 2015, 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN).

[97]  M. Tech Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology , 2013 .

[98]  Ingrid Moerman,et al.  IETF Standardization in the Field of the Internet of Things (IoT): A Survey , 2013, J. Sens. Actuator Networks.

[99]  Rupam Kumar Sharma,et al.  Different firewall techniques: A survey , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[100]  Sang Ho Lee,et al.  Security and Privacy on Authentication Protocol for Low-cost RFID , 2006, 2006 International Conference on Computational Intelligence and Security.

[101]  Ludovic Noirie,et al.  Software-Defined LANs for Interconnected Smart Environment , 2015, 2015 27th International Teletraffic Congress.

[102]  Ibrahim Matta,et al.  Autonomic Communications in Software-Driven Networks , 2017, IEEE Journal on Selected Areas in Communications.

[103]  Ehab Al-Shaer,et al.  Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.

[104]  Athanasios V. Vasilakos,et al.  Software-Defined Networking for Internet of Things: A Survey , 2017, IEEE Internet of Things Journal.

[105]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[106]  Tarik Taleb,et al.  NFV: Security Threats and Best Practices , 2017, IEEE Communications Magazine.

[107]  Antonio Iera,et al.  5G Network Slicing for Vehicle-to-Everything Services , 2017, IEEE Wireless Communications.

[108]  Giacomo Morabito,et al.  Toward Unified Control of Networks of Switches and Sensors Through a Network Operating System , 2018, IEEE Internet of Things Journal.

[109]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[110]  Maria Rita Palattella,et al.  Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.

[111]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[112]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[113]  Vyas Sekar,et al.  Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.

[114]  Tarik Taleb,et al.  PERMIT: Network Slicing for Personalized 5G Mobile Telecommunications , 2017, IEEE Communications Magazine.

[115]  Riccardo Trivisonno,et al.  SDN‐based 5G mobile networks: architecture, functions, procedures and backward compatibility , 2015, Trans. Emerg. Telecommun. Technol..

[116]  Antonio F. Gómez-Skarmeta,et al.  Enhancing IoT security through network softwarization and virtual security appliances , 2018, Int. J. Netw. Manag..

[117]  Antonio Iera,et al.  Device-to-Device Communications for 5G Internet of Things , 2015, IOT 2015.

[118]  Miika Komu,et al.  Hypervisors vs. Lightweight Virtualization: A Performance Comparison , 2015, 2015 IEEE International Conference on Cloud Engineering.

[119]  Zonghua Zhang,et al.  Enabling security functions with SDN: A feasibility study , 2015, Comput. Networks.

[120]  Tarik Taleb,et al.  Securing VNF communication in NFVI , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[121]  Narmeen Zakaria Bawany,et al.  DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions , 2017, Arabian Journal for Science and Engineering.

[122]  Akihiro Nakao,et al.  Network Virtualization as Foundation for Enabling New Network Architectures and Applications , 2010, IEICE Trans. Commun..

[123]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[124]  Sangeeta Sharma,et al.  The Evolution of RFID Security and Privacy: A Research Survey , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[125]  Faqir Zarrar Yousaf,et al.  A double-tier MEC-NFV architecture: Design and optimisation , 2016, 2016 IEEE Conference on Standards for Communications and Networking (CSCN).

[126]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[127]  Tarik Taleb,et al.  Assessing Lightweight Virtualization for Security-as-a-Service at the Network Edge , 2019, IEICE Trans. Commun..

[128]  Tarik Taleb,et al.  EASE: EPC as a service to ease mobile core network deployment over cloud , 2015, IEEE Network.

[129]  Tarik Taleb,et al.  QoS2: a framework for integrating quality of security with quality of service , 2012, Secur. Commun. Networks.

[130]  Magnos Martinello,et al.  A Survey on SDN Programming Languages: Toward a Taxonomy , 2016, IEEE Communications Surveys & Tutorials.

[131]  Zhu Han,et al.  Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.

[132]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[133]  Mahesh Sooriyabandara,et al.  Low Power Wide Area Networks: An Overview , 2016, IEEE Communications Surveys & Tutorials.

[134]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[135]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[136]  Cataldo Basile,et al.  Virtualized security at the network edge: a user-centric approach , 2015, IEEE Communications Magazine.

[137]  Carles Gomez,et al.  Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology , 2012, Sensors.

[138]  Xavier Lagrange,et al.  Universal AAA for hybrid accesses , 2015, 2015 European Conference on Networks and Communications (EuCNC).

[139]  Taskin Koçak,et al.  A Survey on Smart Grid Potential Applications and Communication Requirements , 2013, IEEE Transactions on Industrial Informatics.

[140]  Sajad Shirali-Shahreza,et al.  Efficient Implementation of Security Applications in OpenFlow Controller with FleXam , 2013, 2013 IEEE 21st Annual Symposium on High-Performance Interconnects.

[141]  Daniel W. Engels,et al.  Black SDN for the Internet of Things , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.

[142]  Tarik Taleb,et al.  Mobile Edge Computing Potential in Making Cities Smarter , 2017, IEEE Communications Magazine.

[143]  Vijay Varadharajan,et al.  Security as a Service Model for Cloud Environment , 2014, IEEE Transactions on Network and Service Management.

[144]  Antonio F. Gómez-Skarmeta,et al.  Towards a Lightweight Authentication and Authorization Framework for Smart Objects , 2014 .

[145]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[146]  Vyas Sekar,et al.  Bohatei: Flexible and Elastic DDoS Defense , 2015, USENIX Security Symposium.

[147]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[148]  Tarik Taleb,et al.  MIRA!: An SDN-Based Framework for Cross-Domain Fast Migration of Ultra-Low Latency 5G Services , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[149]  René Serral-Gracià,et al.  Offloading personal security applications to the Network Edge: A mobile user case scenario , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[150]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[151]  Sasu Tarkoma,et al.  Securebox: Toward Safer and Smarter IoT Networks , 2016, CAN@CoNEXT.

[152]  Sherali Zeadally,et al.  Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies , 2015, IEEE Wireless Communications.

[153]  Andrei V. Gurtov,et al.  Security in Software Defined Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[154]  Otto Carlos Muniz Bandeira Duarte,et al.  Orchestrating Virtualized Network Functions , 2015, IEEE Transactions on Network and Service Management.

[155]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[156]  Byrav Ramamurthy,et al.  OpenSec: Policy-Based Security Using Software-Defined Networking , 2016, IEEE Transactions on Network and Service Management.

[157]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[158]  Fabrizio Granelli,et al.  Software defined and virtualized wireless access in future wireless networks: scenarios and standards , 2015, IEEE Communications Magazine.

[159]  Cataldo Basile,et al.  Towards the Dynamic Provision of Virtualized Security Services , 2015, CSP Forum.

[160]  Anat Bremler-Barr,et al.  Deep Packet Inspection as a Service , 2014, CoNEXT.

[161]  Dimitrios P. Pezaros,et al.  Container Network Functions: Bringing NFV to the Network Edge , 2017, IEEE Communications Magazine.

[162]  Azzam Sleit,et al.  Authentication Techniques for the Internet of Things: A Survey , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).

[163]  Anja Feldmann,et al.  OpenSDWN: programmatic control over home and enterprise WiFi , 2015, SOSR.

[164]  Rachid Beghdad,et al.  Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.

[165]  Dominik Samociuk,et al.  Secure gateway for Internet of Things with internal AAA mechanism , 2017 .

[166]  Tarik Taleb,et al.  "Anything as a Service" for 5G Mobile Systems , 2016, IEEE Network.

[167]  Vishwapathi Rao Tadinada Software Defined Networking: Redefining the Future of Internet in IoT and Cloud Era , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[168]  Saswati Sarkar,et al.  Maximum Damage Battery Depletion Attack in Mobile Sensor Networks , 2011, IEEE Transactions on Automatic Control.

[169]  Ivana Podnar Žarko,et al.  Interoperability and Open-Source Solutions for the Internet of Things , 2015, Lecture Notes in Computer Science.

[170]  Nathalie Mitton,et al.  The design of the gateway for the Cloud of Things , 2017, Ann. des Télécommunications.

[171]  Diaz-Sanchez Daniel,et al.  Proxy re-encryption schemes for IoT and crowd sensing , 2016 .

[172]  Jin Kwak,et al.  Enhanced SDIoT Security Framework Models , 2016, Int. J. Distributed Sens. Networks.

[173]  Yiping Chen,et al.  Migrating to a NFV-based Home Gateway: Introducing a Surrogate vNF approach , 2015, 2015 6th International Conference on the Network of the Future (NOF).

[174]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[175]  Vinayak S. Naik,et al.  A firewall for Internet of Things , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).

[176]  M. Hemanth Kumar,et al.  Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks , 2019 .

[177]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[178]  Sonia Fahmy,et al.  NFV-VITAL: A framework for characterizing the performance of virtual network functions , 2015, 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN).

[179]  Tarik Taleb,et al.  UAV Selection for a UAV-Based Integrative IoT Platform , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[180]  Tarik Taleb,et al.  Virtual security as a service for 5G verticals , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[181]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[182]  Joerg Swetina,et al.  Toward a standardized common M2M service layer platform: Introduction to oneM2M , 2014, IEEE Wireless Communications.

[183]  Bilal R. Al-Kaseem,et al.  SD-NFV as an Energy Efficient Approach for M2M Networks Using Cloud-Based 6LoWPAN Testbed , 2017, IEEE Internet of Things Journal.

[184]  Laura Galluccio,et al.  SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[185]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[186]  Guofei Gu,et al.  CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[187]  Aditya Akella,et al.  OpenNF: enabling innovation in network function control , 2015, SIGCOMM 2015.

[188]  Fabrizio Montesi,et al.  Microservices: Yesterday, Today, and Tomorrow , 2017, Present and Ulterior Software Engineering.

[189]  Haider Abbas,et al.  Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.

[190]  Sanjay Jha,et al.  A Survey of Securing Networks Using Software Defined Networking , 2015, IEEE Transactions on Reliability.

[191]  Xun Wang,et al.  Search-based physical attacks in sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[192]  Tarik Taleb,et al.  Traffic Steering for Service Function Chaining , 2019, IEEE Communications Surveys & Tutorials.

[193]  Tarik Taleb,et al.  Follow-Me Cloud: When Cloud Services Follow Mobile Users , 2019, IEEE Transactions on Cloud Computing.

[194]  Tarik Taleb,et al.  Service-aware network function placement for efficient traffic handling in carrier cloud , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[195]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[196]  Rui Li,et al.  Towards a Low-Cost Remote Memory Attestation for the Smart Grid , 2015, Sensors.

[197]  Aditya Akella,et al.  ECOS: Leveraging Software-Defined Networks to support mobile application offloading , 2012, 2012 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).

[198]  Bruno Trevizan de Oliveira,et al.  TinySDN: Enabling Multiple Controllers for Software-Defined Wireless Sensor Networks , 2014, IEEE Latin America Transactions.

[199]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[200]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.