ID-Based SDN for the Internet of Things

The rapid development of the Internet of Things (IoT) has made impressive achievements, raising a heated discussion about IoT big data, in which data security and privacy issues are key concerns. Due to the ubiquity of IoT, IoT big data has not only brought convenience to people's daily lives, but also increased the potential attack surfaces for cybercriminals. At the same time, considering the characteristics of resource constraints and heterogeneity, with traditional network security solutions it can be difficult to achieve ideal results in the IoT environment, which further exacerbates the challenges faced by IoT big data security. In this case, the advantages introduced by software defined networking (SDN) have the potential to meet the challenges of IoT security risks. To this aim, we propose an ID-based SDN secure network architecture called IBSDN. Different from the traditional SDN solution, IBSDN is committed to providing IoT with endogenous trusted services on the network side by embedding unforgeable terminal identities in the data stream. This network-level trusted service can prevent IoT terminals from consuming restricted resources for the sake of security, providing greater scalability and manageability for network security monitoring.

[1]  Ke Xu,et al.  Toward software defined smart home , 2016, IEEE Communications Magazine.

[2]  Wei Fan,et al.  Mining big data: current status, and forecast to the future , 2013, SKDD.

[3]  Yonggang Wen,et al.  Toward Scalable Systems for Big Data Analytics: A Technology Tutorial , 2014, IEEE Access.

[4]  Ke Xu,et al.  Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks , 2020, IEEE Transactions on Vehicular Technology.

[5]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[6]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[7]  Srinivasan Seshan,et al.  Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.

[8]  Saswati Sarkar,et al.  Maximum Damage Battery Depletion Attack in Mobile Sensor Networks , 2011, IEEE Transactions on Automatic Control.

[9]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[10]  Kwangjo Kim,et al.  Security and Privacy on Authentication Protocol for Low-cost RFID , 2005 .

[11]  Ke Xu,et al.  GreenLink: An Energy Efficient Scatternet Formation for BLE Devices , 2018, Wirel. Commun. Mob. Comput..

[12]  Ke Xu,et al.  SmartFix: Indoor Locating Optimization Algorithm for Energy-Constrained Wearable Devices , 2017, Wirel. Commun. Mob. Comput..

[13]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[14]  M. Hilbert,et al.  Big Data for Development: A Review of Promises and Challenges , 2016 .

[15]  Ayman I. Kayssi,et al.  IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.