4.7 Article

ID-Based SDN for the Internet of Things

Journal

IEEE NETWORK
Volume 34, Issue 4, Pages 76-83

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.011.1900380

Keywords

-

Funding

  1. National Key R&D Program of China [2018YFB0803405]
  2. National Natural Science Funds for Distinguished Young Scholar [61825204]
  3. NSFC [61932016]
  4. Beijing Outstanding Young Scientist Program [BJJWZYJH01201910003011]
  5. Beijing National Research Center for Information Science and Technology (BNRist) [BNR2019RC01011]
  6. Huawei Technologies Entrustment Project [HF2019015003]
  7. Key Research and Development Program for Guangdong Province [2019B010136001]
  8. Science and Technology Planning Project Guangdong Province [LZC0023, LZC0024]
  9. National Natural Science Funds [61572278]

Ask authors/readers for more resources

The rapid development of the Internet of Things (IoT) has made impressive achievements, raising a heated discussion about IoT big data, in which data security and privacy issues are key concerns. Due to the ubiquity of IoT, IoT big data has not only brought convenience to people's daily lives, but also increased the potential attack surfaces for cybercriminals. At the same time, considering the characteristics of resource constraints and heterogeneity, with traditional network security solutions it can be difficult to achieve ideal results in the IoT environment, which further exacerbates the challenges faced by IoT big data security. In this case, the advantages introduced by software defined networking (SDN) have the potential to meet the challenges of IoT security risks. To this aim, we propose an ID-based SDN secure network architecture called IBSDN. Different from the traditional SDN solution, IBSDN is committed to providing IoT with endogenous trusted services on the network side by embedding unforgeable terminal identities in the data stream. This network-level trusted service can prevent IoT terminals from consuming restricted resources for the sake of security, providing greater scalability and manageability for network security monitoring.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available