4.8 Article

SDN-Enabled Secure IoT Architecture

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 8, Pages 6549-6564

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3043740

Keywords

Security; Internet of Things; Computer architecture; Protocols; Malware; Logic gates; Authentication; Internet of Things (IoT) security; IoT authentication and access control; policy-based secure IoT architecture; software-defined network (SDN) security

Funding

  1. Data61/CSIRO with Partial Top-Up Scholarship

Ask authors/readers for more resources

The article presents a security architecture for IoT networks leveraging SDN features, which includes authentication, authorization, and fine-grained traffic control to protect IoT networks from malicious devices and attacks. The integrated security approach involves authentication of IoT devices and enables authorized flows to safeguard IoT networks effectively.
The Internet of Things (IoT) is increasingly being used in applications ranging from precision agriculture to critical national infrastructure by deploying a large number of resource-constrained devices in hostile environments. These devices are being exploited to launch attacks in cyber systems. As a result, security has become a significant concern in the design of IoT-based applications. In this article, we present a security architecture for IoT networks by leveraging the underlying features supported by software-defined networks (SDNs). Our security architecture not only restricts network access to authenticated IoT devices but also enforces fine granular policies to secure the flows in the IoT network infrastructure. The authentication is achieved using a lightweight protocol to authenticate IoT devices. Authorization is achieved using a dynamic policy driven approach. Such an integrated security approach involving authentication of IoT devices and enables authorized flows to protect IoT networks from malicious IoT devices and attacks. We have implemented and validated our architecture using ONOS SDN Controller and Raspbian Virtual Machines, and demonstrated how the proposed security mechanisms can counteract malware packet injection, DDoS attacks using Mirai, spoofing/masquerading, and man-in-the-middle attacks. An analysis of the security and performance of the proposed security mechanisms and their applications is presented in this article.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available