4.7 Article

ID-Based SDN for the Internet of Things

期刊

IEEE NETWORK
卷 34, 期 4, 页码 76-83

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.011.1900380

关键词

-

资金

  1. National Key R&D Program of China [2018YFB0803405]
  2. National Natural Science Funds for Distinguished Young Scholar [61825204]
  3. NSFC [61932016]
  4. Beijing Outstanding Young Scientist Program [BJJWZYJH01201910003011]
  5. Beijing National Research Center for Information Science and Technology (BNRist) [BNR2019RC01011]
  6. Huawei Technologies Entrustment Project [HF2019015003]
  7. Key Research and Development Program for Guangdong Province [2019B010136001]
  8. Science and Technology Planning Project Guangdong Province [LZC0023, LZC0024]
  9. National Natural Science Funds [61572278]

向作者/读者索取更多资源

The rapid development of the Internet of Things (IoT) has made impressive achievements, raising a heated discussion about IoT big data, in which data security and privacy issues are key concerns. Due to the ubiquity of IoT, IoT big data has not only brought convenience to people's daily lives, but also increased the potential attack surfaces for cybercriminals. At the same time, considering the characteristics of resource constraints and heterogeneity, with traditional network security solutions it can be difficult to achieve ideal results in the IoT environment, which further exacerbates the challenges faced by IoT big data security. In this case, the advantages introduced by software defined networking (SDN) have the potential to meet the challenges of IoT security risks. To this aim, we propose an ID-based SDN secure network architecture called IBSDN. Different from the traditional SDN solution, IBSDN is committed to providing IoT with endogenous trusted services on the network side by embedding unforgeable terminal identities in the data stream. This network-level trusted service can prevent IoT terminals from consuming restricted resources for the sake of security, providing greater scalability and manageability for network security monitoring.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据