Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN)
Abstract
:1. Introduction
2. IoT and SDN
- (i)
- Hardware—the network of connected, sensors embedded objects/devices;
- (ii)
- Software—program used for data collection, storage, transporting, processing, devices instructions;
- (iii)
- Data communication—the protocols and technologies for exchange data.
2.1. Applications of Internet of Things
2.2. Architecture of Internet of Things
- Perception/sensing layer;
- Networking/transport layer;
- Service/management layer;
2.3. Internet of Things Security Concerns
- Weak guessable, or hardcoded passwords;
- Insecure network services;
- Insecure ecosystem interfaces;
- Lack of secure update mechanism;
- Use of insecure or outdated components;
- Insufficient privacy protection;
- Insecure data transfer and storage;
- Lack of device management;
- Insecure default settings;
- Lack of physical hardening.
2.4. Software Defined Networking (SDN)
3. System Model
3.1. System Implementation
3.2. Man-in-the-Middle: Problem and Solution
3.3. Traffic Separation
4. System Evaluation
4.1. Attack Test Results
4.2. Performance Evaluation
5. Comparison and Future Work
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Gan, G.; Lu, Z.; Jiang, J. Internet of Things Security Analysis. In Proceedings of the 2011 International Conference on Internet Technology and Applications, Wuhan, China, 16–18 August 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 1–4. [Google Scholar]
- Software-Defined Networking: The New Norm for Networks. Available online: https://www.opennetworking.org/images/stories/downloads/sdn-resources/white-papers/wp-sdn-newnorm.pdf (accessed on 5 January 2020).
- Tariq, J.; Riaz, T.; Rasheed, A. A Layer2 Firewall for Software Defined Network. In Proceedings of the 2014 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi, Pakistan, 12–13 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 39–42. [Google Scholar]
- Michelle, S.; Park, S.H.; Lee, B.; Yang, S. Building Firewall over the Software-Defined Network Controller. In Proceedings of the 16th International Conference on Advanced Communication Technology, Chennal, India, 27–28 February 2013; IEEE: Piscataway, NJ, USA, 2014; pp. 744–748. [Google Scholar]
- Pena, J.G.V.; Yu, W.E. Development of a Distributed Firewall Using Software Defined Networking Technology. In Proceedings of the 2014 4th IEEE International Conference on Information Science and Technology, Busab, Korea, 26 February–1 March 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 449–452. [Google Scholar]
- Rolbin, M. Early Detection of Network Threats Using Software Defined Network (SDN) and Virtualization. Master’s Thesis, Carleton University, Ottawa, OT, Canada, 2013. [Google Scholar]
- Sood, K.; Yu, S.; Xiang, Y. Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A review. IEEE Int. Things J. 2015, 3, 453–463. [Google Scholar] [CrossRef]
- Zhijing, Q.; Denker, G.; Giannelli, C.; Bellavista, P.; Venkatasubramanian, N. A Software Defined Networking Architecture for the Internet-of-Things. In Proceedings of the 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 5–9 May 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1–9. [Google Scholar]
- Yaser, J.; Al-Ayyoub, M.; Benkhelifa, E.; Vouk, M.; Rindos, A. SDIoT: A software defined based internet of things framework. J. Ambient. Intell. Humaniz. Comput. 2015, 6, 453–461. [Google Scholar]
- Liu, J.; Li, Y.; Chen, M.; Dong, W.; Jin, D. Software-defined internet of things for smart urban sensing. IEEE Commun. Mag. 2015, 53, 55–63. [Google Scholar] [CrossRef]
- Salman, O.; Abdallah, S.; Elhajj, I.H.; Chehab, A.; Kayssi, A. Identity-Based Authentication Scheme for the Internet of Things. In Proceedings of the 2016 IEEE Symposium on Computers and Communication (ISCC), Wrocław, Poland, 7–9 September 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1109–1111. [Google Scholar]
- Chakrabarty, S.; Engels, D.W.; Thathapudi, S. Black SDN for the Internet of Things. In Proceedings of the 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, Dallas, TX, USA, 19–22 October 2015; IEEE: Piscataway, NJ, USA; pp. 190–198. [Google Scholar]
- Theodorou, T.; Violettas, G.; Valsamas, P.; Petridou, S.; Mamatas, L. A Multi-Protocol Software-Defined Networking Solution for the Internet of Things. IEEE Commun. Mag. 2019, 57, 42–48. [Google Scholar] [CrossRef]
- Tran, A.K.; Piran, M.; Pham, C. SDN Controller Placement in IoT Networks: An Optimized Submodularity-Based Approach. Sensors 2019, 19, 5474. [Google Scholar] [CrossRef] [Green Version]
- Molina Zarca, A.; Garcia-Carrillo, D.; Bernal Bernabe, J.; Ortiz, J.; Marin-Perez, R.; Skarmeta, A. Enabling virtual AAA management in SDN-based IoT networks. Sensors 2019, 19, 295. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Lu, Y.; Ling, Z.; Zhu, S.; Tang, L. SDTCP: Towards datacenter TCP congestion control with SDN for IoT applications. Sensors 2017, 17, 109. [Google Scholar] [CrossRef] [PubMed]
- Zhang, A.; Lin, X. Security-Aware and Privacy-Preserving D2D Communications in 5G. IEEE Netw. 2017, 31, 70–77. [Google Scholar] [CrossRef]
- Raspberry pi—Teach, Learn, and Make with Raspberry pi. Available online: https://www.raspberrypi.org/ (accessed on 5 January 2020).
- Kodi j Open Source Home Theatre Software. Available online: http://kodi.tv/ (accessed on 5 January 2020).
- Overview of the Internet of Things. Available online: https://www.itu.int/rec/T-REC-Y.2060–201206-I (accessed on 5 January 2020).
- Szymanski, T.H. Security and privacy for a green internet of things. IT Prof. 2017, 19, 34–41. [Google Scholar] [CrossRef]
- Alam, T. A Reliable Communication Framework and Its Use in Internet of Things (IoT). Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2018, 2456–3307. [Google Scholar]
- Jing, Q.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the Internet of Things: Perspectives and challenges. Wireless Netw. 2014, 20, 2481–2501. [Google Scholar] [CrossRef]
- Ning, H.; Liu, H.; Yang, L.T. Cyberentity security in the internet of things. Computer 2013, 46, 46–53. [Google Scholar] [CrossRef]
- Palan, V. National Privacy Day Panel: Driving Privacy and Security in IoT. Available online: https://www.intertrust.com/intertrustblog/national-privacy-day-panel-driving-privacy-and-security-in-iot/ (accessed on 5 January 2020).
- Dhanjani, N. Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2015. [Google Scholar]
- Leswing, K. A massive cyberattack knocked out major websites across the internet. Available online: https://www.businessinsider.com/amazon-spotify-twitter-github-and-etsy-down-in-apparent-dns-attack-2016-10?r=UK (accessed on 5 January 2020).
- Hu, F. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations; CRC Press: Boca Raton, FL, USA, 2016. [Google Scholar]
- OWASP Internet of Things Project. Available online: https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Top_10 (accessed on 5 January 2020).
- Bizanis, N.; Kuipers, F.A. SDN and virtualization solutions for the Internet of Things: A survey. IEEE Access 2016, 4, 5591–5606. [Google Scholar] [CrossRef]
- Kalkan, K.; Zeadally, S. Securing internet of things with software defined networking. IEEE Commun. Mag. 2017, 56, 186–192. [Google Scholar] [CrossRef]
- Nobakht, M.; Sivaraman, V.; Boreli, R. A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT using OpenFlow. In Proceedings of the IEEE 11th International. Conference Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2016; pp. 147–156. [Google Scholar]
- Bull, P.; Austin, R.; Popov, E.; Sharma, M.; Watson, R. Flow Based Security for IoT Devices Using an SDN Gateway. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 157–163. [Google Scholar]
- Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks. Available online: https://hotforsecurity.bitdefender.com/blog/kodi-media-center-vulnerability-exposes-users-to-man-in-the-middle-attacks-12065.html (accessed on 5 January 2020).
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Mininet: An Instant Virtual Network on Your Laptop (or Other PC). Available online: http://mininet.org/ (accessed on 5 January 2020).
- Mitmproxy. Available online: https://mitmproxy.org/ (accessed on 5 January 2020).
- ROOT. Available online: http://mirrors.kodi.tv/ (accessed on 5 January 2020).
- Open vSwitch. Available online: https://openvswitch.org/ (accessed on 5 January 2020).
- OpenSSL. Available online: https://www.openssl.org (accessed on 5 January 2020).
- Polverini, M.; Galán-Jiménez, J.; Lavacca, F.G.; Cianfrani, A.; Eramo, V. Dynamic In-Network Classification for Service Function Chaining ready SDN Networks. In Proceedings of the 2019 10th International Conference on the Network of the Future (NoF 1019), Rome, Italy, 1–3 October 2019. [Google Scholar]
Layer | Function |
---|---|
Application, interface layer | Presenting, user’s interaction Business applications |
Service, management layer | Data processing, analyzing Generating useful information |
Networking, transport layer | Data transmission over wire or wireless network |
Perception, sensing layer | Hardware integration Identifying, collecting data |
Case No. | Fake Certificate | Fake File | Fake Hash | HTTP | HTTPS W/Proxy | |
---|---|---|---|---|---|---|
From Attacker | 1 | No | No | No | Failed | Failed |
2 | Yes | No | No | Succeed | Failed | |
3 | No | Yes | No | Failed | Failed | |
4 | No | No | Yes | Failed | Failed | |
5 | Yes | Yes | No | Failed | Failed | |
6 | Yes | No | Yes | Failed | Failed | |
7 | No | Yes | Yes | Succeed | Failed | |
8 | Yes | Yes | Yes | Succeed | Failed |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Al Hayajneh, A.; Bhuiyan, M.Z.A.; McAndrew, I. Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN). Computers 2020, 9, 8. https://doi.org/10.3390/computers9010008
Al Hayajneh A, Bhuiyan MZA, McAndrew I. Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN). Computers. 2020; 9(1):8. https://doi.org/10.3390/computers9010008
Chicago/Turabian StyleAl Hayajneh, Abdullah, Md Zakirul Alam Bhuiyan, and Ian McAndrew. 2020. "Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN)" Computers 9, no. 1: 8. https://doi.org/10.3390/computers9010008
APA StyleAl Hayajneh, A., Bhuiyan, M. Z. A., & McAndrew, I. (2020). Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN). Computers, 9(1), 8. https://doi.org/10.3390/computers9010008