Security Function Virtualization for IoT Applications in 6G Networks

被引:7
作者
Aman M.N. [1 ]
Javaid U. [1 ]
Sikdar B. [1 ]
机构
[1] Aman, Muhammad Naveed
[2] Javaid, Uzair
[3] Sikdar, Biplab
来源
| 1600年 / Institute of Electrical and Electronics Engineers Inc.卷 / 05期
关键词
D O I
10.1109/MCOMSTD.201.2100023
中图分类号
学科分类号
摘要
One of the important characteristics envisioned for 6G is security function virtualization (SFV). Similar to network function virtualization (NFV) in 5G networks, SFV provides new opportunities for improving security while reducing the security overhead. In particular, it provides an attractive way of solving compatibility issues related to security. Malware in Internet of Things (IoT) systems is gaining popularity among cyber-criminals because of the expected number of IoT devices in 5G and 6G networks. To solve this issue, this article proposes a security framework that exploits softwarization of security functions via SFV to improve trust in IoT systems and contain the propagation of malware. IoT devices are categorized into trusted, vulnerable, and compromised levels using remote attestation. To isolate the devices in the three distinct categories, NFV is used to create separate networks for each category, and a distributed ledger is used to store the state of each device. Virtualized remote attestation routines are employed to avoid any compatibility issues among heterogeneous IoT devices and effectively contain malware propagation. The results show that the proposed framework can reduce the number of infected devices by 66 percent in only 10 seconds. © 2017 IEEE.
引用
收藏
页码:90 / 95
页数:5
相关论文
共 15 条
[1]  
Mollah M.B., Et al., Blockchain for the internet of vehicles towards intelligent transportation systems: A survey, Ieee Internet of Things J., 8, 6, pp. 4157-4185, (2021)
[2]  
Ul Hassan N., Yuen C., Niyato D., Blockchain technologies for smart energy systems: Fundamentals, challenges, and solutions, Ieee Industrial Electronics Mag., 13, 4, pp. 106-118, (2019)
[3]  
Cheng S., Et al., Traffi c-Aware patching for cyber security in mobile iot, Ieee Commun. Mag., 55, 7, pp. 29-35, (2017)
[4]  
Pa Y.M.P., Et al., Iotpot: Analysing the rise of iot compromises, Proc. 9th Usenix Wksp. Off Ensive Technologies, (2015)
[5]  
Ronen E., Shamir A., Extended functionality attacks on iot devices: The case of smart lights, Proc. 2016 Ieee Euro. Symp. Security and Privacy, pp. 3-12, (2016)
[6]  
Aman M.N., Et al., Hatt: Hybrid remote attestation for the internet of things with high availability, Ieee Internet of Things J., 7, 8, pp. 7220-7233, (2020)
[7]  
Aman M.N., Basheer M.H., Sikdar B., Two-factor authentication for iot with location information, Ieee Internet of Things J., 6, 2, pp. 3335-3351, (2019)
[8]  
Aman M.N., Sikdar B., Att-Auth: A hybrid protocol for industrial iot attestation with authentication, Ieee Internet of Things J., 5, 6, pp. 5119-5131, (2018)
[9]  
Chen N., Okada M., Towards 6g internet of things and the convergence with rof system, Ieee Internet of Things J, pp. 1-1, (2020)
[10]  
Peng S., Yu S., Yang A., Smartphone malware and its propagation modeling: A survey, Ieee Commun. Surveys & Tutorials, 16, 2, pp. 925-941, (2014)