An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security

被引:185
作者
Iqbal, Waseem [1 ]
Abbas, Haider [1 ]
Daneshmand, Mahmoud [2 ]
Rauf, Bilal [1 ]
Bangash, Yawar Abbas [1 ]
机构
[1] Natl Univ Sci & Technol, Dept Informat Secur, Islamabad 44000, Pakistan
[2] Stevens Inst Technol, Sch Engn & Sci, Hoboken, NJ 07030 USA
关键词
Internet of Things (IoT) security; software-defined networking (SDN); SDN-IoT; software-defined security (SDSec); DATA AGGREGATION SCHEME; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; FORENSICS CHALLENGES; NETWORK ARCHITECTURE; INTERNET; PRIVACY; SDN; THINGS; ATTESTATION;
D O I
10.1109/JIOT.2020.2997651
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is transforming everyone's life by providing features, such as controlling and monitoring of the connected smart objects. IoT applications range over a broad spectrum of services including smart cities, homes, cars, manufacturing, e-healthcare, smart control system, transportation, wearables, farming, and much more. The adoption of these devices is growing exponentially, that has resulted in generation of a substantial amount of data for processing and analyzing. Thus, besides bringing ease to the human lives, these devices are susceptible to different threats and security challenges, which do not only worry the users for adopting it in sensitive environments, such as e-health, smart home, etc., but also pose hazards for the advancement of IoT in coming days. This article thoroughly reviews the threats, security requirements, challenges, and the attack vectors pertinent to IoT networks. Based on the gap analysis, a novel paradigm that combines a network-based deployment of IoT architecture through software-defined networking (SDN) is proposed. This article presents an overview of the SDN along with a thorough discussion on SDN-based IoT deployment models, i.e., centralized and decentralized. We further elaborated SDN-based IoT security solutions to present a comprehensive overview of the software-defined security (SDSec) technology. Furthermore, based on the literature, core issues are highlighted that are the main hurdles in unifying all IoT stakeholders on one platform and few findings that emphases on a network-based security solution for IoT paradigm. Finally, some future research directions of SDN-based IoT security technologies are discussed.
引用
收藏
页码:10250 / 10276
页数:27
相关论文
共 180 条
[1]   C-FLAT: Control-Flow Attestation for Embedded Systems Software [J].
Abera, Tigist ;
Asokan, N. ;
Davi, Lucas ;
Ekberg, Jan-Erik ;
Nyman, Thomas ;
Paverd, Andrew ;
Sadeghi, Ahmad-Reza ;
Tsudik, Gene .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :743-754
[2]  
Abera Tigist., 2016, P 53 ANN DESIGN AUTO, P121
[3]  
AbuHmed T, 2009, GLOB TELECOMM CONF, P4680
[4]  
Aftab H., DIGIT COMMUN NETW
[5]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[6]   Anonymous authentication for privacy-preserving IoT target-driven applications [J].
Alcaide, Almudena ;
Palomar, Esther ;
Montero-Castillo, Jose ;
Ribagorda, Arturo .
COMPUTERS & SECURITY, 2013, 37 :111-123
[7]   Security of Software Defined Networks: A survey [J].
Alsmadr, Izzat ;
Xu, Dianxiang .
COMPUTERS & SECURITY, 2015, 53 :79-108
[8]   SANA: Secure and Scalable Aggregate Network Attestation [J].
Ambrosin, Moreno ;
Conti, Mauro ;
Ibrahim, Ahmad ;
Neven, Gregory ;
Sadeghi, Ahmad-Reza ;
Schunter, Matthias .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :731-742
[9]   NetKAT: Semantic Foundations for Networks [J].
Anderson, Carolyn Jane ;
Foster, Nate ;
Guha, Arjun ;
Jeannin, Jean-Baptiste ;
Kozen, Dexter ;
Schlesinger, Cole ;
Walker, David .
ACM SIGPLAN NOTICES, 2014, 49 (01) :113-126
[10]  
[Anonymous], 2017, CHANG DRIV LAWS SUPP