SODA: A software-defined security framework for IoT environments

被引:22
作者
Kim, Yeonkeun [1 ]
Nam, Jaehyun [1 ]
Park, Taejune [1 ]
Scott-Hayward, Sandra [2 ]
Shin, Seungwon [1 ]
机构
[1] Korea Adv Inst Sci & Technol, 291 Daehak Ro, Daejeon 34141, South Korea
[2] Queens Univ Belfast, Univ Rd, Belfast BT7 1NN, Antrim, North Ireland
基金
英国工程与自然科学研究理事会;
关键词
IoT security; Software-defined networking; Network function virtualization; Access control; INTERNET; SYSTEM;
D O I
10.1016/j.comnet.2019.106889
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT), based on interconnected devices, enables a variety of elegant new services that could not be realized in a traditional environment, and many of these services harvest the information of a potentially sensitive and private nature belonging to individual users. Unfortunately, existing security functions used to protect such information are difficult to implement in an IoT environment due to the widely varying capacities, functionalities, and security requirements of IoT devices. In this work, to protect against unrestricted accesses to other devices and information extortion from these devices, we propose SODA, a secure IoT gateway that enables a device-side dynamic access control and is capable of deploying various security services to protect sensitive and private information. To show its effectiveness and practicality, we assume that a large number of IoT devices are crowded around an IoT gateway, and we implement a prototype of SODA for such an environment based on software-defined-networking (SDN) and integrate virtual network functions (VNFs) over network function virtualization (NFV) on top of a real IoT device. From our evaluation, we demonstrate how SODA mitigates real-world attacks through its security functions, and presents how it satisfies the performance requirements of a real environment. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:13
相关论文
共 37 条
[1]  
ABADI M, 1992, LECT NOTES COMPUT SC, V576, P1
[2]   Access Control in a Core Calculus of Dependency [J].
Abadi, Martin .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 172 (5-31) :5-31
[3]  
[Anonymous], 2012, P 9 USENIX C NETW SY
[4]  
[Anonymous], 2015, P 14 ACM WORKSH HOT
[5]  
[Anonymous], 2012, CISC VIS NETW IND GL
[6]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[7]  
Babar S, 2010, COMM COM INF SC, V89, P420
[8]  
Deri L, 2014, INT WIREL COMMUN, P617, DOI 10.1109/IWCMC.2014.6906427
[9]  
Dhanjani N., 2015, ABUSING INTERNET THI
[10]  
ETSI, 2012, White paper