Analysis of attacks on device manager in software-defined Internet of Things

被引:1
作者
Tri-Hai Nguyen [1 ]
Yoo, Myungsik [1 ,2 ]
机构
[1] Soongsil Univ, Dept ICMC Convergence Technol, Seoul, South Korea
[2] Soongsil Univ, Sch Elect Engn, 369 Sangdo Ro, Seoul 06978, South Korea
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2017年 / 13卷 / 08期
关键词
Internet of Things; software-defined networking; device manager; security; vulnerability;
D O I
10.1177/1550147717728681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is a network of physical devices consisting of embedded systems and sensors that interact with each other and connect to the Internet, and the quick growth of the Internet of Things industry has resulted in complex inter-networking on the Internet. Software-defined networking is a recent advance in computer networking that redefines the network paradigm for future communication, and the advantages of software-defined networking can also be applied to Internet of Things, namely as software-defined Internet of Things. In this article, we investigate the vulnerability of the software-defined Internet of Things platform device manager, which monitors the connected Internet of Things devices in the network. Although being the one that performs one of the most crucial services, the device managers in current primary controllers have a big security issue as they do not include any device verification, authentication, or authorization routines. Consequently, the device manager accepts all the changes of device information made by other devices, which leads to potential attacks as demonstrated in this article. To address this problem, a comprehensive and lightweight countermeasure is proposed and its effectiveness is verified through experiments.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 20 条
  • [1] Akyildiz I.F, 2012, IEEE COMMUN MAG, P102
  • [2] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [3] [Anonymous], 2008, WORLD ACAD SCI ENG T
  • [4] [Anonymous], 2003, Understanding PKI: concepts, standards, and deployment considerations
  • [5] [Anonymous], 2014, 2014 IEEE NETW OP MA
  • [6] [Anonymous], 2015, P NETW DISTR SYST SE
  • [7] [Anonymous], 2009, INFOCOM Keynote Talk
  • [8] A secure and efficient one-time password authentication scheme for WSN
    Ling C.-H.
    Lee C.-C.
    Yang C.-C.
    Hwang M.-S.
    [J]. Hwang, Min-Shiang (mshwang@ asia. edu.tw), 1600, Femto Technique Co., Ltd. (19): : 177 - 181
  • [9] Evans D., 2011, The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, V1, P1
  • [10] Galluccio L, 2015, IEEE CONF COMPUT, P19, DOI 10.1109/INFCOMW.2015.7179322