A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks

Read original: arXiv:2408.01303 - Published 8/6/2024 by Charles Oredola, Adnan Ashraf
Total Score

0

A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • The paper presents a systematic mapping study on SDN (Software-Defined Networking) controllers for enhancing security in IoT (Internet of Things) networks.
  • It examines how SDN controllers can be leveraged to improve security in IoT environments.
  • The study explores the current state of research, key research areas, and potential future directions.

Plain English Explanation

The study looks at how SDN controllers can be used to make IoT networks more secure. SDN controllers are the "brains" that manage and control the flow of data in a network. The researchers analyzed existing research to understand how SDN controllers can be designed and deployed to detect, prevent, and mitigate security threats in IoT environments.

This is important because IoT devices, like smart home appliances and industrial sensors, are increasingly being used, but they can be vulnerable to cyberattacks. By using SDN controllers to monitor and control the network, researchers hope to find ways to better secure these IoT systems and protect them from malicious activities.

Technical Explanation

The paper conducts a systematic mapping study to investigate how SDN controllers can be leveraged to enhance security in IoT networks. The researchers followed a rigorous methodology to search, screen, and analyze the existing literature on this topic.

The SDN controller architecture and its integration with IoT systems are first discussed. SDN controllers act as the central control plane, managing and configuring the network infrastructure. This separation of the control and data planes in SDN enables more flexible and programmable network management, which can be beneficial for securing IoT environments.

The study then examines the key research areas that have been explored, such as attack detection, traffic monitoring, and policy enforcement. It identifies the common security threats and challenges addressed, as well as the various SDN controller platforms and techniques that have been investigated.

Critical Analysis

The paper provides a comprehensive overview of the current research on using SDN controllers to enhance security in IoT networks. However, it also acknowledges the limitations of the existing studies, such as the focus on specific use cases or the lack of real-world deployments and validation.

The researchers note that further research is needed to address issues like scalability, interoperability, and resource constraints in IoT environments. Additionally, the paper suggests exploring the integration of emerging technologies, such as machine learning and blockchain, to further enhance the security capabilities of SDN-based IoT systems.

Conclusion

This systematic mapping study provides a comprehensive understanding of the current research landscape on using SDN controllers to improve security in IoT networks. The findings highlight the potential of this approach and the various security-related functionalities that have been explored. However, the study also identifies areas for future research to address the remaining challenges and further advance the field. Overall, the paper offers valuable insights for researchers and practitioners interested in enhancing the security of IoT systems through SDN-based solutions.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks
Total Score

0

A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks

Charles Oredola, Adnan Ashraf

Context: The increase in Internet of Things (IoT) devices gives rise to an increase in deceptive manipulations by malicious actors. These actors should be prevented from targeting the IoT networks. Cybersecurity threats have evolved and become dynamically sophisticated, such that they could exploit any vulnerability found in IoT networks. However, with the introduction of the Software Defined Network (SDN) in the IoT networks as the central monitoring unit, IoT networks are less vulnerable and less prone to threats. %Although, the SDN itself is vulnerable to several threats. Objective: To present a comprehensive and unbiased overview of the state-of-the-art on IoT networks security enhancement using SDN controllers. Method: We review the current body of knowledge on enhancing the security of IoT networks using SDN with a Systematic Mapping Study (SMS) following the established guidelines. Results: The SMS result comprises 33 primary studies analyzed against four major research questions. The SMS highlights current research trends and identifies gaps in the SDN-IoT network security. Conclusion: We conclude that the SDN controller architecture commonly used for securing IoT networks is the centralized controller architecture. However, this architecture is not without its limitations. Additionally, the predominant technique utilized for risk mitigation is machine learning.

Read more

8/6/2024

Security Evaluation in Software-Defined Networks
Total Score

0

Security Evaluation in Software-Defined Networks

Igor Ivki'c, Dominik Thiede, Nicholas Race, Matthew Broadbent, Antonios Gouglidis

Cloud computing has grown in importance in recent years which has led to a significant increase in Data Centre (DC) network requirements. A major driver of this change is virtualisation, which allows computing resources to be deployed on a large scale. However, traditional DCs, with their network topology and proliferation of network endpoints, are struggling to meet the flexible, centrally managed requirements of cloud computing applications. Software-Defined Networks (SDN) promise to offer a solution to these growing networking requirements by separating control functions from data routing. This shift adds more flexibility to networks but also introduces new security issues. This article presents a framework for evaluating security of SDN architectures. In addition, through an experimental study, we demonstrate how this framework can identify the threats and vulnerabilities, calculate their risks and severity, and provide the necessary measures to mitigate them. The proposed framework helps administrators to evaluate SDN security, address identified threats and meet network security requirements.

Read more

8/22/2024

🖼️

Total Score

0

Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks

David Candal-Ventureira, Pablo Fondo-Ferreiro, Felipe Gil-Casti~neira, Francisco Javier Gonz'alez-Casta~no

The unstoppable adoption of the Internet of Things (IoT) is driven by the deployment of new services that require continuous capture of information from huge populations of sensors, or actuating over a myriad of smart objects. Accordingly, next generation networks are being designed to support such massive numbers of devices and connections. For example, the 3rd Generation Partnership Project (3GPP) is designing the different 5G releases specifically with IoT in mind. Nevertheless, from a security perspective this scenario is a potential nightmare: the attack surface becomes wider and many IoT nodes do not have enough resources to support advanced security protocols. In fact, security is rarely a priority in their design. Thus, including network-level mechanisms for preventing attacks from malware-infected IoT devices is mandatory to avert further damage. In this paper, we propose a novel Software-Defined Networking (SDN)-based architecture to identify suspicious nodes in 4G or 5G networks and redirect their traffic to a secondary network slice where traffic is analyzed in depth before allowing it reaching its destination. The architecture can be easily integrated in any existing deployment due to its interoperability. By following this approach, we can detect potential threats at an early stage and limit the damage by Distributed Denial of Service (DDoS) attacks originated in IoT devices.

Read more

4/1/2024

Software-based Security Framework for Edge and Mobile IoT
Total Score

0

Software-based Security Framework for Edge and Mobile IoT

Jos'e Cec'ilio, Alan Oliveira de S'a, Andr'e Souto

With the proliferation of Internet of Things (IoT) devices, ensuring secure communications has become imperative. Due to their low cost and embedded nature, many of these devices operate with computational and energy constraints, neglecting the potential security vulnerabilities that they may bring. This work-in-progress is focused on designing secure communication among remote servers and embedded IoT devices to balance security robustness and energy efficiency. The proposed approach uses lightweight cryptography, optimizing device performance and security without overburdening their limited resources. Our architecture stands out for integrating Edge servers and a central Name Server, allowing secure and decentralized authentication and efficient connection transitions between different Edge servers. This architecture enhances the scalability of the IoT network and reduces the load on each server, distributing the responsibility for authentication and key management.

Read more

4/10/2024