2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) 2019
DOI: 10.1109/percomw.2019.8730724
|View full text |Cite
|
Sign up to set email alerts
|

IoT-NetSec: Policy-Based IoT Network Security Using OpenFlow

Abstract: Along with widespread adoption of the Internet of Things (IoT), concerns about IoT security have been highlighted in numerous reports. Recently, there have been proposal to leverage software-defined networking (SDN) to augment IoT device security with network-level measures. We argue that existing general-purpose security solutions using SDN are impractical for supporting today's home and corporate networks. This paper proposes a policy-based networklayer framework, called IOT-NETSEC, that provides a finegrain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…Survey papers [1], [19], [20], [45], [42], [5], [6], [38], [18], [3] [7], [179], [181], [185] Security OpenFlow Survey papers…”
Section: Load Balancingmentioning
confidence: 99%
See 1 more Smart Citation
“…Survey papers [1], [19], [20], [45], [42], [5], [6], [38], [18], [3] [7], [179], [181], [185] Security OpenFlow Survey papers…”
Section: Load Balancingmentioning
confidence: 99%
“…2) Proposed Framework: In [185], authors proposed an IoT-NETSEC framework based on SDN technology consisting of the following building blocks: device policy repository, IoT device registration, security flow role installer, statistic collector. The proposed framework monitors the traffic of IoT devices across the network to ensure three basic rules: only approved communications are allowed and everything else is denied, monitor the network traffic, and protect the IoT device against three attacks such as port scanning DOS, DDOS.…”
Section: B Framework For Iot Virtualization Via Openflowmentioning
confidence: 99%
“…The analysis is carried out by comparing the conventional IoT based environment and the proposed SDN based IoT environment. However, for an effective benchmarking, the study outcome is compared with standard OpenFlow based security protocol [30] and recent work carried out by Yin et al [31] towards resisting denial of service attack termed as DaD in this analysis. The work carried out by Nobakht et al [30] has developed a policy-based flow monitoring system where OpenFlow is used for security.…”
Section: Evaluate Traffic Flowmentioning
confidence: 99%
“…However, for an effective benchmarking, the study outcome is compared with standard OpenFlow based security protocol [30] and recent work carried out by Yin et al [31] towards resisting denial of service attack termed as DaD in this analysis. The work carried out by Nobakht et al [30] has developed a policy-based flow monitoring system where OpenFlow is used for security. The approach presented by Yin et al [31] has used a concept of where different components of SDN and IoT are linked together using gateway while a similar-based approach (Cosine) is applied for assessing the inbound packet flow for assessing vulnerability.…”
Section: Evaluate Traffic Flowmentioning
confidence: 99%
See 1 more Smart Citation