2020
DOI: 10.3390/s20133622
|View full text |Cite
|
Sign up to set email alerts
|

Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems

Abstract: IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies, thereby strengthening their overall flexibility, security and resilience. In this sense, adaptive and policy-based security frameworks for SDN/NFV-aware IoT systems can provide a remarkable added value for self-protection and self-healing, by orchestrating and enforcing dynamically security policies and associated Virtual Network Functions (VNF) or Virtual network Security Functions… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…In [46], the authors introduce a security orchestration framework that is both semanticaware and policy-driven. This framework is designed for orchestrating security measures autonomously in softwarized IoT networks, with a specific focus on ensuring conflict-free security orchestration while optimizing the allocation of security VNFs.…”
Section: Network Softwarization For Iotmentioning
confidence: 99%
“…In [46], the authors introduce a security orchestration framework that is both semanticaware and policy-driven. This framework is designed for orchestrating security measures autonomously in softwarized IoT networks, with a specific focus on ensuring conflict-free security orchestration while optimizing the allocation of security VNFs.…”
Section: Network Softwarization For Iotmentioning
confidence: 99%
“…• Flexibility in Security Policy Implementation: By allowing new functionalities to be developed as policies, RINA offers a high degree of flexibility in implementing and updating security measures. This can be especially beneficial in the rapidly evolving landscape of IoT security, where new threats and vulnerabilities often emerge [44]. • Reduction of Functional Redundancies: The ability to plug in policies into existing mechanisms can help reduce functional redundancies in protocols.…”
Section: Programmable Difsmentioning
confidence: 99%
“…A semantic aware, zero-touch and policy-driven security orchestration framework in SDN/NFV aware IoT scenarios for automatic and conflict-less security orchestration is proposed in [18]. The proposed framework ensures the optimal allocation and the service function chaining (SFC)s [19] of the virtual security functions (VSFs).…”
Section: Related Work -Security Orchestrationmentioning
confidence: 99%
“…When considering the E2E latency of a particular network slice, it depends on two parameters: service delay and propagation delay [18]. Service delay considers the processing time of the data sent by a source VNF at the destination VNF.…”
Section: B System Constraints Of the Proposed Modelmentioning
confidence: 99%