2019
DOI: 10.1016/j.comnet.2019.106889
|View full text |Cite
|
Sign up to set email alerts
|

SODA: A software-defined security framework for IoT environments

Abstract: The Internet of Things (IoT), based on interconnected devices, enables a variety of elegant new services that could not be realized in a traditional environment, and many of these services harvest the information of a potentially sensitive and private nature belonging to individual users. Unfortunately, existing security functions used to protect such information are difficult to implement in an IoT environment due to the widely varying capacities, functionalities, and security requirements of IoT devices. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 24 publications
0
13
0
3
Order By: Relevance
“…This taxonomy process produces the following eight categories, are shown in Figure 3 with their included number of publications: Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , ...…”
Section: Taxonomy and Trendsmentioning
confidence: 99%
“…This taxonomy process produces the following eight categories, are shown in Figure 3 with their included number of publications: Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , ...…”
Section: Taxonomy and Trendsmentioning
confidence: 99%
“…The mechanism was demonstrated to be efficient against brute force and DDoS attacks. Kim et al 138 used NFV to provide security services within the gateway and SDN controller to manage traffic flow. The mechanism seems to handle policy resolution automatically, achieve access control and perform security functions that are successful at Botnet and brute force attack mitigation.…”
Section: Heterogeneous Sdn-and Nfv-based Solutionsmentioning
confidence: 99%
“…Resolving policy conflict in traditional methods often take advantage of the most commonly used priority mechanism [23,24], and this method is applied to deal with conflicts in many current architectures [25][26][27][28][29]. However, rationally assign priority to each policy is almost impossible.…”
Section: Related Workmentioning
confidence: 99%