SD-IOT: Security and Privacy
Vishal S. Patil1 , Suraj S. Bhute2 , Gauri J. Chauhan3 , Aparna P. Morey4 , Tejaswini S. Borkar5
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-8 , Page no. 202-207, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.202207
Online published on Aug 31, 2019
Copyright © Vishal S. Patil, Suraj S. Bhute, Gauri J. Chauhan, Aparna P. Morey, Tejaswini S. Borkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Vishal S. Patil, Suraj S. Bhute, Gauri J. Chauhan, Aparna P. Morey, Tejaswini S. Borkar, “SD-IOT: Security and Privacy,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.202-207, 2019.
MLA Style Citation: Vishal S. Patil, Suraj S. Bhute, Gauri J. Chauhan, Aparna P. Morey, Tejaswini S. Borkar "SD-IOT: Security and Privacy." International Journal of Computer Sciences and Engineering 7.8 (2019): 202-207.
APA Style Citation: Vishal S. Patil, Suraj S. Bhute, Gauri J. Chauhan, Aparna P. Morey, Tejaswini S. Borkar, (2019). SD-IOT: Security and Privacy. International Journal of Computer Sciences and Engineering, 7(8), 202-207.
BibTex Style Citation:
@article{Patil_2019,
author = {Vishal S. Patil, Suraj S. Bhute, Gauri J. Chauhan, Aparna P. Morey, Tejaswini S. Borkar},
title = {SD-IOT: Security and Privacy},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2019},
volume = {7},
Issue = {8},
month = {8},
year = {2019},
issn = {2347-2693},
pages = {202-207},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4809},
doi = {https://doi.org/10.26438/ijcse/v7i8.202207}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i8.202207}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4809
TI - SD-IOT: Security and Privacy
T2 - International Journal of Computer Sciences and Engineering
AU - Vishal S. Patil, Suraj S. Bhute, Gauri J. Chauhan, Aparna P. Morey, Tejaswini S. Borkar
PY - 2019
DA - 2019/08/31
PB - IJCSE, Indore, INDIA
SP - 202-207
IS - 8
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
1510 | 401 downloads | 193 downloads |
Abstract
The Internet of things (IoT) is becoming apparent of the Internet which can connect nearly all environment devices, embedded with Internet Protocol (IP) and they are remotely monitored and controlled. Due to the huge growth of IoT devices, IoT networks are vulnerable to various security attacks. The implementation of efficient privacy and security protocols in IoT networks is extremely needed to ensure authentication, confidentiality, integrity and access control, among others. In this paper, I firstly present an in-depth meaning of the Internet of Things (IoT) and then propose a general framework for software-defined Internet of Things (SD-IoT) based on the SDx paradigm, software-defined everything (SDx) paradigm provides a way to strengthen the security of the IoT devices, as well as determines the impact of those new security and privacy issue and possible solutions. The proposed framework is implemented to strengthen the security of the IoT with heterogeneous and vulnerable devices. IoT, Software-defined Internet of Things (SDIoT), Security, Privacy.
Key-Words / Index Term
IoT, Software-defined Internet of Things (SDIoT), Security, Privacy
References
[1] Mosenia and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things," in IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586- 602,1Oct.-Dec.2017.doi: 10.1109/TETC.2016.2606384
[2] D. Yin, L. Zhang and K. Yang, "A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework," in IEEE Access, vol. 6, pp. 24694- 24705,2018.doi: 10.1109/ACCESS.2018.2831284
[3] Krishnan, Prabhakar & S. Najeem, Jisha & Achuthan, Krishnashree. (2018)."SDN Framework for Securing IoT Networks” 10.1007/978-3-319-73423-1_11.
[4] Fadele, Alaba & Othman, Mazliza & Abaker Targio Hashema, Ibrahim & Alotaibi, Faiz. (2017). “Internet of things Security: A Survey. Journal of Network and Computer Applications”. 88.
10.1016/j.jnca.2017.04.002.
[5] Weigong LV, Fanchao MENG, “AGeneral Architecture of IoT System”, International Conference on Computational Science and Engineering, Vol.1, No.5, pp.1-4, 2017.
[6] Jararweh, Yaser & Al-Ayyoub, Mahmoud & Darabseh, Ala & Benkhelifa, Elhadj & Vouk, Mladen & Rindos, A.ndrew. (2015). “SDIoT: A Software Defined based Internet of Things framework”. Journal of Ambient Intelligence and Humanized Computing. 1. 453-461. 10.1007/s12652-015-0290-y.
[7] Choi, S., & Kwak, J. (2016). “Enhanced SDIoT Security Framework Models. International Journal of Distributed Sensor
Networks”. https://doi.org/10.1155/2016/4807804
[8] Ullah, Rafi & ul Sami, Iftikhar & Ahmad, Maaz & Asif, Muhammad. (2018). “DoS/DDoS detection for E- healthcare in Internet of Things”. International Journal of Advanced Computer Science and Applications. 9. 10.14569/IJACSA.2018.090140.
[9] Ma YW, Lai CF, Huang YM, Chen JL. “Mobile RFID with IPv6 for phone services.” In: Proc. of the 13th IEEE Int’l Symp. On Consumer Electronics. Kyoto: IEEE Press, 2009. 169 170. [doi: 10.1109/ISCE.2009.5156859]
[10] Yaser Jararweh1 ,Mahmoud Al-Ayyoub1, Ala’ Darabseh1 “SDIoT: a software defined based internet of things framework”, Springer-Verlag Berlin Heidelberg, pp.1-9, 2015.
[11] Krishnan, Prabhakar & S. Najeem, Jisha & Achuthan, Krishnashree. (2018)."SDN Framework for Securing IoT Networks” 10.1007/978-3-319-73423-1_11.
[12] A. Hakiri, P. Berthou, A. Gokhale, and S. Abdellatif, ‘‘software defined networking for efficient and scalable IoT communications,’’ IEEE Commun. Mag., vol. 53, no. 9, pp. 48–54, Sep. 2015.
[13] X. Zhong, Research on Distributed Controller Deployment Algorithm Based on Software Defined Network. Changsha, China: Hunan Normal Univ., 2017, pp. 29–33.