The Library
A comprehensive survey on secure software‐defined network for the Internet of Things
Tools
Babiker Mohamed, Monzir, Matthew Alofe, Olasunkanmi, Ajmal Azad, Muhammad, Lallie, Harjinder Singh, Fatema, Kaniz and Sharif, Tahir (2022) A comprehensive survey on secure software‐defined network for the Internet of Things. Transactions on Emerging Telecommunications Technologies, 33 (1). e4391. doi:10.1002/ett.4391 ISSN 2161-3915.
|
PDF
WRAP-Comprehensive-survey-secure-software-network-internet-things-2021.pdf - Accepted Version - Requires a PDF viewer. Download (865Kb) | Preview |
Official URL: https://doi.org/10.1002/ett.4391
Abstract
The Internet of Things (IoT) is the network of smart devices, sensors, and machines that continuously monitored the surrounding environment and execute meaningful decisions on the data or information it receives. The Internet-enabled devices could facilitate computer-mediated strategies for various tasks, for example, smart health care, managing the cities or smart factories, smart manufacturing, automating the home and business, etc. IoT commonly uses Internet technology for establishing communication among devices, thus inherits all the security threats that are currently affecting Internet users along with other security threats that are specific to IoTs due to resources constrained nature of the smart devices and sensors. The greater footprint, the distributed nature of the network and the existence of a huge number of IoT devices has also attracted criminals, fraudsters, and attackers to utilize this medium for spreading malicious content or making devices unavailable for legitimate use. It is imperative to ensure that the Confidentiality, Integrity, Security, and Privacy of information and users should remain intact while using these devices and thus they require an effective security system. Software-defined Networks (SDN) and Network Function are the way to control and configure devices from a centralized location and have been proven to offer scalability and versatility to their deployed ecosystems. In this paper, we systematically review the adoption of SDN and Network Function Virtualization (NFV) for securing the IoT network from emerging threats. To this extent, we provide a comprehensive survey on security solutions based on SDN, Blockchain, NFV, and SDN/NFV proposed for the security of the IoT network. We have also identified open challenges in this domain which includes lack of standardization, low cost, and effective machine learning systems for identifying malicious traffic and handling great attack surface and different attack vectors. The deployed technologies exhibit positive strides in their usage for the provision of security in IoT environments offering security enhancements, scalability, and versatility.
Item Type: | Journal Article | ||||||||
---|---|---|---|---|---|---|---|---|---|
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||||||
SWORD Depositor: | Library Publications Router | ||||||||
Journal or Publication Title: | Transactions on Emerging Telecommunications Technologies | ||||||||
Publisher: | Wiley-Blackwell Publishing Ltd. | ||||||||
ISSN: | 2161-3915 | ||||||||
Official Date: | 2022 | ||||||||
Dates: |
|
||||||||
Volume: | 33 | ||||||||
Number: | 1 | ||||||||
Article Number: | e4391 | ||||||||
DOI: | 10.1002/ett.4391 | ||||||||
Status: | Peer Reviewed | ||||||||
Publication Status: | Published | ||||||||
Reuse Statement (publisher, data, author rights): | "This is the peer reviewed version of the following article: Babiker Mohamed, M, Matthew Alofe, O, Ajmal Azad, M, Singh Lallie, H, Fatema, K, Sharif, T. A comprehensive survey on secure software-defined network for the Internet of Things. Trans Emerging Tel Tech. 2021;e4391. doi:10.1002/ett.4391, which has been published in final form at https://doi.org/10.1002/ett.4391. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. This article may not be enhanced, enriched or otherwise transformed into a derivative work, without express permission from Wiley or by statutory rights under applicable legislation. Copyright notices must not be removed, obscured or modified. The article must be linked to Wiley’s version of record on Wiley Online Library and any embedding, framing or otherwise making available the article or pages thereof by third parties from platforms, services and websites other than Wiley Online Library must be prohibited." | ||||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||||
Date of first compliant deposit: | 4 January 2022 | ||||||||
Date of first compliant Open Access: | 16 November 2022 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year