Abstract
Internet of Things (IoT) is supposed to be the future form of communication where objects can communicate with each other via the Internet. Due to heterogeneous network technologies and infrastructures, the overall IoT system is getting more complex than the traditional system. This research discusses about integrating SDN in IoT system for better network functionalities in terms of optimization, controlling, dynamic resource management, etc., whereas fog computing provides quick time response for real-time applications with security where computation is done at the edge of the network. Also, adding edge encryption provides better security, privacy, and sharing of sensitive data where data is encrypted before sending to the cloud. Thus, a four-layered IoT architecture is proposed and explained here with two use cases where each layer is capable to respond to specific security requirements as well as open for adding new security frameworks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Medaglia CM, Serbanati A (2010) An overview of privacy and security issues in the Internet of things. In: The internet of things. Springer, pp 389–395
Khan R, Khan SU, Zaheer R, Khan S (2012) Future Internet: the Internet of things architecture, possible applications and key challenges. In: 2012 10th international conference on frontiers of information technology. IEEE, pp 257–260
Cherdantseva Y, Hilton J (2013) A reference model of information assurance and security. In: 2013 international conference on availability, reliability and security. IEEE, pp 546–555
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29:1645–1660
Atzori L, Iera A, Morabito G (2010) The Internet of things: a survey. Comput Netw 54:2787–2805
Tan L, Wang N (2010) Future Internet: the Internet of things. In: 2010 3rd international conference on advanced computer theory and engineering (ICACTE). IEEE, pp V5-376–V5-380
Wu M, Lu T-J, Ling F-Y, Sun J, Du H-Y (2010) Research on the architecture of Internet of things. In: 2010 3rd international conference on advanced computer theory and engineering (ICACTE). IEEE, pp. V5-484–V5-487
The Internet of things reference model-CISCO. http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_Paper_June_4_2014.pdf. Last accessed 10 July 2019
Chen D, Chang G, Jin L, Ren X, Li J, Li F (2011) A novel secure architecture for the internet of Things. In: 2011 fifth international conference on genetic and evolutionary computing (ICGEC). IEEE, pp 311–314
Datta SK, Bonnet C, Nikaein N (2014) An IoT gateway centric architecture to provide novel M2M services. In: 2014 IEEE world forum on Internet of things (WF-IoT). IEEE, pp 514–519
The Internet of things: how the next evolution of the internet is changing everything-CISCO. https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf. Last accessed 10 July 2019
Tomovic S, Yoshigoe K, Maljevic I, Radusinovic I (2017) Software-defined fog network architecture for IoT. Wireless Pers Commun 92:181–196
Understanding the SDN architecture and SDN control plane. https://www.sdxcentral.com/networking/sdn/definitions/inside-sdn-architecture/
Software-defined networking (SDN)—Cisco. https://www.cisco.com/c/en/us/solutions/software-defined-networking/overview.html. Last accessed 10 July 2019
Fog computing and the Internet of things: extend the cloud to where the things are-CISCO. https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf. Last accessed 10 July 2019
Al-Qaseemi SA, Almulhim HA, Almulhim MF, Chaudhry SR (2016) IoT architecture challenges and issues: lack of standardization. In: 2016 future technologies conference (FTC). IEEE, pp 731–738
Chakrabarty S, Engels DW (2016) A secure IoT architecture for smart cities. In: 2016 13th IEEE annual consumer communications and networking conference (CCNC). IEEE, pp 812–813
Zhang M, Sun F, Cheng X (2012) Architecture of Internet of things and its key technology integration based-on RFID. In: 2012 fifth international symposium on computational intelligence and design. IEEE, pp 294–297
Sarkar C, Nambi SAU, Prasad RV, Rahim A (2014) A scalable distributed architecture towards unifying IoT applications. In: 2014 IEEE world forum on Internet of things (WF-IoT). IEEE, pp 508–513
Jennings C, Arkko J, Shelby Z (2019) Media types for sensor markup language (SENML). https://tools.ietf.org/html/draft-jennings-senml-10, Last accessed 10 July 2019
Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. Proc IEEE 102:1229–1247
Wehbe T, Mooney VJ, Keezer DC, Parham NB (2015) A novel approach to detect hardware Trojan attacks on primary data inputs. In: Proceedings of the WESS’15: workshop on embedded systems security. ACM, p. 2
Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27:10–25
Uttarkar R, Kulkarni R (2014) Internet of things: architecture and security. Int J Comput Appl 3:12–19
Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classification of RFID attacks. Gen 15693:14443
Li L (2012) Study on security architecture in the Internet of things. In: Proceedings of 2012 international conference on measurement, information and control. IEEE, pp 374–377
Nia AM, Sur-Kolay S, Raghunathan A, Jha NK (2015) Physiological information leakage: a new frontier in health information security. IEEE Transac Emerg Topics Comput 4:321–334
Mukherjee A (2015) Physical-layer security in the Internet of things: sensing and communication confidentiality under resource constraints. Proc IEEE 103:1747–1761
Douceur JR (2002) The Sybil attack. In: Peer-to-peer systems. Springer, pp 251–260
Ahmed N, Kanhere SS, Jha S (2005) The holes problem in wireless sensor networks: a survey. ACM SIGMOBILE Mobile Comput Commun Rev 9:4–18
Bhattasali T, Chaki R, Sanyal S (2012) Sleep deprivation attack detection in wireless sensor network. arXiv:1203.0231
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed Internet of things. Comput Netw 57:2266–2279
Wu G, Talwar S, Johnsson K, Himayat N, Johnson KD (2011) M2M: from mobile to embedded internet. IEEE Commun Mag 49:36–43
Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embedded security framework for Internet of things (IoT). In: 2011 2nd international conference on wireless communication, vehicular technology, information theory and aerospace and electronic systems technology (Wireless VITAE). IEEE, pp 1–5
Padhy RP, Patra MR, Satapathy SC (2011) Cloud computing: security issues and research challenges. Int J Comput Sci Inf Technol Secur (IJCSITS) 1:136–146
Thakur BS, Chaudhary S (2013) Content sniffing attack detection in client and server side: a survey. Int J Adv Comput Res 3:7
Zhang M, Raghunathan A, Jha NK (2014) Trustworthiness of medical devices and body area networks. Proc IEEE 102:1174–1188
Muhammad MF, Anjum W, Mazhar KS (2015) A critical analysis on the security concerns of Internet of things (IoT). Int J Comput Appl (0975 8887) 111
Halperin D, Heydt-Benjamin TS, Ransford B, Clark SS, Defend B, Morgan W, Fu K, Kohno T, Maisel WH (2008) Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: 2008 IEEE symposium on security and privacy (sp 2008). IEEE, pp 129–142
Li C, Raghunathan A, Jha NK (2011) Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system. In: 2011 IEEE 13th international conference on e-health networking, applications and services. IEEE, pp 150–156
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120–126
Guinard D, Trifa V, Wilde E (2010) A resource oriented architecture for the Web of things. In: IoT, pp 1–8
IoT Standards and Protocols Guide (2019) Comparisons on network, wireless comms, security, industrial. https://www.postscapes.com/internet-of-things-protocols/. Last accessed 10 July 2019
Robodrone. https://www.robodrone.com/. Last accessed 10 July 2019
Qin Z, Denker G, Giannelli C, Bellavista P, Venkatasubramanian N (2014) A software defined networking architecture for the internet-of-things. In: 2014 IEEE network operations and management symposium (NOMS). IEEE, pp 1–9
Acknowledgements
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Asif, M.R.A., Mahfuz, N., Momin, M.A. (2020). An SDN-Enabled IoT Architecture with Fog Computing and Edge Encryption Support. In: Uddin, M.S., Bansal, J.C. (eds) Proceedings of International Joint Conference on Computational Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-3607-6_33
Download citation
DOI: https://doi.org/10.1007/978-981-15-3607-6_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3606-9
Online ISBN: 978-981-15-3607-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)