Vous êtes sur la page 1sur 11

Research Article

International Journal of Distributed


Sensor Networks
2017, Vol. 13(8)
Analysis of attacks on device manager Ó The Author(s) 2017
DOI: 10.1177/1550147717728681
in software-defined Internet of Things journals.sagepub.com/home/ijdsn

Tri-Hai Nguyen1 and Myungsik Yoo1,2

Abstract
The Internet of Things is a network of physical devices consisting of embedded systems and sensors that interact with
each other and connect to the Internet, and the quick growth of the Internet of Things industry has resulted in complex
inter-networking on the Internet. Software-defined networking is a recent advance in computer networking that rede-
fines the network paradigm for future communication, and the advantages of software-defined networking can also be
applied to Internet of Things, namely as software-defined Internet of Things. In this article, we investigate the vulnerabil-
ity of the software-defined Internet of Things platform device manager, which monitors the connected Internet of
Things devices in the network. Although being the one that performs one of the most crucial services, the device manag-
ers in current primary controllers have a big security issue as they do not include any device verification, authentication,
or authorization routines. Consequently, the device manager accepts all the changes of device information made by
other devices, which leads to potential attacks as demonstrated in this article. To address this problem, a comprehensive
and lightweight countermeasure is proposed and its effectiveness is verified through experiments.

Keywords
Internet of Things, software-defined networking, device manager, security, vulnerability

Date received: 17 January 2017; accepted: 6 August 2017

Academic Editor: Davide Brunelli

Introduction difficulty in an orchestration, and virtualizing sensor


network resources.3
The concept of the Internet of Things (IoT) refers to Software-defined networking (SDN) is a remarkable
communication technologies, embedded systems, smart technology that can tackle such challenges related to
phones, cloud computing, and physical objects (e.g. WSN and IoT in the near future. SDN simplifies and
sensors, wearables, smart cars, and smart appliances) improves network control in a highly elastic manner by
that enable connecting people, places, and things to the decoupling the control plane from the data plane. The
Internet, anytime and anywhere.1 The rapid growth of SDN controller is a centralized software operation that
IoT has forced new, complicated specifications to both controls the entire network behavior to be agile,
networking and inter-networking platforms in current
and future networks, particularly the Internet.2 In the 1
Department of ICMC Convergence Technology, Soongsil University,
IoT ecosystem, wireless sensor networks (WSNs) are Seoul, Republic of Korea
essential elements. A WSN is a network of nodes that 2
School of Electronic Engineering, Soongsil University, Seoul, Republic of
collaboratively sense and may control the environment, Korea
allowing interaction between persons or devices and
Corresponding author:
the around environment. However, WSNs are faced
Myungsik Yoo, School of Electronic Engineering, Soongsil University, 369,
with many IoT challenging issues such as inflexible Sangdo-ro, Dongjak-gu, Seoul 06978, Republic of Korea.
control, manual configuration of sensor nodes, Email: myoo@ssu.ac.kr

Creative Commons CC-BY: This article is distributed under the terms of the Creative Commons Attribution 4.0 License
(http://www.creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without
further permission provided the original work is attributed as specified on the SAGE and Open Access pages (http://www.uk.sagepub.com/aboutus/
openaccess.htm).
2 International Journal of Distributed Sensor Networks

programmable, and intelligent.4,5 The major issues related to monitoring and detection.3 In IoT, a large
related to WSN and IoT can be solved if the advan- number of devices generate a huge amount of traffic
tages of SDN are integrated. that requires many processing operations to be con-
For all these reasons, the software-defined Internet verted into useful information. Moreover, any suspen-
of Things (SDIoT), as an integration of SDN and IoT, sion in communication among the devices will
is notable.6–10 It will undoubtedly simplify network negatively impact the performance and accuracy of the
control using a common protocol in every technologi- system. Thus, these problems require a new paradigm
cal domain, but it also poses some risks. Apart from to improve the effectiveness of the IoT architecture.1,2
the reliability and efficiency of its communications, Recently, SDN, a novel network paradigm, was pro-
information security is also an essential requirement for posed to decouple the control plane from the data
SDIoT. In industrial, medical and healthcare, transpor- plane, and it can be programmed directly.4,5 As shown
tation, and smart infrastructure applications, any expo- in Figure 1, the SDN framework can be divided into
sure of sensitive information (e.g. chat logs, patient three planes, including application, control, and data
medical records, financial data) is not acceptable. planes with their corresponding application program-
In SDIoT, the device’s profile information is regu- ming interfaces (APIs), which is explained as follows:
larly updated by the device manager, which is a funda-
mental and crucial service to ensure the proper  The application plane provides various applica-
operation of the IoT services and applications. tions and services, for example, traffic monitor-
However, it is found that the device manager accepts ing, security enhancements, topology discovery,
all migrations and changes of device information load balancers. The application plane communi-
because it lacks a security mechanism within. Thus, an
cates with the control plane through north-
attacker could easily corrupt the profile information of
bound interface APIs, and the control plane
the target device in the controller, which can lead to
provides an abstraction of the network’s physi-
various types of serious attacks.
cal network infrastructures for the application
Briefly, the major contributions of this article are as
plane.
follows. First, a security analysis is thoroughly per-  The control plane manages the entire network
formed on the device manager in the SDIoT controller.
through the SDN controller. There are some
The vulnerabilities in the device manager allow an
major SDN controllers in the market, for exam-
attacker to carry out device impersonation, eavesdrop-
ple, Floodlight,11 POX,12 and OpenDaylight.13
ping, and denial-of-service attacks in the network.
The controller has a global vision of the full net-
Second, comprehensive countermeasures are proposed
work topology at the data plane (i.e. switches
and discussed. Finally, an experiment is carried out to
and links), and it communicates with the switch
show that the proposed prevention method is light-
using a standard southbound interface API, for
weight and effective.
example, OpenFlow.14
The rest of this article is organized as follows.
 The data plane consists of many OpenFlow
Related knowledge is described in section ‘‘Background
switches. Each switch has the Flow Tables,
and related work.’’ Section ‘‘Vulnerability of the device
which accommodate the thousands of rules that
manager’’ analyzes the security issues and possible
attacks on the device manager in the controller. Section are used to define the forwarding decisions.
‘‘Countermeasure and evaluation’’ discusses the pro- When a new packet passes through a switch, the
posed defense method and evaluates its performance. switch checks if the packet matches any current
Finally, the summary is presented in section rules. If so, the switch will handle the packet
‘‘Conclusion.’’ according to the rule. Otherwise, the switch
transmits a Packet-In message to the controller
to request for suitable operations. The controller
Background and related work then supplies a Packet-Out message for the sin-
In this section, we provide an overview of the SDIoT gle packet processing or a Flow-Mod message to
and the device manager in the SDIoT controller. The install new flow rules.5,14
related work is also mentioned.
The benefits of SDN can be derived from four main
features, including a network-wide visibility with cen-
SDIoT tralized control, a flexible flow manager, a programma-
The IoT is a flexible, globally interconnected, intelli- ble capacity, and a simplified forwarding mechanism.
gent, self-configuring devices. The most important con- The SDN can solve a range of IoT challenges and can
tributor in the IoT is WSN that is defined as provide a robust, flexible, scalable scheme for the IoT
intercommunication of distributed sensor nodes mainly services.
Nguyen and Yoo 3

Figure 1. Overview of the SDN architecture.


Figure 2. SDIoT environment.

Several previous studies have presented an inte- DHCP response, or IP packets. Therefore, it can iden-
grated SDN with IoT, which is referred to as SDIoT. tify where the devices are. In the case of active learning,
Qin et al.6 proposed an SDN controller design for the the device manager will send ARP requests to all the
IoT network, which enables centralized flow scheduling ports and then receive ARP responses from devices
according to the network calculus model. TalebiFard attached to these ports. Through ARP responses, the
and Leung7 proposed an SDN-based scheme, which device manager is able to determine where the devices
eliminates the rigidity of a conventional IoT network are.
by granting dynamic reply to any shift in the environ- The device profile is built based on the Packet-In mes-
ment. Galluccio et al.8 introduced SDN-WISE that sage, which contains information such as the IP address,
supports stateful SDN and reduces the amount of MAC address, switch and port number, and last seen
information exchanged between the sensor nodes and timestamp. A device profile is usually indexed by the
the controller. SDN-WISE also introduced the WISE- MAC address. For instance, OpenDaylight indexes the
Visor which creates and manages several virtual WSNs device profile with MAC and IP addresses. The device
based on the same physical sensor nodes. Liu et al.9 manager in Floodlight supports both the VLAN ID and
proposed a software-defined IoT paradigm for separat- MAC addresses for indexing and querying.
ing smart urban sensing applications from underlying When a device comes in and sends its first packet to
physical infrastructures. Recently, Jararweh et al.10 the network, the switch forward this packet via a
reported efforts in defining a generic high-level archi- Packet-In message to the controller, and the device
tecture to deal with the integration of IoT and SDN. In manager then creates a new device profile based on the
general, the view of the SDIoT scheme includes the payload information of the Packet-In message. When a
devices/things (e.g. smartphone, wireless sensors, appli- device moves from one switch to another, the controller
ances, actuators), network infrastructure (e.g. switches, updates the database for the migrated device based on
routers), SDN controller and IoT applications/services, the Packet-In message received from another switch
as shown in Figure 2. port.

Device manager in SDIoT controller Related work


In contrast with traditional networks or IoT schemes, Few prior studies have investigated security issues for
the device manager in SDIoT networks is unique due fundamental services in an SDN or SDIoT controller,
to its logically centralized controller. The device man- especially for the network topology service.
ager helps the controller identify the location (i.e. the TopoGuard15 is a security module in the controller that
corresponding switch port attached) of the device in detects poisoning attacks on network visibility.
the network that is provided to the upper IoT services/ SPHINX16 proposes a unified approach based on net-
applications, as shown in Figure 3.15 work flow graphs to detect the attacks that violate the
The device manager learns the end devices passively learned flow graphs/modules, but it is ineffective in
or actively. In the case of passive learning, the device large-scale networks. Although these models can pro-
manager gets the MAC and IP addresses from the tect against most network topology attacks, they are
Packet-In message, which encapsulates the ARP reply, powerless against complex attacks constructed by an
4 International Journal of Distributed Sensor Networks

Figure 3. Device manager in SDIoT controller.

adversary. NSV-GUARD17 is a new model that can be The device manager controls the device entities in a
used to secure routing path construction in SDN. This database based on the MAC addresses, network addresses
method is based on a network security virtualization mapped to the devices, and their locations in the net-
technique combined with dynamic trust evaluation of works. We analyze the source code of the device manager
the network resources. However, it only deals with mal- in current mainstream controllers, that is, Floodlight,
icious routing policies generated by an unregistered POX, and OpenDaylight, and find some vulnerabilities in
routing applications. FADE18 uses dedicated flow rules their device manager. Specifically, the isEntityAllowed()
to collect flow statistics of a minimal set of flows, and API allows any device to join the current network without
with these flow statistics, it identifies forwarding any validation. The learnDeviceByEntity() API looks up
anomalies. However, the system has a negative impact the entity information in the database based on the device
on the network throughput. key, that is, a device’s MAC address. However, spoofed
internet control message protocol requests or spoofed
ARP reply with a fake MAC address can bypass the
Vulnerability of the device manager lookup for the entity database. Thus, the device manager
To the best of our knowledge, none of the existing con- can accidentally grant the spoofed individual access to
trollers contain a security mechanism to prevent mali- controller’s resources. Furthermore, the device manager
cious packets that are received by the device manager. does not contain any device verification, authentication,
Even well-known open-source controllers currently in or authorization mechanism. By discovering the vulner-
the market, such as Floodlight, POX, and ability in the device manager, an attacker can tamper with
OpenDaylight, still have this problem. In this section, the device profile information in the controller because
we first analyze the vulnerability of the device manager the device manager accepts all changes of the device infor-
service, and three types of network attacks that exploit mation via spoofed packets, causing some serious attacks,
this security hole are presented. Then, the potential including device impersonation, eavesdropping, and
solution to this problem is suggested and discussed. denial-of-service.

Device impersonation. In this attack scenario, the attacker


The security analysis of device manager will receive packets intended for the victim and can reply
The device manager provides information related to the to these packets on behalf of the victim. Figure 4 illus-
location of the device which is required for monitoring trates the device impersonation attack where device B is
traffic, assisting in traffic routes, and determining the the victim.
source of the packets. If this service works incorrectly, To perform this attack, the attacker first sends the
all dependent services will be affected. ARP request to the controller to probe the
Nguyen and Yoo 5

Figure 4. Device impersonation attack in an SDIoT network.

corresponding MAC address of the IP address for and device B to the location of the attacker. The con-
device B. The attacker then injects the spoofed ARP troller then sends the Flow-Mod message to change the
reply, which contains the IP address of device B and flow rules in the switch based on the new device profile
the MAC address of the attacker device, to the net- of device A and device B. Once this has been done,
work. The controller receives the spoofed ARP reply when device A attempts to contact device B, the traffic
packet from the switch via a Packet-In message and from device A will go through the attacker device and
then accepts the change in the profile information of then to device B. Device A and device B believe that
device B, that is, the MAC address for device B changes they have a direct connection to each other.
to the MAC address of the attacker’s device. Since the
device profile is indexed by the MAC address, the meta
DoS. Different from traditional denial-of-service (DoS)
information for device B, that is, the DPID and port
attack, in this DoS attack scheme, the attacker device
number, is also changed into meta information of the
runs an attacking script to craft the fake packets and
attacker device. The controller then sends a Flow-Mod
sends them to the controller to make the profile of the
message to modify the Flow Table of the switch based
target device in the controller contain bogus profile
on the forged information of the device profile. As a
information such as a fake MAC address, a non-
result, the attacker successfully impersonates device B.
existing port. Hence, the victim’s device (e.g. banking
Therefore, when another device, for example, device A,
servers, DNS servers) cannot communicate with others.
attempts to connect to device B, the attacker’s device
Figure 6 shows the result of the DoS attack where
will communicate with device A.
the victim is device B. The attacker periodically sends
spurious ARP reply packets to the controller to change
Eavesdropping. An eavesdropping attack is a well-known the MAC address of device B to an unreal one. Since
attack where an adversary aims to listen to the private the device manager accepts all changes in the device
communication between two devices without them profile, the device profile is misconfigured by the
knowing. We consider the network topology, which spoofed message. The controller then sends a Flow-
consists of an attacker device, device A and device B, as Mod message to change the Flow Table of the switch
shown in Figure 5. The attacker first sends the fake according to the misconfigured device information
ARP reply packet, which has the IP addresses of device database. Consequently, the flow rules of the Flow
A and device B but the MAC address of the attacker’s Table are erroneous, that is, the MAC address of
device. The switch will then send this packet to the con- device B in the flow rules is changed to a non-existing
troller via the Packet-In message. Hence, the controller one. Hence, the communication between device B and
accepts the modification for the location of device A the other devices is blocked.
6 International Journal of Distributed Sensor Networks

Figure 5. Eavesdropping attack in an SDIoT network.

Figure 6. Denial-of-service attack in an SDIoT network.

Potential solutions from traditional networking authenticated by the controller. The device will then
A cryptographic technique, that is, public key infra- encrypt the packet, which contains the location infor-
structure (PKI),19 may be used to solve this problem. mation, using the controller’s public key and will sign it
The PKI establishes and maintains a trustworthy net- using the device’s digital signature. The digital signa-
working environment by providing key and certificate ture is made of the device’s private key and the message
management services to enable encryption and digital digest. The device then sends the processed message to
signature capabilities. When a device moves to a new the controller via the Packet-In message. To prove the
location or newly joins the network, the device will be identity, the device needs to use a digital certificate
Nguyen and Yoo 7

Figure 7. The controller without the spoofed packet-checking mechanism.

provided by a Certification Authority (CA). After table and generates the same OTP. The two passwords
receiving the message from the device, the controller must be matched to authenticate the device.
decrypts the message with its private key and verifies
the message digest using three elements, including the
hash algorithm, the authenticity with the device’s public
Countermeasure and evaluation
key, and the device’s digital certificate. Then, the con- In this section, we detail the idea and implementation
troller can identify the location of the device through of the defense method to protect the SDIoT networks
the received packet information. against device manager attacks. Also, an experiment is
Since it is impractical for an attacker to obtain the conducted to analyze the performance of the proposed
device’s certificate, this solution seemingly prevents the attack prevention method.
attacks. Unfortunately, there are several limitations
that make it difficult to be deployed in the fields. First,
SDIoT is usually a dynamic, large-scale network where Countermeasure
the device (e.g. mobile device, wearable device) changes Note that the message authentication scheme is used to
its physical location frequently. When a device migra- confirm that the message comes from the initiating sen-
tion event occurs, the device will be re-authenticated. If der and has not been changed in transit. After success-
re-authentication happens frequently, the controller’s ful authentication, depending on the system, the
computing overhead to process each Packet-In message contents of the message need to be checked. However,
will increase dramatically due to the high computa- in SDIoT, as we mentioned before, the device manager
tional cost of the asymmetric algorithm such as PKI.20 in the existing controller does not contain the verifica-
In worst case, the controller can even turn off due to tion mechanism to check the spoofed packet. Hence,
the overload. IoT devices (i.e. sensors) are generally the authenticated device can still send the spoofed
limited in power and resources, making it difficult to packet to change the information in the device data-
apply this complex cryptographic algorithm.21 base. As shown in Figure 7, although the authentication
Due to the limited computing and memory capabil- mechanism is activated, the attacker (authenticated as a
ity of the IoT devices, Ling et al.22 proposed an efficient normal device) can still send a fake message, which is
and secure one-time password (OTP authentication accepted by the controller without considering the con-
suitable for devices with limited computing resources tents of the message.
and power. In their method, the hash chain is removed To address this issue, we propose a novel model,
to reduce the computational load for the device, but it which is referred to a security patch for the device man-
still retains the one-way hash function to achieve ager in the controller, as shown in Figure 8. The pro-
mutual authentication. The device is assumed to con- posed model consists of a Device Manager Checker,
tain a pre-shared secret value which is a random num- Authenticator, Port Monitoring, and Device Profile
ber chosen by the controller, and the controller keeps Database. The new device must be authenticated by the
it. The OTP is formed by passing the value of a secret Authenticator using the lightweight authentication
value and a timestamp through a cryptographic hash method. When the device moves to another location, a
function of the device. Then, the controller obtains the verification of the previous port of the device has to be
device’s secret value and timestamp value from a device made via Port Monitoring. If the connection is still
8 International Journal of Distributed Sensor Networks

Figure 8. The proposed device manager.

Table 1. The suggested structure format of the Device Profile Database.

Number MAC address IP address Authentication status Switch and port Last seen timestamp

1 00:00:00:00:00:01 10.0.0.1 True sw1, 1 11:13.45 26.12.2016


2 00:00:00:00:00:02 10.0.0.2 False sw1, 2 09:13.33 27.12.2016
3 00:00:00:00:00:03 10.0.0.3 False sw2, 1 N/A

active, the migration of the device must be spoofing Port Monitoring. Without checking the contents of the
action and will be blocked by Device Manager packet, the authenticated device can still send the
Checker. Otherwise, the migration request will be spoofed packet to impersonate other devices. With
accepted and updated by Device Profile Database. the use of Port Monitoring, a duplicate appearance of
Hence, all the spoofing actions, which lead to three the device in the database can occur only if the device
kinds of discussed attacks (i.e. device impersonation, has moved and the database has not been updated, or
eavesdropping, DoS attack), can be detected and sus- if it is a result of a spoofing attempt. Thus, a check-up
pended by the proposed model. The details are shown of the original device location has to be made via Port
below. Monitoring. An efficient way of check-up is to check
the status of the port where the device was previously
connected. If the connection is still active, the change
Device profile database. It is structured as a list as shown must then be a spoofing action, and the Device
in Table 1 where each row contains the device profile Manager Checker will block this request. If the connec-
and its networking status. Each item of device informa- tion is inactive, then the change request can be
tion is stored in its respected column. Each device accepted, and the Device Profile Database will be
should have at least the entries on its MAC address, the updated. Figure 9 shows the result of using the Port
location of the connected switch, and the last seen time- Monitoring when an attacker performs a spoofing
stamp. Furthermore, the authentication status is neces- attack.
sary for the check-up and monitoring measurements.

Authenticator. The newly connected devices must be Evaluation


authenticated by the controller. In this module, we Our experiment is conducted using the Linux-based
adopt the efficient and secure OTP authentication pro- Mininet 2.2.1,23 which provides a scalable platform to
posed by Ling et al.22 The used authentication method emulate the SDN network via virtualization. The pro-
establishes a session key to encrypt the transmitted posed defense mechanism is implemented using the
messages. Upon successful authentication, the authenti- Floodlight 1.2 controller.11 We also use Open vSwitch
cation status of the device will be updated in the Device 2.5.1,24 a software-based virtual SDN switch with the
Profile Database. support of the OpenFlow protocol. The attack tools are
Nguyen and Yoo 9

Figure 9. The controller using Port Monitoring in the device manager.

Figure 10. Successful eavesdropping attack on the Floodlight controller.

ARP-spoof 1.525 and Wireshark 1.21.1.26 All experi- two targets, device A and device B. Hence, the profiles
ments are conducted on a PC with an Intel Xeon CPU for device A and B in Device Profile Database are
E3-1230 V2 running at 3.30 GHz with 16 GB of RAM. updated with fake information. The Floodlight control-
In the first experimental scheme, we perform an ler sends the Flow-Mod message to modify the flow rules
eavesdropping attack without enabling the security of the switch. We can see the flow rules in Figure 10, and
extension of the device manager. The other discussed the network traffic between device A and device B goes
attack scenarios, i.e., device impersonation and DoS through port number 1, which is the attacker’s location.
attack can operate in the same manner. We consider a As shown in Figure 10, the attacker successfully wiretaps
network containing three devices: an attacker device (IP the communication between the two victim devices, A
address: 10.0.0.1, MAC address: 00:00:00:00:00:01, and B, as shown in the Wireshark software.
switch port: 1), device A (IP address: 10.0.0.2, MAC In the second experimental scheme, the new device
address: 00:00:00:00:00:02, switch port: 2), and device B manager is activated, and the feedback of the device
(IP address: 10.0.0.3, MAC address: 00:00:00:00:00:03, manager is indicated using the console output of the
switch port: 3). The attacker uses ARP-spoof to repeat- Floodlight controller. The attack is also performed
edly send spoofed ARP reply packets using the MAC same as in the previous experiment. However, with our
address of the attacker’s device and the IP address of proposed prevention method, the spoofing attacks,
10 International Journal of Distributed Sensor Networks

Figure 11. Successful detection of the attacks on the device manager in the Floodlight controller.

Table 2. The computational overhead of the controller.

Measure Without proposed model With proposed model

Processing time for device discovery of 100 devices 4.602 s 4.970 s


Average processing time per Packet-In message 1.12 ms 1.59 ms

which is a major cause of the device impersonation, performed according to the discovered vulnerability for
eavesdropping, and DoS attack, can be prevented. the device manager. The potential security solutions are
Figure 11 shows the successful detection when a spoof- also examined, which cannot be applied directly in
ing attempt occurs. SDIoT. Hence, a lightweight, dynamic countermeasure
We also consider the performance overhead of the con- is proposed and then evaluated through experiments.
troller with and without the proposed model. The network The results show that the proposed defense method can
is created by a tree topology with a depth of 2 and fanout effectively prevent attacks on a device manager in
of 10 containing 100 devices in Mininet. Table 2 shows the SDIoT networks in real time. Further experiments on a
comparison of the controller with and without the pro- large scale of devices will be conducted in future work.
posed countermeasure in terms of the processing time for
device discovery of 100 devices and the average processing Declaration of conflicting interests
time per Packet-In message. The authentication mechan-
The author(s) declared no potential conflicts of interest with
ism adds an extra 8% processing time of the controller.
respect to the research, authorship, and/or publication of this
Port Monitoring also brings a small delay on Packet-In article.
message processing. However, the overhead of average
delay for each Packet-In message processing is quite small Funding
(below 0.5 ms). The result shows that the impact of the The author(s) disclosed receipt of the following financial sup-
new device manager is acceptable in order to obtain a port for the research, authorship, and/or publication of this
trustworthy device manager in the controller. article: This research was supported by the MSIT (Ministry
of Science and ICT), Korea, under the ITRC (Information
Technology Research Center) support program (IITP-2017-
Conclusion 2012-0-00646) supervised by the IITP (Institute for
Information & Communications Technology Promotion).
This article considers the security of the device man-
ager, a crucial and fundamental service in an SDIoT References
controller. The profile database of the device manager 1. Evans D. The internet of things: how the next evolution
can be easily forged due to a lack of security mechanism of the internet is changing everything. CISCO white
in this service. Several serious attack scenarios are thus paper 2011; 4(2011): 1–11.
Nguyen and Yoo 11

2. Al-Fuqaha A, Guizani M, Mohammadi M, et al. Inter- countermeasures. In: Proceedings of network and distribu-
net of Things: a survey on enabling technologies, proto- ted system security (NDSS) symposium, San Diego, CA,
cols, and applications. IEEE Commun Surv Tut 2015; 8–11 February 2015. Virginia: Internet Society.
17(4): 2347–2376. 16. Dhawan M, Poddar R, Mahajan K, et al. SPHINX:
3. Akyildiz IF, Su W, Sankarasubramaniam Y, et al. A sur- detecting security attacks in software-defined networks.
vey on sensor networks. IEEE Commun Mag 2012; 40(8): In: Proceedings of network and distributed system security
102–114. (NDSS) symposium, San Diego, CA, 8–11 February
4. McKeown N. Software-defined networking. INFOCOM 2015. Virginia: Internet Society.
Keynote Talk 2009; 17(2): 30–32. 17. Wang M, Liu J, Mao J, et al NSV-GUARD: constructing
5. Kreutz D, Ramos FM, Verissimo PE, et al. Software- secure routing paths in software defined networking. In:
defined networking: a comprehensive survey. Proc IEEE Proceedings of the 6th international conferences on big data
2015; 103(1): 14–76. and cloud computing, Atlanta, GA, 8–10 October 2016,
6. Qin Z, Denker G, Giannelli C, et al. A software defined pp.293–300. New York: IEEE.
networking architecture for the Internet-of-Things. In: 18. Pang C, Jiang Y, Li Q, et al. Detecting forwarding anom-
Proceedings of IEEE/IFIP network operations and man- aly in software-defined networks. In: Proceedings of IEEE
agement symposium (NOMS), Krakow, 5–9 May 2014, international conference on communications (ICC), Kuala
pp.1–9. New York: IEEE. Lumpur, Malaysia, 23–27 May 2016, pp.1–6. New York:
7. TalebiFard P and Leung VC. Context-aware dissemina- IEEE.
tion of information and services in heterogeneous net- 19. Adams C and Lloyd S. Understanding PKI: concepts,
work environments. J Ambient Intell Humaniz Comput standards, and deployment considerations. Boston, MA:
2014; 5(6): 775–787. Addison-Wesley Professional, 2003.
8. Galluccio L, Milardo S, Morabito G, et al. SDN-WISE: 20. Piotrowski K, Langendoerfer P and Peter S. How public
design, prototyping and experimentation of a stateful key cryptography influences wireless sensor node lifetime.
SDN solution for WIreless SEnsor networks. In: Pro- In: Proceedings of the fourth ACM workshop on security
ceedings of IEEE conference on computer communications of ad hoc and sensor networks, Alexandria, VA, 30 Octo-
(INFOCOM), Hong Kong, China, 26 April–1 May ber 2006, pp.169–176. New York: ACM.
2015, pp.513–521. New York: IEEE. 21. Amin F, Jahangir AH and Rasifard H. Analysis of
9. Liu J, Li Y, Chen M, et al. Software-defined Internet of public-key cryptography for wireless sensor networks
Things for smart urban sensing. IEEE Commun Mag security. Int J Comput Elec Autom Contr Inf Eng 2008;
2015; 53(9): 55–63. 2(5): 529–534.
10. Jararweh Y, Al-Ayyoub M, Benkhelifa E, et al. SDIoT: a 22. Ling CH, Lee CC, Yang CC, et al. A secure and efficient
software defined based Internet of Things framework. J one-time password authentication scheme for WSN. Int J
Ambient Intell Humaniz Comput 2015; 6(4): 453–461. Netw Secur 2017; 19(2): 177–181.
11. Floodlight controller, http://www.projectfloodlight.org/ 23. Lantz B, Heller B and McKeown N. A network in a lap-
12. POX controller, https://github.com/noxrepo/pox top: rapid prototyping for software-defined networks. In:
13. OpenDaylight controller, https://www.opendaylight.org/ Proceedings of the 9th ACM SIGCOMM workshop on hot
14. McKeown N, Anderson T, Balakrishnan H, et al. Open- topics in networks, Monterey, CA, 20–21 October 2010,
Flow: enabling innovation in campus networks. ACM p.19. New York: ACM.
SIGCOMM Comput Commun Rev 2008; 38(2): 69–74. 24. Open vSwitch, http://openvswitch.org/
15. Hong S, Xu L, Wang H, et al. Poisoning network visibi- 25. ARP spoofing, http://su2.info/doc/arpspoof.php
lity in software-defined networks: new attacks and 26. Wireshark, https://www.wireshark.org/

Vous aimerez peut-être aussi