Affiliation:
1. Département d’informatique et d’ingénierie, Université du Québec en Outaouais, Gatineau, QC J8X 3X7, Canada
2. School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON K1N 6N5, Canada
Abstract
Data security on the Internet of Things (IoT) is usually implemented through encryption. This paper presents a solution based on routing, in which data are forwarded only to entities that are intended to receive them according to security requirements of secrecy (also called confidentiality), integrity, and conflicts. Our solution is generic in the sense that it can be used in any network, together with encryption as appropriate. We use the fact that, in any network, security requirements generate a partial order of equivalence classes of entities, and each entity can be labeled according to the position of its equivalence class in the partial order. Routing tables among entities can be compiled using the labels. The method is demonstrated in this paper for software-defined networking (SDN) routers and controllers. We propose a centralized IoT architecture with a cloud structure using SDN as networking infrastructure, where storage entities (i.e., cloud servers) are associated with application entities. A small ‘hospital’ example is shown for illustration. Procedures for network reconfigurations are presented. We also demonstrate the method for the normal case where different partial orders, representing distinct but concurrent security requirements, coexist among a set of entities. The method proposed does not impose an overhead on the normal functioning of SDN networks since it requires calculations only when the network must be reconfigured because of administrative intervention or policies. These occasional updates can be done efficiently and offline.
Funder
Natural Sciences and Engineering Research Council of Canada
Reference36 articles.
1. Bishop, M. (2019). Computer security, Art and Science, Pearson Addison-Wesley. [2nd ed.].
2. Internet of Things security: A survey;Alaba;J. Netw. Comput. Appl.,2017
3. Singh, J., Pasquier, T., and Bacon, J. (2015, January 7–9). Securing tags to control information flows within the Internet of Things. Proceedings of the International Conference on Recent Advances in Internet of Things, RIoT 2015, Singapore.
4. Research on security issues of the Internet of Things;Qiang;Int. J. Future Commun. Netw.,2013
5. Privacy research directions;Landwehr;Comm. ACM,2016