Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN)

Author:

Stambouli Abdelouadoud1ORCID,Logrippo Luigi12ORCID

Affiliation:

1. Département d’informatique et d’ingénierie, Université du Québec en Outaouais, Gatineau, QC J8X 3X7, Canada

2. School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON K1N 6N5, Canada

Abstract

Data security on the Internet of Things (IoT) is usually implemented through encryption. This paper presents a solution based on routing, in which data are forwarded only to entities that are intended to receive them according to security requirements of secrecy (also called confidentiality), integrity, and conflicts. Our solution is generic in the sense that it can be used in any network, together with encryption as appropriate. We use the fact that, in any network, security requirements generate a partial order of equivalence classes of entities, and each entity can be labeled according to the position of its equivalence class in the partial order. Routing tables among entities can be compiled using the labels. The method is demonstrated in this paper for software-defined networking (SDN) routers and controllers. We propose a centralized IoT architecture with a cloud structure using SDN as networking infrastructure, where storage entities (i.e., cloud servers) are associated with application entities. A small ‘hospital’ example is shown for illustration. Procedures for network reconfigurations are presented. We also demonstrate the method for the normal case where different partial orders, representing distinct but concurrent security requirements, coexist among a set of entities. The method proposed does not impose an overhead on the normal functioning of SDN networks since it requires calculations only when the network must be reconfigured because of administrative intervention or policies. These occasional updates can be done efficiently and offline.

Funder

Natural Sciences and Engineering Research Council of Canada

Publisher

MDPI AG

Reference36 articles.

1. Bishop, M. (2019). Computer security, Art and Science, Pearson Addison-Wesley. [2nd ed.].

2. Internet of Things security: A survey;Alaba;J. Netw. Comput. Appl.,2017

3. Singh, J., Pasquier, T., and Bacon, J. (2015, January 7–9). Securing tags to control information flows within the Internet of Things. Proceedings of the International Conference on Recent Advances in Internet of Things, RIoT 2015, Singapore.

4. Research on security issues of the Internet of Things;Qiang;Int. J. Future Commun. Netw.,2013

5. Privacy research directions;Landwehr;Comm. ACM,2016

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3