2021
DOI: 10.1109/jiot.2020.3043740
|View full text |Cite
|
Sign up to set email alerts
|

SDN-Enabled Secure IoT Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(18 citation statements)
references
References 42 publications
0
13
0
Order By: Relevance
“…Moreover, the authors taken an energy-efficient approach into account for Industry 4.0 but not mentioned stability. On the similar research, an IoT network protection framework by using the core technologies provided by the SDN proposed by [19] such an advanced protection strategy including IoT system authentication and authorizing approved flows will help secure IoT networks from malicious IoT devices and attacks. However for Peer to Peer (P2P) con-nectivity between IoT systems and SDN controllers, [20] proposed design that utilizes public and private Blockchains, to remove Proof-of-Work (POW), in addition, the proposed model has used cluster configuration routing algorithm to maximize energy usage and improve protection.…”
Section: B Literature Reviewmentioning
confidence: 99%
“…Moreover, the authors taken an energy-efficient approach into account for Industry 4.0 but not mentioned stability. On the similar research, an IoT network protection framework by using the core technologies provided by the SDN proposed by [19] such an advanced protection strategy including IoT system authentication and authorizing approved flows will help secure IoT networks from malicious IoT devices and attacks. However for Peer to Peer (P2P) con-nectivity between IoT systems and SDN controllers, [20] proposed design that utilizes public and private Blockchains, to remove Proof-of-Work (POW), in addition, the proposed model has used cluster configuration routing algorithm to maximize energy usage and improve protection.…”
Section: B Literature Reviewmentioning
confidence: 99%
“…Hereinafter, we review the most recent surveys (published within the last five years) regarding such technologies and their integration, briefly discussing the aspects on which each work is focused. 5 SDN. In [37], the authors discuss the 5G network softwarization and slicing strategy based on SDN and Network Function Virtualization (NFV) technologies.…”
Section: Related Surveysmentioning
confidence: 99%
“…For instance, to provide better system security, it is necessary to permit the use of resources only among authorized users [ 4 ]. This limits the possibility that third-party users get control over the system and lowers the frequency of attacks [ 5 ]. Further, the large number of connected devices creates a huge amount of data passing from one system segment to another, producing enormous traffic in turn.…”
Section: Introductionmentioning
confidence: 99%
“…In Addition, an utilized SDN and blockchain techniques proposed in [23] to remove the unnecessary re-authentication. Also, in [24] granular policies enforced to secure the flows in the IoT network infrastructure with providing networking authentication for IoT device.…”
Section: Sdn Security Framework For Iotmentioning
confidence: 99%