2021
DOI: 10.1109/jiot.2020.3017354
|View full text |Cite
|
Sign up to set email alerts
|

Securing SDN-Controlled IoT Networks Through Edge Blockchain

Abstract: The Internet of Things (IoT) connected by Software Defined Networking (SDN) promises to bring great benefits to cyber-physical systems. However, the increased attack surface offered by the growing number of connected vulnerable devices and separation of SDN control and data planes could overturn the huge benefits of such a system. This paper addresses the vulnerability of the trust relationship between the control and data planes. To meet this aim, we propose an edge computing based blockchain-as-a-service (Ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 29 publications
(25 citation statements)
references
References 39 publications
0
23
0
Order By: Relevance
“…In our H-chain solution, the leading BCA in each organisation is in charge of public information verification. Our earlier work [ 28 ] introduced a single-organisation, PBFT-based, workflow in which leading BCAs run a permissioned-PoW once there is a new block. In this paper, we extend this approach to both PBFT- and PoW-based consensus, applicable across not only single but also multiple organisations.…”
Section: System Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…In our H-chain solution, the leading BCA in each organisation is in charge of public information verification. Our earlier work [ 28 ] introduced a single-organisation, PBFT-based, workflow in which leading BCAs run a permissioned-PoW once there is a new block. In this paper, we extend this approach to both PBFT- and PoW-based consensus, applicable across not only single but also multiple organisations.…”
Section: System Modelmentioning
confidence: 99%
“…Again we use the scenario of an IoT scenario with secured SDN to illustrate the workflow, but it could equally apply to any data/process verification. The workflow proceeds as follows: Leading BCAs collect the new data, for example, SDN flow rule [ 28 ], that is ready for verification, and build a block. We define the computational latency of this step as , where the latency is proportional to the blocksize s .…”
Section: System Modelmentioning
confidence: 99%
See 3 more Smart Citations