Enhancing Privacy in Internet of Things using Software Defined Network

سال انتشار: 1405
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 19

فایل این مقاله در 18 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JECEI-14-1_013

تاریخ نمایه سازی: 15 بهمن 1404

چکیده مقاله:

kground and Objectives: The Internet of Things (IoT) serves as a fundamental communication model, enabling objects to deliver data and services to users. With the rapid expansion of IoT, ensuring privacy and preventing the disclosure of sensitive data during message exchanges between objects has become increasingly challenging. This paper presents an attribute-based framework designed to enhance privacy protection in IoT environments by leveraging software-defined networking (SDN) technology.Methods: By leveraging the SDN and the Attribute-Based Privacy Preserving (ABPP) model, our proposed framework employs an advanced algorithm to enhance privacy for client requests accessing IoT services. It focuses on protecting sensitive information during message transmission by implementing techniques for anonymity, unlinkability, and untraceability, tailored to the sensitivity level of each message. To further enhance message privacy within the IoT network, our framework incorporates IP aliasing, dynamic channel switching, and payload encryption.Results: Our proposed framework significantly enhances privacy protection in IoT networks by dynamically applying anonymity and concealment techniques tailored to the sensitivity of CoAP messages. Simulation results using CloudSimSDN confirm the framework's effectiveness in safeguarding sensitive information while maintaining optimal communication performance. Employing three privacy-preserving techniques results in an average CPU utilization that is ۰.۱۴ units higher compared to using a single technique. We provide a security evaluation that includes formal verification techniques and informal analysis, and show that the proposed framework is secure against anonymity and MITM attacks, replay attacks, Sybil, and IP spoofing.Conclusion: In this paper, we present a four-layer SDN-based framework designed to enhance privacy in IoT networks through the use of the Attribute-Based Privacy Preserving (ABPP) model. The framework employs IP aliasing, dynamic routing, and content encryption techniques tailored to the sensitivity of CoAP messages to ensure data protection. Our implementation and experiments conducted with CloudSimSDN validate the framework's effectiveness in safeguarding sensitive information.

کلیدواژه ها:

نویسندگان

Shahrbanoo Zangaraki

Department of Computer Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran.

S. Hossein Erfani

Department of Computer Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran.

Amir Sahafi

Department of Computer Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • ۲۰ ۱۰ ۲۰۲۳. [Online]. Available:https://www.statista.com/statistics/۴۷۱۲۶۴/iot-number-of-connected-devices-worldwide/ ...
  • D. E. Kouicem, A. Bouabdallah, H. Lakhlef, “Internet of things ...
  • G. Yang, "An Overview Of Current Solutions For Privacy In ...
  • H. Ahmadvand, C. Lal, H. Hemmati, M. Sookhak, M. Conti, ...
  • M. Amiri-Zarandi, R. A. Dara, E. Fraser, "A survey of ...
  • B. Ayodele, V. Buttigieg, “SDN as a defence mechanism: a ...
  • S. Bera, S. Misra, A. . V. Vasilakos, "Software-defined networking ...
  • D. Kreutz, F. M. V. Ramos, P. Verissimo, C. Esteve ...
  • P. M. Chanal, M. S. Kakkasageri, “Security and privacy in ...
  • S. Ullah, S. Ullah, M. Imran, “Recent developments in authentication ...
  • S. R. Mishra, B. Shanmugam, K. C. Yeo, S. Thennadil, ...
  • C. Bormann, A. P. Castellani, Z. Shelby, “CoAP: An application ...
  • Z. Shelby, K. Hartke, C. Bormann, "The Constrained Application Protocol ...
  • W. Bekri, R. Jmal, L. C. Fourati, “Internet of things ...
  • H. Farhady, H. Lee, A. Nakao, "Software-defined networking: A survey," ...
  • I. Alsmadi, D. Xu, "Security of software defined networks: A ...
  • B. MISHRA, A. KERTESZ, “The use of MQTT in M۲M ...
  • W. Wang, H. Zhao, J. Zhu, “GRPC: A communication cooperation ...
  • S. Zangarak, M. Mirabi, S. H. Erfani, A. Sahafi, “SecShield: ...
  • M. Seliem, K. Elgazzar, K. Khalil, "Towards privacy preserving iot ...
  • A. A. A. Sen, F. A. Eassa, K. Jambi, M. ...
  • G. Yang, “An overview of current solutions for privacy in ...
  • Q. Razi, R. Piyush, A. Chakrabarti, A. Singh, V. Hassija, ...
  • M. Gheisariy, G. Wang, W. Z. Khanz, C. Fernandez-Campusano, "A ...
  • V. Sridharan, K. Sudheera, K. Liyanage, M. Gurusamy, "Privacy-aware switch-controller ...
  • M. Gheisari, G. Wang, S. Chen, "An edge computing-enhanced internet ...
  • M. Gheisari, G. Wang, S. Chen, H. Ghorbani, "IoT-SDNPP: A ...
  • M. Gheisari, G. Wang, S. Chen, A. Seyfollahi, "A method ...
  • C. Ke, Z. Zhu, F. Xiao, Z. Huang, Y. Meng, ...
  • J. A. Alzubi, A. Movassagh, M. Gheisari, H. E. Najafabadi, ...
  • S. R. Alotaibi, H. Alfraihi, N. Alruwais, M. Maray, A. ...
  • M. Gheisari, H. Tahaei, M. Malik, E. Mnkandla, Z. Wang, ...
  • M. Conti, P. Kaliyar, C. Lal, "CENSOR: Cloud-enabled secure IoT ...
  • Y. Jararweh, M. Al-Ayyoub, A. Darabseh, E. Benkhelifa, M. Vouk, ...
  • J. Son, A. V. Dastjerdi, R. N. Calheiros, X. Ji, ...
  • S. ZakeriKia, R. Hajian, S. H. Erfani, A. M. Rahmani, ...
  • نمایش کامل مراجع