THANK YOU FOR SUBSCRIBING
There has been an immense growth in the Internet of Things (IoT) in the past few years as more physical devices are connected with the internet.
FREMONT, CA: Traditionally, each IoT device consists of a sensor, actuator, communication infrastructure, and a processing unit with few software (firmware). Such devices might be small, often resource-constrained, and also embedded in various other real-world objects. They are heterogeneous with separate operating systems and connectivity capabilities ranging from wireless to mobile networks. So when it comes to their security and management, they can pose significant and unique challenges.
Software-Defined Networks (SDN) features are leveraged to develop a secure IoT architecture. SDN-based secure IoT architecture uses policies to control and manage IoT devices, services, and network entities such as switches and gateways.
Typically, an IoT device will either sense data, send it to a remote location, receive data, and perform some limited actions. Gateways forward the data being sent and received from the devices to other devices and entities in the network.
Two security applications have been developed to perform authentication and authorization services in the implementation of the architecture. These applications run in the SDN controller and enable secure management of the IoT devices in the network infrastructure.
The security architecture is used to protect IoT infrastructures from various security attacks. The architecture helps prevent well-known attacks like Mirai, which first injects malware into IoT devices and then launches a coordinated DDoS attack using these infected devices. The architecture can also counteract attacks such as spoofing or masquerading and Man-in-The-Middle (MiTM) attacks.
5G the next step
5G promises a more IoT friendly ecosystem is supporting multiple IoT devices across different domains with more incredible data speeds and lower latency. This extended security architecture will combine network function virtualization (NFV) technology to provide authentication functions at the edge devices with the SDN controller-based security policy-driven authorization enabling secure management of distributed applications over 5G networks.