{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T10:50:28Z","timestamp":1725187828463},"reference-count":31,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T00:00:00Z","timestamp":1531699200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Network Mgmt"],"published-print":{"date-parts":[[2018,9]]},"abstract":"Summary<\/jats:title>Billions of Internet of Things (IoT) devices are expected to populate our environments and provide novel pervasive services by interconnecting the physical and digital world. However, the increased connectivity of everyday objects can open manifold security vectors for cybercriminals to perform malicious attacks. These threats are even augmented by the resource constraints and heterogeneity of low\u2010cost IoT devices, which make current host\u2010based and static perimeter\u2010oriented defense mechanisms unsuitable for dynamic IoT environments. Accounting for all these considerations, we reckon that the novel softwarization capabilities of Telco network can fully leverage its privileged position to provide the desired levels of security. To this aim, the emerging software\u2010defined networking (SDN) and network function virtualization (NFV) paradigms can introduce new security enablers able to increase the level of IoT systems protection. In this paper, we design a novel policy\u2010based framework aiming to exploit SDN\/NFV\u2010based security features, by efficiently coupling with existing IoT security approaches. A proof of concept test bed has been developed to assess the feasibility of the proposed architecture. The presented performance evaluation illustrates the benefits of adopting SDN security mechanisms in integrated IoT environments and provides interesting insights in the policy enforcement process to drive future research.<\/jats:p>","DOI":"10.1002\/nem.2038","type":"journal-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T15:20:48Z","timestamp":1531754448000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Enhancing IoT security through network softwarization and virtual security appliances"],"prefix":"10.1002","volume":"28","author":[{"given":"Alejandro","family":"Molina Zarca","sequence":"first","affiliation":[{"name":"Department of Information and Communication Engineering (DIIC) University of Murcia Murcia Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7538-4788","authenticated-orcid":false,"given":"Jorge","family":"Bernal Bernabe","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering (DIIC) University of Murcia Murcia Spain"}]},{"given":"Ivan","family":"Farris","sequence":"additional","affiliation":[{"name":"Department of Communications and Networking Aalto University Espoo Finland"}]},{"given":"Yacine","family":"Khettab","sequence":"additional","affiliation":[{"name":"Department of Communications and Networking Aalto University Espoo Finland"}]},{"given":"Tarik","family":"Taleb","sequence":"additional","affiliation":[{"name":"Department of Communications and Networking Aalto University Espoo Finland"}]},{"given":"Antonio","family":"Skarmeta","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering (DIIC) University of Murcia Murcia Spain"}]}],"member":"311","published-online":{"date-parts":[[2018,7,16]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.12.004"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845052"},{"key":"e_1_2_10_5_1","doi-asserted-by":"crossref","unstructured":"FarrisI BernabeJB ToumiN et al.Towards provisioning of SDN\/NFV\u2010based security enablers for integrated protection of IoT systems. In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN);2017;Helsinki Finland.169\u2010174.","DOI":"10.1109\/CSCN.2017.8088617"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.092812.121712"},{"key":"e_1_2_10_7_1","doi-asserted-by":"crossref","unstructured":"GalluccioL MilardoS MorabitoG PalazzoS.SDN\u2010wise: design prototyping and experimentation of a stateful SDN solution for wireless sensor networks. In: 2015 IEEE Conference on Computer Communications (INFOCOM) IEEE;2015;Kowloon Hong Kong.513\u2010521.","DOI":"10.1109\/INFOCOM.2015.7218418"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2015.7387950"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2421391"},{"key":"e_1_2_10_10_1","unstructured":"SherwoodR GibbG YapK\u2010K et al.Flowvisor: A network virtualization layer. OpenFlow Switch Consortium Tech. Rep;2009.\u00a0 1\u201313."},{"key":"e_1_2_10_11_1","unstructured":"ShinSW PorrasP YegneswaranV FongM GuG TysonM.Fresco: Modular composable security services for software\u2010defined networks. In: 20th Annual Network & Distributed System Security Symposium NDSS;2013; San Diego CA United States."},{"key":"e_1_2_10_12_1","doi-asserted-by":"crossref","unstructured":"ShinS XuL HongS GuG.Enhancing network security through software defined networking (SDN). In: 2016 25th International Conference on Computer Communication and Networks (ICCCN);2016;Waikoloa HI USA.1\u20109.","DOI":"10.1109\/ICCCN.2016.7568520"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.05.005"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666270"},{"key":"e_1_2_10_16_1","unstructured":"SuhJ ChoiHG YoonW YouT KwonT ChoiY.Implementation of content\u2010oriented networking architecture (CONA): a focus on DDoS countermeasure. In: Proceedings of European NetF\u2010PGA Developers Workshop;2010."},{"key":"e_1_2_10_17_1","doi-asserted-by":"crossref","unstructured":"ChakrabartyS EngelsDW ThathapudiS.Black SDN for the Internet of Things. In: 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems;2015;Dallas TX USA.190\u2010198.","DOI":"10.1109\/MASS.2015.100"},{"key":"e_1_2_10_18_1","doi-asserted-by":"crossref","unstructured":"BullP AustinR PopovE SharmaM WatsonR.Flow based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (ficloud);2016;Vienna Austria.157\u2010163.","DOI":"10.1109\/FiCloud.2016.30"},{"key":"e_1_2_10_19_1","doi-asserted-by":"crossref","unstructured":"FlauzacO Gonz\u00e1lezC HachaniA NolotF.SDN based architecture for IoT and improvement of the security. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops;2015; Gwangiu South Korea.688\u2010693.","DOI":"10.1109\/WAINA.2015.110"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4807804"},{"key":"e_1_2_10_21_1","unstructured":"ETSI ISG NFV.Etsi gs nfv\u2010sec 003 nfv; architectural framework v1.2.1;2014."},{"key":"e_1_2_10_22_1","doi-asserted-by":"crossref","unstructured":"FurfaroA GarroA TundisA.Towards security as a service (SecaaS): on the modeling of security services for cloud computing. In: 2014 International Carnahan Conference on Security Technology (ICCST) IEEE;2014;Rome Italy.1\u20106.","DOI":"10.1109\/CCST.2014.6986995"},{"key":"e_1_2_10_23_1","doi-asserted-by":"crossref","unstructured":"YuT SekarV SeshanS AgarwalY XuC.Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the internet\u2010of\u2010things. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks ACM;2015;Philadelphia PA.5.","DOI":"10.1145\/2834050.2834095"},{"key":"e_1_2_10_24_1","doi-asserted-by":"crossref","unstructured":"HafeezI DingAY SuomalainenL KirichenkoA TarkomaS.Securebox: Toward safer and smarter IoT networks. In: Proceedings of the 2016 ACM Workshop on Cloud\u2010Assisted Networking ACM;2016;Irvine California USA:55\u201060.","DOI":"10.1145\/3010079.3012014"},{"key":"e_1_2_10_25_1","doi-asserted-by":"crossref","unstructured":"BasileC LioyA PitscheiderC ValenzaF ValliniM.A novel approach for integrating security policy enforcement with dynamic network virtualization. In: 2015 1st IEEE Conference on Network Softwarization (NetSoft);2015;London UK.1\u20105.","DOI":"10.1109\/NETSOFT.2015.7116152"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16030358"},{"key":"e_1_2_10_27_1","unstructured":"Common Information Model (CIM) DMTF.http:\/\/www.dmtf.org\/standards\/cim"},{"key":"e_1_2_10_28_1","doi-asserted-by":"crossref","unstructured":"GaoY PengY XieF et al.Analysis of security threats and vulnerability for cyber\u2010physical systems. In: Proceedings of 2013 3rd International Conference on Computer Science and Network Technology;2013;Dalian China.50\u201055.","DOI":"10.1109\/ICCSNT.2013.6967062"},{"key":"e_1_2_10_29_1","article-title":"Providing ultra\u2010short latency to user\u2010centric 5G applications at the mobile network edge","volume":"29","author":"Farris I","year":"2017","journal-title":"Trans Emerg Telecommun Technol"},{"key":"e_1_2_10_30_1","unstructured":"SECURity at the network EDge.https:\/\/www.secured-fp7.eu\/"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.011"},{"issue":"99","key":"e_1_2_10_32_1","first-page":"2","article-title":"NFV: security threats and best practices","author":"Lal S","year":"2017","journal-title":"IEEE Commun Mag"}],"container-title":["International Journal of Network Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fnem.2038","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/nem.2038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T07:30:43Z","timestamp":1694503843000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/nem.2038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,16]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["10.1002\/nem.2038"],"URL":"https:\/\/doi.org\/10.1002\/nem.2038","archive":["Portico"],"relation":{},"ISSN":["1055-7148","1099-1190"],"issn-type":[{"value":"1055-7148","type":"print"},{"value":"1099-1190","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,16]]},"assertion":[{"value":"2017-12-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}