Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems

Ivan Farris, J.B Bernabe, Nassima Toumi, D. Garcia-Carrillo, Tarik Taleb, A. Skarmeta, B. Sahlin

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

29 Citations (Scopus)

Abstract

Nowadays the adoption of IoT solutions is gaining high momentum in several fields, including energy, home and environment monitoring, transportation, and manufacturing. However, cybersecurity attacks to low-cost end-user devices can severely undermine the expected deployment of IoT solutions in a broad range of scenarios. To face these challenges, emerging software-based networking features can introduce new security enablers, providing further scalability and flexibility required to cope with massive IoT. In this paper, we present a novel framework aiming to exploit SDN/NFV-based security features and devise new efficient integration with existing IoT security approaches. The potential benefits of the proposed framework is validated in two case studies. Finally, a feasibility study is presented, accounting for potential interactions with open-source SDN/NFV projects and relevant standardization activities.
Original languageEnglish
Title of host publication2017 IEEE Conference on Standards for Communications and Networking (CSCN),
PublisherIEEE
Pages169-174
Number of pages6
ISBN (Electronic)978-1-5386-3070-9
DOIs
Publication statusPublished - Sep 2017
MoE publication typeA4 Article in a conference publication
EventIEEE Conference on Standards for Communications and Networking - Helsinki, Finland
Duration: 18 Sep 201720 Dec 2017

Publication series

NameIEEE Conference on Standards for Communications and Networking (CSCN)
PublisherIEEE

Conference

ConferenceIEEE Conference on Standards for Communications and Networking
CountryFinland
CityHelsinki
Period18/09/201720/12/2017

Fingerprint Dive into the research topics of 'Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems'. Together they form a unique fingerprint.

Cite this