Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks

被引:75
|
作者
Li, Cheng [1 ]
Qin, Zhengrui [2 ]
Novak, Ed [3 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
[2] Northwest Missouri State Univ, Sch Comp Sci & Informat Syst, Maryville, MO 64468 USA
[3] Franklin & Marshall Coll, Comp Sci Dept, Lancaster, PA 17603 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2017年 / 4卷 / 05期
基金
美国国家科学基金会;
关键词
Fog computing; Internet of Things (IoT); man-in-the-middle (MitM) attack; software-defined networking (SDN);
D O I
10.1109/JIOT.2017.2685596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While the Internet of Things (IoT) is making our lives much easier, managing the IoT becomes a big issue due to the huge number of connections, and the lack of protections for devices. Recent work shows that software-defined networking (SDN) has a great capability in automatically and dynamically managing network flows. Besides, switches in SDNs are usually powerful machines, which can be used as fog nodes simultaneously. Therefore, SDN seems a good choice for IoT-Fog networks. However, before deploying to IoT-Fog networks, the security of the OpenFlow channel between the controller and its switches need to be addressed. Since all the controller commands are sent through this channel, once compromised, the network will be completely controlled by an attacker. This is a disaster for both the network service providers and their customers. Previous works on SDN security either protect controllers themselves or make a strong assumption that the OpenFlow channel is already secured. Using TLS to encrypt the channel is not a "silver-bullet" solution due to the known TLS vulnerabilities. In this paper, we specifically investigate the potential threats of man-in-the-middle attacks on the OpenFlow control channel. We first introduce a feasible attack model in an IoT-Fog architecture, and then we implement attack demonstrations to show the severe consequences of such attacks. Additionally, we propose a lightweight countermeasure using Bloom filters. We implement a prototype for this method to monitor stealthy packet modifications. The result of our evaluation shows that our Bloom filter monitoring system is efficient and consumes few resources.
引用
收藏
页码:1156 / 1164
页数:9
相关论文
共 50 条
  • [1] An SDN perspective IoT-Fog security: A survey
    Javanmardi, Saeed
    Shojafar, Mohammad
    Mohammadi, Reza
    Alazab, Mamoun
    Caruso, Antonio M.
    [J]. COMPUTER NETWORKS, 2023, 229
  • [2] IoT-Fog based system structure with SDN enabled
    Khakimov, Abdukodir
    Ateya, Abdelhamied A.
    Muthanna, Ammar
    Gudkova, Irina
    Markova, Ekaterina
    Koucheryavy, Andrey
    [J]. ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [3] FUPE: A security driven task scheduling approach for SDN-based IoT-Fog networks
    Javanmardi, Saeed
    Shojafar, Mohammad
    Mohammadi, Reza
    Nazari, Amin
    Persico, Valerio
    Pescape, Antonio
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [4] SIMAD: Secure intelligent method for IoT-Fog environments attacks detection
    Daoud, Wided Ben
    Mahfoudhi, Sami
    [J]. Computers, Materials and Continua, 2022, 70 (02): : 2727 - 2742
  • [5] SIMAD: Secure Intelligent Method for IoT-Fog Environments Attacks Detection
    Ben Daoud, Wided
    Mahfoudhi, Sami
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 2727 - 2742
  • [6] TwI-FTM: Two-way IoT-FoG trust management scheme for task offloading in IoT-FoG networks
    Premalatha, B.
    Prakasam, P.
    [J]. RESULTS IN ENGINEERING, 2024, 22
  • [7] S-FoS: A secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks
    Javanmardi, Saeed
    Shojafar, Mohammad
    Mohammadi, Reza
    Persico, Valerio
    Pescape, Antonio
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [8] e-TOALB: An efficient task offloading in IoT-fog networks
    Lone, Kalimullah
    Sofi, Shabir Ahmad
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (06):
  • [9] FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks
    Zhang, Menghao
    Bi, Jun
    Bai, Jiasong
    Li, Guanyu
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 681 - 692
  • [10] An intelligent real-time workloads allocation in IoT-fog networks
    Sadeghzadeh, Mohammad
    Mohammadi, Reza
    Nassiri, Mohammad
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (08): : 11191 - 11213