SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1317
Software Defined Networking Architecture for Empowering Internet of
Things & Enhancing Security Features Using Software Defined
Networking: Survey & Discussion
Ms. Arundhati Ubhad1, Dr.Prof Parikshit Mahalle2
1Department of Computer Engineering Smt Kashibai Navale College of Engineering
Vadgaon, Pune, Savitribai Phule Pune University Maharashtra(India)
2Professor & Head, Dept of Computer Engineering Smt Kashibai Navale College of Engineering
Vadgaon, Pune, Savitribai Phule Pune University Maharashtra(India)
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The Internet of things has gained enormous
attention in today’s world. Most of the organizations have
started showing interest in IoT and has resulted in
deployments in various areas such as IoT subnetworks where
multiple heterogenous wireless solutions co-exist. As the
devices in the IoT environment are geographically distributed
and open they need to be managed and especially in dynamic
environment where the end user’s need changes is a key
technical challenge. Today’s IT industries are growing
exponentially, the programmability of network will be critical
for business growth. In this systematic survey on SDN, we
investigate the need for SDN, its architecture and the new
features provided by SDN which proves to be useful in
enhancing the network security.
Key Words: SDN, IoT, OpenFlow
1.INTRODUCTION
The concept of the IoT became popular in1999,through
the Auto-Id centre at MIT and related market analysis
publications. Radio frequency identification(RFID)wasseen
as a perquisite for IOT at that point[17]. If all the objects and
people in daily life were equipped with identifiers,
computers could manage and inventory them. Besidesusing
RFID tagging of things may be achieved through such
technologies as near field communication, barcodes, QR
codes, Bluetooth and digital watermarking. The internet of
things is not the result of single novel technology; instead
several complementary technical developments provide
capabilities that taken together help to bridge the gap
between the virtual and physical world [10].
Basically, IoT is an technology which aims towards
connecting physical objects, devices through the internet.
The physical devices can be connected to the internet
through Wi-Fi (802.11),3G, 4G network, LTE network and
Bluetooth. As the millions of devices are connected to the
network, the complexity of connecting these millions of
devices increases. Also, the networks has to find these
devices and connect with them and then routethetrafficand
make the rules about how each individual device will be
used followed by monitoring each of these connections and
the data that will be generated by them. So SDN becomes
important in internet of things to avoid this growing level of
complexity. SDN helps in finding and connecting with these
devices and then routing their traffic. Contrast to that with a
single router we might have to write thousand lines of code
to accomplish this but with SDN it can be handled with few
mouse clicks.
Software defined networking is an emerging technology
and proves to be promising for future networks. It uses
OpenFlow protocol for its implementation[10].OpenFlowis
the key component to understand the SDN concept and
many research ideas based on SDN/OpenFlow have been
proposed and are still emerging [12] [13] [14]. In the
traditional methodsofmanagementi.e.configurationisdone
device by device or system- by- system using manual
methods and simply cannot scale at the rate required today.
Thus, automation via network programmability isoneofthe
ways in which IT combat the cost associated with rapid
growth without burning out engineers.Thus,wecansaythat
software defined networking is not only good for networks
but also for business. SDN allows us to maximize the
security, performance while keeping up with ever changing
business needs. As sdn has the abilitytocopeupdynamically
with the changing user needs or the new traffic patterns,
security incidents and policy changes will enable IoT
environments to deliver on their promise.
2. MOTIVATION
Software defined networks were created in response to
demands from large data centers who found problems
coping with unpredictable traffic patterns. These traffic
patterns would cause very high demands for particular
resources that couldn’t meet with existinginfrastructure. So,
there were two choices either to scale the network
infrastructure to meet the peaks which is very expensive or
to build a network which canreconfigureitselfautomatically
to cope with those peaks and channel the resources to meet
the appropriate demands.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1318
2.1 Traditional networking architecture
Fig 1: Traditional n/w architecture
Here in the above figure (1), we can see that there is
separate control plane (CP) and data plane(DP) for each
device. Each plane has a separate task that provides overall
switching and routing functionality. Thus, network manager
needs to configure each device separately whichisverytime
consuming task. In addition to that, there is no complete
network view. Also, the network needs changesdynamically
and thus cannot meet to the end users demands.
Problems associated with traditional networking
architecture
->Scalability
->Classification of data and routing traffic
->Time Consuming
->Multi-vendor environmentrequireshighlevel ofexpertise
->Decentralized network control
Thus, to address the problems associated with traditional
networking architecture, the concept of Software defined
networking architecture was introduced.
2.2 Software defined networking
architecture
Fig 2: SDN Controller
Figure (2) shows the SDN architecture in which both the
control and data planes are decoupled having only one
centralized controller.Aprogrammableinterfaceisprovided
to the separated control plane having intelligence added to
them. Software defined networks are dynamic and resilient,
coping with the real time demands of IoT.
SDN controller features:
 Network Programmability:AstheSDN controllers
can be programmed it is possible to apply the
sophisticated filters to the packets and control the
incoming and outgoing traffic.
 Scalability: As the SDN deals with heterogenous
network, SDN controller interactswiththedifferent
devices and number of devices can be added or
removed to the network without affecting its
performance.
 Centralized Monitoring: SDN controller enables
the IT organization the end-to-end network flow
visibility. An SDN controllerusestheOpenFlowdata
to identify the problem on a given flow and changes
the path of the flow that it takes.
 Visualization: SDN controllerprovidevisualization
of the multiple virtual networks that run on the
physical network. Controller also allow the
organization to see the flow from both the physical
and virtual network perspective to get the detailed
information.
 Performance:SDN controllerpre-populatetheflow
tables to its maximum possible extent and have
good processing and I/O capability that ensures
centralized controller is not the bottleneck.
3. LITERATURE SURVEY
a) Haopei Wang, Lei Xu, Guofei Gu[ 1] focuses on the
reactive controllers and consequent security threatsagainst
them. A defence framework for sdn networks known as
floodguard which is scalable, efficient, lightweight and
protocol independent is proposed in this paper to prevent
data-to-control plane saturation. Floodguard system uses
proactive flow rule analyser and proactive migration for
preventing data-to-control plane saturation attack. Impact
on bandwidth under different attack rates with and without
floodguard is evaluated.
b) Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan,
Vijay Mann [2] explains SPHINX - controller agnostic tool
that takes advantage of the flow graphstodetectthesecurity
threats on network topology and data plane forwarding
emerging within software-defined-networks. SPHINX
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1319
incrementally updates theflowgraphanddetectstheattacks
in real time that some controllers are vulnerable to.
c) Vandana C.P [15] explains the overview of the current
state of the IoT with the security challenges like object
identification, privacy and integrity, authentication and
authorization and malware in IoT. Software-defined-
networksconceptalong with theSoftware-defined-networks
based IoT architecture is discussed. Also, the security
mechanism based on the concepts of segment controllerand
gateway controllers are highlighted.
d) Seungwon Shin, Lei Xu, Sungmin Hong, Guofei Gu [3]
explains the features provided by software-defined-
networks such as dynamic flow control, network wide
visibility with centralized control,network programmability
and simplified data plane. In addition to these features, how
network security benefits from these above mentioned
features is illustrated with examples. Thus in-depth-
investigation is done in this paper on how software defined
networking features can bringbenefitstosecurityillustrated
with state-of-art research in related areas.
e) Shiva Rowshanrad, Sahar Namvarasl, Vajihe Abdi,
Maryam Hajizadeh, Manijeh Keshtgary [4] presents the
software-defined-networks capabilities, deployment,
applications and the challenges faced giving the broader
view of the concept. Also, the brief introduction to the
history of programmable networks and different protocols
which are used for communicationsuchasOpenFlow,XMPP,
OnePk is given.
f) Hai Huang1, Jiping Zhu1, Lei Zhang2[5] proposes a
network management framework in which software-
defined-network is combined with IoT. The devices in the
network can be managed and configured dynamically based
on SDN. It also improves the reconfigurationandflexibilityof
devices and the proposed framework mainly focuses on
M2M transactions. Thus, the authors addresses the
integration solution between the IoT devices and SDN.
g) Muhammad H. Razaa, Shyamala C. Sivakumarb, Ali
Nafarieha, Bill Robertsona [6] presents the two types of
SDN implementation strategies i.e. proprietary and open
source. Author compares and comes out with some notable
differences between them suchasnetwork control,feedback
from physical layer to logical layer, stability and vendor
support and standardization.
h) Eun Joo Kim, Jong Arm Jun, Nae-Soo Kim [16] provides
the method for configuring the data trafficpathsinIoT based
SDN and configuring function for each switch node
constituting the configureddata trafficpaths.Italsoprovides
the terminal with path list information where the user can
select the most appropriate path suitable for a service
demanded by the user. Thus, this overall activity enhances
the performance and service quality.
i) Ola Salman Imad Elhajj Ayman Kayssi Ali Chehab[7 ]
focuses on the control plane of the SDN architecture.Astudy
is carried out on new controllers such as ONOS and Libfluid
based controllers are tested using Cbench, an OpenFlow
testing tool in this paper. Also, the comparison of multiple
controllers is carried out based on several different
parameters and found that OpenDayLight isa goodchoice as
a full featured controller.
j) Yaser Jararweh1, Mahmoud Al-Ayyoub1, Ala’
Darabseh1, Elhadj Benkhelifa2, Mladen Vouk3, Andy
Rindos4 [8] proposes the framework for SDIoT exploiting
the several software defined systems such as SDN, SDStore
andSDSec. SDIoT solution accelerates and facilitates the IoT
control and management operations. Also, the three main
components of the proposed architecture i.e. physical layer,
control layer and application layer are illustrated.
4.GAP ANALYSIS
Table -1: Gap analysis
Paper Authentication Authorization Scalability Security Performance
a YES NO YES YES GOOD
b NO NO YES YES GOOD
c NO NO YES YES MODERATE
d YES NO NO YES GOOD
e NO NO NO LESS SECURE MODERATE
f YES YES NO LESS SECURE MODERATE
g NO NO NO YES GOOD
h YES NO YES LESS SECURE GOOD
i NO NO YES LESS SECURE GOOD
j YES NO NO LESS SECURE MODERATE
Proposed
System
YES YES YES YES GOOD
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1320
The above table shows the gap analysis which is carried out
using some parameters like authentication, authorization,
scalability, security and scalability. When it comes to
providing security to the SDN authentication and
authorization plays vital role. Also the performance of the
controller needs to be evaluated. Thus Paper[1], [4], [6],[8],
[10] does the authentication of the arrived packets . Also the
system needs to be scalable as the SDN network is dynamic
and user needs changes and number of devices keep on
adding or removing the system should work effectively
without affecting the overall performance.
Thus, the proposed architecture must be scalable, secure,
preserve the integrity of data and have low performance
overhead.
4.PROPOSED ARCHITECTURE
Fig 3: SDN working based on IoT layers
The three IoT layers are perception layer, network layerand
application layer are shown in fig (3). Perception layer
senses the data from physical as well as human worlds in
IoT. RFID devices, GPS and camera enabled devices, sensor
devices comprises this layer and main functionality of this
device is things identification and intelligent acquisition.
This layer is the core layer of the IoT structure due to this
functionality.
Network layer is responsible for exchanging the
information and data transfer and the SDN controller
processes the data here.
Application layer runs the particular application and it
provides human - machine interface. Thus the proposed
architecture tries to be scalable, and have low performance
overhead with the authentication andauthorizationsecurity
features.
5. CONCLUSIONS
In this paper, we discussed the need for SDN and showed
how IoT and SDN are related to each other. Some of the
features provided by SDN are also discussed. In this survey
an in-depth investigation is carried out on how SDN works
on the IoT layers. By decoupling the control plane from data
plane SDN can cope up dynamically with the changing user
needs and it can maximize the performance and IT
organizations can benefit from it.
REFERENCES
[1] Haopei Wang,Lei Xu, Guofei Gu, “ FloodGuard: A DoS
Attack Prevention Extension inSoftware-DefinedNetworks”
[2] Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, and
Vijay Mann. SPHINX: Detecting Security Attacks in
SoftwareDefined Networks. In NDSS’15, 2015.
[3] Seungwon Shin,Lei Xu, Sungmin Hong, Guofei Gu,
“Enhancing Network Security through Software Defined
Networking (SDN)”
[4] Shiva Rowshanrad , Sahar Namvarasl, Vajihe Abdi,
Maryam Hajizadeh, Manijeh Keshtgary, “A survey on SDN,
the future of netwoking” Journal of advanced computer
science and technology, doi: 10.14419/jacst.v3i2.3754
[5] H. Huang, J. Zhu, and L. Zhang, “An sdn based
management framework for iot devices,” in Irish Signals &
Systems Conference 2014 and 2014 China-Ireland
International Conference on Information and
Communications Technologies (ISSC 2014/CIICT 2014).
25th IET. IET, 2013, pp. 175–179.
[6] Muhammad H. Razaa, Shyamala C. Sivakumarb, Ali
Nafarieha, Bill Robertsona, “A Comparison of Software
defined network(SDN) Implementation Strategies”
doi:10.1016/j.procs.2014.05.532
[7] Ola Salman Imad Elhajj Ayman Kayssi Ali Chehab, “SDN
Controllers: A Comparative study”
doi:10.1109/MELCON.2016.7495430
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1321
[8] Y. Jararweh, M. Al-Ayyoub, A. Darabseh, E. Benkhelifa, M.
Vouk, and R.Andy,“Sdiot:a softwaredefined basedinternetof
things frame work,” Journal of Ambient Intelligence and
Humanized Computing, 2015.
[9] What is docker? [Online]. Available:
https://www.docker.com/ what-docke
[10] B. Eleonora, “The internet of things vision: key features,
applications and open issues,” Computer Communications,
2014 - Elsevier, 2014.
[11] OpenFlow. Innovate Your Network.
http://www.openflow.org.
[12] R. S. Braga, E. Mota, and A. Passito. Lightweight DDoS
Flooding Attack Detection Using NOX/Open Flow. In
Proceedings of the35th Annual IEEE Conference on Local
Computer Networks, LCN, 2010.
[13] Ankur Nayak, Alex Reimers, Nick Feamster, and Russ
Clark. Resonance: Dynamic Access Control for Enterprise
Networks. In Proceedings of WREN, 2009.
[14] Sungmin Hong, Robert Baykov, Lei Xu, Srinath
Nadimpalli, and Guofei Gu. Towards SDN-Defined
Programmable BYOD (Bring Your Own Device) Security. In
NDSS’16, 2016.
[15] Vandana C.P, “Security improvement in IoT based on
Software defined networking” ISSN:2278-7798
[16] Eun Joo Kim, Jong Arm Jun, Nae-Soo Kim, “ A Packet
scheduling Strategy for Heterogeneous Traffic of Internet of
Things”.
[17] Bose I, Pal R, “Auto-ID: managing anything, anywhere,
anytime in the supply chain”, Communications of the ACM,
vol. 48, no. 8, 2005, pp 100-106.

More Related Content

What's hot

AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
IJCNCJournal
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
IJNSA Journal
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Underwriters Laboratories
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
eSAT Publishing House
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET Journal
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
 
1570272924-3
1570272924-31570272924-3
1570272924-3
Raluca Ciungu
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
 
Secure final
Secure finalSecure final
Secure final
Vinoth Barithi
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
IJNSA Journal
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
IJNSA Journal
 

What's hot (20)

AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
1570272924-3
1570272924-31570272924-3
1570272924-3
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
Secure final
Secure finalSecure final
Secure final
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 

Similar to Software Defined Networking Architecture for Empowering Internet of Things & Enhancing Security Features using Software Defined Networking: Survey & Discussion

Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
IRJET Journal
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
 
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET Journal
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
IRJET Journal
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Fernando Velez Varela
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
IRJET Journal
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
 
What is SDN.pdf
What is SDN.pdfWhat is SDN.pdf
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
Shamima Akther
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
IJECEIAES
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
IRJET Journal
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoT
IRJET Journal
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET Journal
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
SANDEEP MITTAPALLY
 
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET Journal
 

Similar to Software Defined Networking Architecture for Empowering Internet of Things & Enhancing Security Features using Software Defined Networking: Survey & Discussion (20)

Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
What is SDN.pdf
What is SDN.pdfWhat is SDN.pdf
What is SDN.pdf
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoT
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 

Recently uploaded (20)

Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 

Software Defined Networking Architecture for Empowering Internet of Things & Enhancing Security Features using Software Defined Networking: Survey & Discussion

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1317 Software Defined Networking Architecture for Empowering Internet of Things & Enhancing Security Features Using Software Defined Networking: Survey & Discussion Ms. Arundhati Ubhad1, Dr.Prof Parikshit Mahalle2 1Department of Computer Engineering Smt Kashibai Navale College of Engineering Vadgaon, Pune, Savitribai Phule Pune University Maharashtra(India) 2Professor & Head, Dept of Computer Engineering Smt Kashibai Navale College of Engineering Vadgaon, Pune, Savitribai Phule Pune University Maharashtra(India) ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The Internet of things has gained enormous attention in today’s world. Most of the organizations have started showing interest in IoT and has resulted in deployments in various areas such as IoT subnetworks where multiple heterogenous wireless solutions co-exist. As the devices in the IoT environment are geographically distributed and open they need to be managed and especially in dynamic environment where the end user’s need changes is a key technical challenge. Today’s IT industries are growing exponentially, the programmability of network will be critical for business growth. In this systematic survey on SDN, we investigate the need for SDN, its architecture and the new features provided by SDN which proves to be useful in enhancing the network security. Key Words: SDN, IoT, OpenFlow 1.INTRODUCTION The concept of the IoT became popular in1999,through the Auto-Id centre at MIT and related market analysis publications. Radio frequency identification(RFID)wasseen as a perquisite for IOT at that point[17]. If all the objects and people in daily life were equipped with identifiers, computers could manage and inventory them. Besidesusing RFID tagging of things may be achieved through such technologies as near field communication, barcodes, QR codes, Bluetooth and digital watermarking. The internet of things is not the result of single novel technology; instead several complementary technical developments provide capabilities that taken together help to bridge the gap between the virtual and physical world [10]. Basically, IoT is an technology which aims towards connecting physical objects, devices through the internet. The physical devices can be connected to the internet through Wi-Fi (802.11),3G, 4G network, LTE network and Bluetooth. As the millions of devices are connected to the network, the complexity of connecting these millions of devices increases. Also, the networks has to find these devices and connect with them and then routethetrafficand make the rules about how each individual device will be used followed by monitoring each of these connections and the data that will be generated by them. So SDN becomes important in internet of things to avoid this growing level of complexity. SDN helps in finding and connecting with these devices and then routing their traffic. Contrast to that with a single router we might have to write thousand lines of code to accomplish this but with SDN it can be handled with few mouse clicks. Software defined networking is an emerging technology and proves to be promising for future networks. It uses OpenFlow protocol for its implementation[10].OpenFlowis the key component to understand the SDN concept and many research ideas based on SDN/OpenFlow have been proposed and are still emerging [12] [13] [14]. In the traditional methodsofmanagementi.e.configurationisdone device by device or system- by- system using manual methods and simply cannot scale at the rate required today. Thus, automation via network programmability isoneofthe ways in which IT combat the cost associated with rapid growth without burning out engineers.Thus,wecansaythat software defined networking is not only good for networks but also for business. SDN allows us to maximize the security, performance while keeping up with ever changing business needs. As sdn has the abilitytocopeupdynamically with the changing user needs or the new traffic patterns, security incidents and policy changes will enable IoT environments to deliver on their promise. 2. MOTIVATION Software defined networks were created in response to demands from large data centers who found problems coping with unpredictable traffic patterns. These traffic patterns would cause very high demands for particular resources that couldn’t meet with existinginfrastructure. So, there were two choices either to scale the network infrastructure to meet the peaks which is very expensive or to build a network which canreconfigureitselfautomatically to cope with those peaks and channel the resources to meet the appropriate demands.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1318 2.1 Traditional networking architecture Fig 1: Traditional n/w architecture Here in the above figure (1), we can see that there is separate control plane (CP) and data plane(DP) for each device. Each plane has a separate task that provides overall switching and routing functionality. Thus, network manager needs to configure each device separately whichisverytime consuming task. In addition to that, there is no complete network view. Also, the network needs changesdynamically and thus cannot meet to the end users demands. Problems associated with traditional networking architecture ->Scalability ->Classification of data and routing traffic ->Time Consuming ->Multi-vendor environmentrequireshighlevel ofexpertise ->Decentralized network control Thus, to address the problems associated with traditional networking architecture, the concept of Software defined networking architecture was introduced. 2.2 Software defined networking architecture Fig 2: SDN Controller Figure (2) shows the SDN architecture in which both the control and data planes are decoupled having only one centralized controller.Aprogrammableinterfaceisprovided to the separated control plane having intelligence added to them. Software defined networks are dynamic and resilient, coping with the real time demands of IoT. SDN controller features:  Network Programmability:AstheSDN controllers can be programmed it is possible to apply the sophisticated filters to the packets and control the incoming and outgoing traffic.  Scalability: As the SDN deals with heterogenous network, SDN controller interactswiththedifferent devices and number of devices can be added or removed to the network without affecting its performance.  Centralized Monitoring: SDN controller enables the IT organization the end-to-end network flow visibility. An SDN controllerusestheOpenFlowdata to identify the problem on a given flow and changes the path of the flow that it takes.  Visualization: SDN controllerprovidevisualization of the multiple virtual networks that run on the physical network. Controller also allow the organization to see the flow from both the physical and virtual network perspective to get the detailed information.  Performance:SDN controllerpre-populatetheflow tables to its maximum possible extent and have good processing and I/O capability that ensures centralized controller is not the bottleneck. 3. LITERATURE SURVEY a) Haopei Wang, Lei Xu, Guofei Gu[ 1] focuses on the reactive controllers and consequent security threatsagainst them. A defence framework for sdn networks known as floodguard which is scalable, efficient, lightweight and protocol independent is proposed in this paper to prevent data-to-control plane saturation. Floodguard system uses proactive flow rule analyser and proactive migration for preventing data-to-control plane saturation attack. Impact on bandwidth under different attack rates with and without floodguard is evaluated. b) Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann [2] explains SPHINX - controller agnostic tool that takes advantage of the flow graphstodetectthesecurity threats on network topology and data plane forwarding emerging within software-defined-networks. SPHINX
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1319 incrementally updates theflowgraphanddetectstheattacks in real time that some controllers are vulnerable to. c) Vandana C.P [15] explains the overview of the current state of the IoT with the security challenges like object identification, privacy and integrity, authentication and authorization and malware in IoT. Software-defined- networksconceptalong with theSoftware-defined-networks based IoT architecture is discussed. Also, the security mechanism based on the concepts of segment controllerand gateway controllers are highlighted. d) Seungwon Shin, Lei Xu, Sungmin Hong, Guofei Gu [3] explains the features provided by software-defined- networks such as dynamic flow control, network wide visibility with centralized control,network programmability and simplified data plane. In addition to these features, how network security benefits from these above mentioned features is illustrated with examples. Thus in-depth- investigation is done in this paper on how software defined networking features can bringbenefitstosecurityillustrated with state-of-art research in related areas. e) Shiva Rowshanrad, Sahar Namvarasl, Vajihe Abdi, Maryam Hajizadeh, Manijeh Keshtgary [4] presents the software-defined-networks capabilities, deployment, applications and the challenges faced giving the broader view of the concept. Also, the brief introduction to the history of programmable networks and different protocols which are used for communicationsuchasOpenFlow,XMPP, OnePk is given. f) Hai Huang1, Jiping Zhu1, Lei Zhang2[5] proposes a network management framework in which software- defined-network is combined with IoT. The devices in the network can be managed and configured dynamically based on SDN. It also improves the reconfigurationandflexibilityof devices and the proposed framework mainly focuses on M2M transactions. Thus, the authors addresses the integration solution between the IoT devices and SDN. g) Muhammad H. Razaa, Shyamala C. Sivakumarb, Ali Nafarieha, Bill Robertsona [6] presents the two types of SDN implementation strategies i.e. proprietary and open source. Author compares and comes out with some notable differences between them suchasnetwork control,feedback from physical layer to logical layer, stability and vendor support and standardization. h) Eun Joo Kim, Jong Arm Jun, Nae-Soo Kim [16] provides the method for configuring the data trafficpathsinIoT based SDN and configuring function for each switch node constituting the configureddata trafficpaths.Italsoprovides the terminal with path list information where the user can select the most appropriate path suitable for a service demanded by the user. Thus, this overall activity enhances the performance and service quality. i) Ola Salman Imad Elhajj Ayman Kayssi Ali Chehab[7 ] focuses on the control plane of the SDN architecture.Astudy is carried out on new controllers such as ONOS and Libfluid based controllers are tested using Cbench, an OpenFlow testing tool in this paper. Also, the comparison of multiple controllers is carried out based on several different parameters and found that OpenDayLight isa goodchoice as a full featured controller. j) Yaser Jararweh1, Mahmoud Al-Ayyoub1, Ala’ Darabseh1, Elhadj Benkhelifa2, Mladen Vouk3, Andy Rindos4 [8] proposes the framework for SDIoT exploiting the several software defined systems such as SDN, SDStore andSDSec. SDIoT solution accelerates and facilitates the IoT control and management operations. Also, the three main components of the proposed architecture i.e. physical layer, control layer and application layer are illustrated. 4.GAP ANALYSIS Table -1: Gap analysis Paper Authentication Authorization Scalability Security Performance a YES NO YES YES GOOD b NO NO YES YES GOOD c NO NO YES YES MODERATE d YES NO NO YES GOOD e NO NO NO LESS SECURE MODERATE f YES YES NO LESS SECURE MODERATE g NO NO NO YES GOOD h YES NO YES LESS SECURE GOOD i NO NO YES LESS SECURE GOOD j YES NO NO LESS SECURE MODERATE Proposed System YES YES YES YES GOOD
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1320 The above table shows the gap analysis which is carried out using some parameters like authentication, authorization, scalability, security and scalability. When it comes to providing security to the SDN authentication and authorization plays vital role. Also the performance of the controller needs to be evaluated. Thus Paper[1], [4], [6],[8], [10] does the authentication of the arrived packets . Also the system needs to be scalable as the SDN network is dynamic and user needs changes and number of devices keep on adding or removing the system should work effectively without affecting the overall performance. Thus, the proposed architecture must be scalable, secure, preserve the integrity of data and have low performance overhead. 4.PROPOSED ARCHITECTURE Fig 3: SDN working based on IoT layers The three IoT layers are perception layer, network layerand application layer are shown in fig (3). Perception layer senses the data from physical as well as human worlds in IoT. RFID devices, GPS and camera enabled devices, sensor devices comprises this layer and main functionality of this device is things identification and intelligent acquisition. This layer is the core layer of the IoT structure due to this functionality. Network layer is responsible for exchanging the information and data transfer and the SDN controller processes the data here. Application layer runs the particular application and it provides human - machine interface. Thus the proposed architecture tries to be scalable, and have low performance overhead with the authentication andauthorizationsecurity features. 5. CONCLUSIONS In this paper, we discussed the need for SDN and showed how IoT and SDN are related to each other. Some of the features provided by SDN are also discussed. In this survey an in-depth investigation is carried out on how SDN works on the IoT layers. By decoupling the control plane from data plane SDN can cope up dynamically with the changing user needs and it can maximize the performance and IT organizations can benefit from it. REFERENCES [1] Haopei Wang,Lei Xu, Guofei Gu, “ FloodGuard: A DoS Attack Prevention Extension inSoftware-DefinedNetworks” [2] Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, and Vijay Mann. SPHINX: Detecting Security Attacks in SoftwareDefined Networks. In NDSS’15, 2015. [3] Seungwon Shin,Lei Xu, Sungmin Hong, Guofei Gu, “Enhancing Network Security through Software Defined Networking (SDN)” [4] Shiva Rowshanrad , Sahar Namvarasl, Vajihe Abdi, Maryam Hajizadeh, Manijeh Keshtgary, “A survey on SDN, the future of netwoking” Journal of advanced computer science and technology, doi: 10.14419/jacst.v3i2.3754 [5] H. Huang, J. Zhu, and L. Zhang, “An sdn based management framework for iot devices,” in Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014). 25th IET. IET, 2013, pp. 175–179. [6] Muhammad H. Razaa, Shyamala C. Sivakumarb, Ali Nafarieha, Bill Robertsona, “A Comparison of Software defined network(SDN) Implementation Strategies” doi:10.1016/j.procs.2014.05.532 [7] Ola Salman Imad Elhajj Ayman Kayssi Ali Chehab, “SDN Controllers: A Comparative study” doi:10.1109/MELCON.2016.7495430
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1321 [8] Y. Jararweh, M. Al-Ayyoub, A. Darabseh, E. Benkhelifa, M. Vouk, and R.Andy,“Sdiot:a softwaredefined basedinternetof things frame work,” Journal of Ambient Intelligence and Humanized Computing, 2015. [9] What is docker? [Online]. Available: https://www.docker.com/ what-docke [10] B. Eleonora, “The internet of things vision: key features, applications and open issues,” Computer Communications, 2014 - Elsevier, 2014. [11] OpenFlow. Innovate Your Network. http://www.openflow.org. [12] R. S. Braga, E. Mota, and A. Passito. Lightweight DDoS Flooding Attack Detection Using NOX/Open Flow. In Proceedings of the35th Annual IEEE Conference on Local Computer Networks, LCN, 2010. [13] Ankur Nayak, Alex Reimers, Nick Feamster, and Russ Clark. Resonance: Dynamic Access Control for Enterprise Networks. In Proceedings of WREN, 2009. [14] Sungmin Hong, Robert Baykov, Lei Xu, Srinath Nadimpalli, and Guofei Gu. Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security. In NDSS’16, 2016. [15] Vandana C.P, “Security improvement in IoT based on Software defined networking” ISSN:2278-7798 [16] Eun Joo Kim, Jong Arm Jun, Nae-Soo Kim, “ A Packet scheduling Strategy for Heterogeneous Traffic of Internet of Things”. [17] Bose I, Pal R, “Auto-ID: managing anything, anywhere, anytime in the supply chain”, Communications of the ACM, vol. 48, no. 8, 2005, pp 100-106.