مشخصات مقاله | |
ترجمه عنوان مقاله | افزایش امنیت اینترنت اشیا با استفاده از شبکه نرم افزار محور |
عنوان انگلیسی مقاله | Enhancing Internet of Things Security using Software-Defined Networking |
انتشار | مقاله سال 2020 |
تعداد صفحات مقاله انگلیسی | 6 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | Scopus – Master Journals List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
1.678 در سال 2019 |
شاخص H_index | 42 در سال 2020 |
شاخص SJR | 0.271 در سال 2019 |
شناسه ISSN | 1383-7621 |
شاخص Quartile (چارک) | Q3 در سال 2019 |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر، مهندسی فناوری اطلاعات |
گرایش های مرتبط | امنیت اطلاعات، مهندسی نرم افزار، اینترنت و شبکه های گسترده |
نوع ارائه مقاله |
ژورنال |
مجله | مجله معماری سیستم ها – Journal of Systems Architecture |
دانشگاه | Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia |
کلمات کلیدی | کنترل دسترسی، شبکه نرم افزار محور، پروتکل برنامه محدود، اینترنت اشیا |
کلمات کلیدی انگلیسی | Access control، Software-Defined Networking، Constrained application protocol، Internet of Things |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.sysarc.2020.101779 |
کد محصول | E15002 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract 1. Introduction 2. Background and related work 3. System overview 4. System design 5. Evaluation 6. Conclusions and future work Declaration of Competing Interests Acknowledgments References |
بخشی از متن مقاله: |
Abstract
Access control technologies are fundamental for addressing the security and privacy requirements of the Internet of Things (IoT). This paper proposes an access control solution for Constrained Application Protocol (CoAP)- based IoT services. The proposed solution considers a network of a single provider that interconnects various IoT endpoints. It leverages the Software-Defined Networking (SDN) paradigm and implements application aware policy enforcement at the network level. All operations are transparent to the IoT endpoints and no modifications are required to the IoT communication protocol. Furthermore, our solution is built on standard OpenFlow, hence it is realistic and it can be easily deployed to an existing network. We prove the feasibility of our solution through a proof of concept implementation using network emulation. Introduction Nowadays, many aspects of our life are controlled–or assisted–by cyber-physical systems. The so-called Internet of Things (IoT) is already used in many domains, including agriculture, patient monitoring, home automation, well-being, smart cities, and many others. The IoT is mainly composed of devices which may be deprived of computational power, continuous network connectivity, energy, or even physical security. Therefore, it comes as no surprise that applying security solutions in this environment is a challenging problem. In this paper, we focus on a particular aspect of security, that is access control. We consider the case of a network of a single operator that interconnects various IoT devices. These devices provide resources or actuation services, and can be accessed using the Constrained Application Protocol(CoAP) [1]. In order to motivate our solution, we consider the use case of a smart city management system. This system is composed of IoT sensors (e.g., temperature sensors) and actuators (e.g., switches). Our goal is to enable system administrators to define context-aware access control policies that will mediate access to the IoT devices. More formally, we want to provide a Mandatory Access Control (MAC) solution where policies are centrally defined by the system administrators and cannot be modified or overridden by end users. An example of such policy, in our reference system, is the case of a switch that turns on and off street lights; in that case the system administrator could create an access control policy that defines that “street lights switches can be turned on after 8pm and turned off after 6am, and all operations should originate from the management center building”. |