How SDN based Architecture improve the security for IoT?

IoT – Internet of things

What is IoT?

The International Telecommunication Union defines IoT as "(an) object of the physical world (physical things) or the information world (virtual world) capable of being identified and integrated into communication networks."

In 2021 the total number of IoT devices in the world will be 75.44 billion
Quick Fact!

How does IOT work?

Common physical things can communicate virtually with IoT technology, allowing them to be aware of events occurring at a distance or respond to an event that they cannot detect physically. When compared to personal mobile devices, IoT has limited processing power, storage, and volatile memory. As a result, it may be necessary to link to a Cloud Platform or a Fog Platform for further data processing.

Three major components enable IoT functions:

(i) Hardware—the network of connected, sensors embedded objects/devices;

(ii) Software—program used for data collection, storage, transporting, processing, devices instructions;

(iii) Data communication—the protocols and technologies for exchanging data.

What are the Applications of the Internet of Things?

IoT is a part of our daily lives, ranging from basic gadgets like baby monitors, health wristbands, smartwatches, voice-activated speakers, and smart refrigerators to more advanced devices like self-driving vehicles and low-resource devices like wireless body sensor networks (WBAN) and medical wireless sensor networks (MWSN). Simply put, IoT-enabled gadgets are all around us in our homes, businesses, streets, neighbourhoods and cities, and even in our bodies.

Different forms of IoT
wide application of IoT technology

As much as IoT is crucial in our daily lives, it is certain that IoT will play a crucial role in technological infrastructure in the following year.

IoT devices prediction for 2025
IoT devices prediction

While firms race to create new IoT devices with innovative uses, security is often an afterthought in many situations.

What is the Architecture of Internet of Things?

There are currently no recognized standards for IoT network architecture or design. The Internet of Things network may be separated into four major layers based on the flow of data and the various functionalities:

1. Perception/sensing layer - includes perception nodes and networks.

2. Networking/transport layer - has several sub-layers such as access network, core network, and LAN

3. Service/management layer - is where data is processed and analyzed while the application/interface layer is where data is collected.

4. Application/interface layer - Processed information gets consumed and is presented in business applications

IoT network Layers
IoT network Layers

What are the Security Concerns of Internet of Things?

Most IoT devices have a basic design that is based on the concept that they can be operated quickly and easily, or that everyday electronics may be converted to IoT by adding Internet connections. “The demands of launching a product rapidly can often lead to the omission of non-visible factors such as security and reliability.” Security problems are obviously not always considered as part of the IoT device production cycle, from hardware/software applications to frameworks.

Security researchers verified that the newest IoT devices communicate via a cloud infrastructure, which has known security flaws and may make IoT devices easy targets. Most IoT devices rely on newly developed, nascent platforms that may have security vulnerabilities. To make matters worse, many IoT devices lack the capability of updating their firmware and software, leaving them incredibly insecure and exposed to future breaches and attacks.

There are two main types of IoT attacks: attacks on architect layers, and attacks on data phases.

Human interactions produce content and data on the traditional Internet. It is common in the area of IoT for smart machines to gather and create data (sensors, actuators). Machines do not lie, but they may be manipulated to send or receive corrupted data.

Top 10 security problems with IoT devices:

1. Weak guessable, or hardcoded passwords;

2. Insecure network services;

3. Insecure ecosystem interfaces;

4. Lack of secure update mechanism;

5. Use of insecure or outdated components;

6. Insufficient privacy protection;

7. Insecure data transfer and storage;

8. Lack of device management;

9. Insecure default settings;

10. Lack of physical hardening.

How to protect our privacy?

We must ensure that the gathered data and data transmission match the requirements listed below:

1) confidentiality—transmitted data, communication among endpoints, sensors and readers are secured and encrypted;

2) integrity—transmitted data is accurate and complete;

3) authenticity—transmitted data is verified and come from authorized sensors, endpoints, and readers

SDN - Software-defined Network

What is Software Defined Networking (SDN)?

SDN is a network architectural method in which programmable switches are placed between the data and control planes to govern and alter data forwarding.

Software-defined networking vs traditional.

1) Because traditional networks are hardware-based, their infrastructure necessitates the use of physical devices such as switches and routers, limiting their speed and manipulability. While SDN is software-based, it may be managed virtually via the control plane. Instead of having defined functionalities, SDN can be quickly and readily updated as needed.

2) The Traditional network routers need high-level algorithms to identify the destination of packets. When it comes to SDN, the SDN controller communicates with network devices to centrally manage packets based on their configuration.

3) Additionally, the SDN controller provides important debugging tools that the IoT ecosystem may employ to improve security.

How does the IoT with SDN structure look like?

In the IoT with SDN structure, the SDN controller allows up to separate the network into isolated subnets. Furthermore, the SDN Controller communicates with the IoT application using a unique application programming interface (API) known as the ‘Northbound API'. The latter analyses network traffic and take actions depending on the rules that have been specified.

The controller, on the other hand, communicates with network switches using another API (referred to as the "Southbound API") depending on configured rules. Overall, the combination of IoT with SDN improves IoT operations and security by allowing full and remote control of network setup without requiring direct contacts with IoT devices.

Software Defined Networks and IoT structure
SDN and IoT structure

How does SDN work with IOT?

SDN is implemented via the Openflow Protocol. The SDN switch uses a flow table, which is similar to the routing table used by traditional routers. It does, however, support chaining and allows for the matching of a broader variety of fields, with each flow having its own set of actions.

When a packet arrives at a switch, it is compared to the flow table; if a match is detected, the relevant actions are carried out.

If no match is identified, as is expected with a newly inserted device, the received packet is transferred to the SDN controller throug