Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

A security-driven network architecture for routing in industrial Internet of Things - 2021

A Security-Driven Network Architecture For Routing In Industrial Internet Of Things

Research Area:  Internet of Things

Abstract:

Industrial Internet of Things (IIoT), as the integration of industrial network and IoT, has attracted a lot of attention from both academia and industry. However, with such integration deepens, many issues suffered by the industrial networks are exposed and magnified. The secure routing is a key focus, since the industrial environment is extremely vulnerable and many potential threats (eg, distributed denial of service and selfish attacks) are introduced due to the connection to the Internet. In order to prevent the threats from the Internet and embrace the benefits of IIoT, a security-driven network framework for routing is particularly designed. Specifically, we first leverage the technologies of software-defined networking (SDN), network function virtualization (NFV), and blockchain to create the overall framework which is flexible, programmable, and secure. On one hand, the three-level structure of SDN/NFV is applied to each domain, based on which we can flexibly control and program the underlying forwarding devices in this domain for the purpose of calculating the optimal routing policies. On the other hand, the blockchain is applied among different SDN controllers to create a trust and untamperable environment. Then, under this framework, a secure routing mechanism is proposed as well to prevent the attacks on the basis of node identity authentication and node behavior authentication. The simulation experiments are carried out on the OMNet++ platform and the experimental results indicate that the proposed mechanism outperforms the other state-of-the-art methods in terms of scalability and robustness especially when encountering malicious attacks.

Keywords:  

Author(s) Name:  Jian Cao,Xingwei Wang,Min Huang,Bo Yi,Qiang He

Journal name:  Transactions on Emerging Telecommunications Technologies

Conferrence name:  

Publisher name:  Wiley

DOI:  10.1002/ett.4216

Volume Information:  Volume32, Issue4 April 2021