Security Issues in Programmable Routers for Future Internet

2011 ◽  
pp. 17-30 ◽  
Author(s):  
Raul Cafini ◽  
Walter Cerroni ◽  
Carla Raffaelli ◽  
Michele Savi
2019 ◽  
Vol 16 (1) ◽  
pp. 21-44 ◽  
Author(s):  
Nenad Petrovic

Due to increasing number of connected Internet of Things (IoT) devices, enormous amount of data needs to be transmitted to the Cloud for processing, while the network is becoming Cloud computing?s bottleneck. On the other side, the privacy and security issues in more sensitive application domains could dramatically restrict the freedom of data movement, so it is not possible to offload all the data to the Cloud for processing. Furthermore, the manual operations related to tuning and deployment of these applications are time-consuming and require additional effort. In this paper, a model-based framework for automated, semantic-driven (re-)deployment of containerized applications is presented, leveraging the synergy of Virtual Network Functions (VNFs) and SDN, tackling the mentioned issues.


Author(s):  
Nancy Ambritta P ◽  
Poonam N. Railkar ◽  
Parikshit N. Mahalle

Purpose – This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative Mutual Identity Establishment (CMIE) scheme which adopts the elliptical curve cryptography (ECC), to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as denial-of-service (DoS) and replay attack. Design/methodology/approach – This paper provides a comparative analysis of the existing protocols that address the security issues in the FI and also provides a CMIE scheme, by adopting the ECC and digital signature verification mechanism, to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as DoS and replay attack. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Further, the algorithm is evaluated against Automated Validation of Internet Security Protocols and Application (AVISPA) tool to verify the security solutions that the CMIE scheme has claimed to address to have been effectively achieved in reality. Findings – The algorithm is evaluated against AVISPA tool to verify the security solutions that the CMIE scheme has claimed to address and proved to have been effectively achieved in reality. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Research limitations/implications – Considering the Internet of Things (IoT) scenario, another important aspect that is the device-to-location (D2L) aspect has not been considered in this protocol. Major focus of the protocol is centered around the device-to-device (D2D) and device-to-server (D2S) scenarios. Also, IoT basically works upon a confluence of hundreds for protocols that support the achievement of various factors in the IoT, for example Data Distribution Service, Message Queue Telemetry Transport, Extensible Messaging and Presence Protocol, Constrained Application Protocol (CoAP) and so on. Interoperability of the proposed CMIE algorithm with the existing protocols has to be considered to establish a complete model that fits the FI. Further, each request for mutual authentication requires a querying of the database and a computation at each of the participating entities side for verification which could take considerable amount of time. However, for applications that require firm authentication for maintaining and ensuring secure interactions between entities prior to access control and initiation of actual transfer of sensitive information, the negligible difference in computation time can be ignored for the greater benefit that comes with stronger security. Other factors such as quality of service (QoS) (i.e. flexibility of data delivery, resource usage and timing), key management and distribution also need to be considered. However, the user still has the responsibility to choose the required protocol that suits one’s application and serves the purpose. Originality/value – The originality of the work lies in adopting the ECC and digital signature verification mechanism to develop a new scheme that ensures mutual authentication between participating entities in the FI based upon certain user information such as identities. ECC provides efficiency in terms of key size generated and security against main-in-middle attack. The proposed scheme provides secured interactions between devices/entities in the FI.


Author(s):  
Branka Mikavica ◽  
Aleksandra Kostić-Ljubisavljević

Future internet environment is affected by permanent and rapid changes, triggered by the emergence of high bandwidth-demanding services, applications, and contents. Cloud computing might be considered as the prelude of the future internet. Additionally, the concept of elastic optical networks is a widely accepted promising solution for the future internet. This chapter addresses the security aspects of the content provisioning process with cloud migration over elastic optical networks in the future internet environment. Key characteristics of the cloud computing and elastic optical networks relevant to the content provisioning process are presented. Major threats in each segment of the observed process, including vulnerabilities in the cloud computing and security issues in elastic optical networks, are considered.


Author(s):  
Yacine Rebahi ◽  
Nikolay Tcholtchev ◽  
Ranganai Chaparadza ◽  
Vassilis N. Merekoulias

Author(s):  
Sushruta Mishra ◽  
Soumya Sahoo ◽  
Brojo Kishore Mishra

In the IoTs era, the short-range mobile transceivers will be implanted in a variety of daily requirements. In this chapter, a detail survey in several security and privacy concerns related to internet of things (IoTs) by defining some open challenges are discussed. The privacy and security implications of such an evolution should be carefully considered to the promising technology. The protection of data and privacy of users has been identified as one of the key challenges in the IoT. In this chapter, the authors present internet of things with architecture and design goals. They survey security and privacy concerns at different layers in IoTs. In addition, they identify several open issues related to the security and privacy that need to be addressed by research community to make a secure and trusted platform for the delivery of future internet of things. The authors also discuss applications of IoTs in real life. A novel approach based on cognitive IoT is presented, and a detailed study is undertaken. In the future, research on the IoTs will remain a hot issue.


2020 ◽  
Vol 21 (3) ◽  
pp. 515-542
Author(s):  
Neelam Saleem Khan ◽  
Mohammad Ahsan Chishti

As the IoT is moving out of its early stages, it is emerging as an area of future internet. The evolving communication paradigm among cloud servers, Fog nodes and IoT devices are establishing a multilevel communication infrastructure. Fog provides a platform for IoT along with other services like networking, storage and computing. With the tremendous expansion of IoT, security threats also arise. These security hazards cannot be addressed by mere dependence on cloud model. In this paper we present an overview of security landscape of Fog computing, challenges, and, existing solutions. We outline major authentication issues in IoT, map their existing solutions and further tabulate Fog and IoT security loopholes. Furthermore this paper presents Blockchain, a decentralized distributed technology as one of the solutions for authentication issues in IoT. We tried to discuss the strength of Blockchain technology, work done in this field, its adoption in COVID-19 fight and tabulate various challenges in Blockchain technology. At last we present the Cell Tree architecture as another solution to address some of the security issues in IoT, outlined its advantages over Blockchain technology and tabulated some future course to stir some attempts in this area.


Sign in / Sign up

Export Citation Format

Share Document