Open Access iconOpen Access

REVIEW

Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions

Ahmad Rahdari1,6, Ahmad Jalili2, Mehdi Esnaashari3, Mehdi Gheisari1,4,7,8,*, Alisa A. Vorobeva5, Zhaoxi Fang1, Panjun Sun1,*, Viktoriia M. Korzhuk5, Ilya Popov5, Zongda Wu1, Hamid Tahaei1

1 Institute of Artificial Intelligence, Shaoxing University, Shaoxing, 312000, China
2 Department of Computer Engineering, Gonbad Kavous University, Gonbad-e Kavus, 49717-99151, Iran
3 Faculty of Computer Engineering, K. N. Toosi University of Technology, Tehran, 196976-4499, Iran
4 Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, 602105, India
5 Secure Information Technologies Department, National Research University ITMO, St. Petersburg, 197101, Russia
6 School of Electrical and Computer Engineering, Shiraz University, Shiraz, 71946–84334, Iran
7 Department of Computer Science and Engineering, Islamic Azad University, Damavand, 1477893855, Iran
8 Department of R&D, Shenzhen BKD Co., Ltd., Shenzhen, 518000, China

* Corresponding Authors: Mehdi Gheisari. Email: email; Panjun Sun. Email: email

Computers, Materials & Continua 2024, 80(2), 2511-2533. https://doi.org/10.32604/cmc.2024.052994

Abstract

Software-Defined Networking (SDN) represents a significant paradigm shift in network architecture, separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment. Concurrently, the Internet of Things (IoT) connects numerous devices to the Internet, enabling autonomous interactions with minimal human intervention. However, implementing and managing an SDN-IoT system is inherently complex, particularly for those with limited resources, as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN integration. The findings of this study underscore the primary security and privacy challenges across application, control, and data planes. A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy protection. Recent investigations have explored cutting-edge methods, such as leveraging blockchain for transaction recording to enhance security and privacy, along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Moreover, the analysis indicates that encryption and hashing techniques are prevalent in the data plane, whereas access control and certificate authorization are prominently considered in the control plane, and authentication is commonly employed within the application plane. Additionally, this paper outlines future directions, offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem.

Keywords


Cite This Article

APA Style
Rahdari, A., Jalili, A., Esnaashari, M., Gheisari, M., Vorobeva, A.A. et al. (2024). Security and privacy challenges in sdn-enabled iot systems: causes, proposed solutions, and future directions. Computers, Materials & Continua, 80(2), 2511-2533. https://doi.org/10.32604/cmc.2024.052994
Vancouver Style
Rahdari A, Jalili A, Esnaashari M, Gheisari M, Vorobeva AA, Fang Z, et al. Security and privacy challenges in sdn-enabled iot systems: causes, proposed solutions, and future directions. Comput Mater Contin. 2024;80(2):2511-2533 https://doi.org/10.32604/cmc.2024.052994
IEEE Style
A. Rahdari et al., “Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions,” Comput. Mater. Contin., vol. 80, no. 2, pp. 2511-2533, 2024. https://doi.org/10.32604/cmc.2024.052994



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1144

    View

  • 256

    Download

  • 0

    Like

Share Link