| Literature DB >> 30642089 |
Alejandro Molina Zarca1, Dan Garcia-Carrillo2, Jorge Bernal Bernabe3, Jordi Ortiz4, Rafael Marin-Perez5, Antonio Skarmeta6.
Abstract
The increase of Software Defined Networks (SDN) and Network Function Virtualization (NFV) technologies is bringing many security management benefits that can be exploited at the edge of Internet of Things (IoT) networks to deal with cyber-threats. In this sense, this paper presents and evaluates a novel policy-based and cyber-situational awareness security framework for continuous and dynamic management of Authentication, Authorization, Accounting (AAA) as well as Channel Protection virtual security functions in IoT networks enabled with SDN/NFV. The virtual AAA, including network authenticators, are deployed as VNF (Virtual Network Function) dynamically at the edge, in order to enable scalable device's bootstrapping and managing the access control of IoT devices to the network. In addition, our solution allows distributing dynamically the necessary crypto-keys for IoT Machine to Machine (M2M) communications and deploy virtual Channel-protection proxys as VNFs, with the aim of establishing secure tunnels among IoT devices and services, according to the contextual decisions inferred by the cognitive framework. The solution has been implemented and evaluated, demonstrating its feasibility to manage dynamically AAA and channel protection in SDN/NFV-enabled IoT scenarios.Entities:
Keywords: AAA; IoT; NFV; SDN; bootstrapping; channel protection; security policies
Year: 2019 PMID: 30642089 PMCID: PMC6359622 DOI: 10.3390/s19020295
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1ANASTACIA Framework Architecture overview.
Figure 2vAAA and vChannel-Protection deployment in the IoT network.
Figure 3Authentication and Authorization proactive policy enforcement process.
Figure 4IoT bootstrapping.
Figure 5Authorization process.
Figure 6Softwarized and centralized Channel Protection Flow.
Figure 7Mean time of policy operation per policy type.
Figure 8Mean time of each IoT operation (AuthN, AuthZ, Channel Protection).
Number of exchanges and bytes per IoT device operation.
| IoT Device Operation | Message Count | Total Bytes | ||
|---|---|---|---|---|
| Bootstrapping w/PANA | 11 | 636 | 1.7816 | 0.0059 |
| Getting Cap Token w/PANA [ | 2 | 836 | 1.5058 | 0.2418 |
| DTLS Handshake | 9 | 1200 | 2.5634 | 0.3167 |
| Publishing information w/DTLS | 24 | 3081 | 8.4733 | 0.3254 |
Measurements by process.
| Process | Policy Refinement | Policy Translation | Policy Enforcement | IoT Actuation | Total (s) |
|---|---|---|---|---|---|
| AuthN | 0.049 | 0.082 | 0.087 | 1.781 (Bootstrapping) |
|
| AuthZ | 0.043 | 0.038 | 0.023 | 1.505 (CapToken) |
|
| Channel Prot. | 0.045 | 0.091 | 0.357 | 2.544 (Handshake) |
|
|
|
|
|
|
|
|
Figure 9Scalability evaluation.