Skip to content
2000
Volume 18, Issue 5
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

The proliferation of IoT devices such as sensors, actuators, sensors, and other endpoints has resulted in a significant surge in data generation. Ensuring the security and efficiency of data transmission necessitates the implementation of an internet design that possesses the capability to scale as required. This study investigates the potential impact of SDN on enhancing the performance of IoT networks. This study examines the ability to adapt network resources in real-time to meet the demands of IoT applications. It is imperative to address the security vulnerabilities in the SDN architecture to ensure secure and reliable network operations. This paper thoroughly examines the challenges, various security solutions, and recommended practices for effectively protecting SDN infrastructures. This study comprehensively analyzes the pertinent scholarly works, conducts a comparative analysis of diverse security approaches, and assesses their respective advantages and limitations. The need for further investigation into the security aspects of SDN is also acknowledged. This article highlights the importance of enhancing security practices, implementing continuous monitoring, and identifying potential threats. Additionally, it presents case studies that exemplify real-world security challenges associated with SDN. Further, this study incorporates security solutions into SDN frameworks, emphasizing the significance of meticulous strategic preparation, comprehensive testing, and ongoing upkeep to ensure seamless interoperability with current systems. This study is significant as it contributes to the expanding literature on security in SDN. The comprehensive examination of existing literature, meticulous analysis, thorough review of security approaches, identification of issues and limitations, and exploration of potential avenues for future research in this work render it a valuable resource for researchers and practitioners investigating SDN security. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study provides comprehensive information on implementation, testbed settings, datasets, and experimental procedures to promote transparency and repeatability. The study presents findings from extensive testing and benchmarking, showcasing the effectiveness of security solutions in addressing different types of threats. The study focuses on achieving a harmonious equilibrium between accuracy and efficient utilization of resources. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study includes comprehensive information on implementation, testbed configuration, datasets, and experimental procedures to promote transparency and reproducibility. The study presents empirical evidence and analysis to support the effectiveness of security solutions in addressing different types of threats. It specifically focuses on achieving a trade-off between accuracy and efficient use of resources.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/0123520965273025231121173901
2025-06-01
2025-11-05
Loading full text...

Full text loading...

References

  1. ČolakovićA. HadžialićM. Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues.Comput. Netw.2018144173910.1016/j.comnet.2018.07.017
    [Google Scholar]
  2. HeD. ChanS. NiX. GuizaniM. Software-defined-networking-enabled traffic anomaly detection and mitigation.IEEE Internet Things J.2017461890189810.1109/JIOT.2017.2694702
    [Google Scholar]
  3. PolatH. PolatO. Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models.Sustainability2020123103510.3390/su12031035
    [Google Scholar]
  4. KhanS. AliM. SherN. AsimY. NaeemW. KamranM. Software-Defined Networks (SDNs) and Internet of Things (IoTs): A qualitative prediction for 2020.Int. J. Adv. Comput. Sci. Appl.201671138540410.14569/IJACSA.2016.071151
    [Google Scholar]
  5. VermaJ. BhandariA. SinghG. Recent advancements in the state of cloud security in cyber physical systems.Security and Resilience of Cyber Physical Systems.LondonChapman and Hall/CRC2022496010.1201/9781003185543‑5
    [Google Scholar]
  6. BeraS. MisraS. VasilakosA.V. Software-defined networking for internet of things: A survey.IEEE Internet Things J.2017461994200810.1109/JIOT.2017.2746186
    [Google Scholar]
  7. DayalN. MaityP. SrivastavaS. KhondokerR. Research trends in security and DDoS in SDN.Secur. Commun. Netw.201716386641110.1002/sec
    [Google Scholar]
  8. BadotraS. PandaS.N. SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking.Cluster Comput.2020012345678910.1007/s10586‑020‑03133‑y
    [Google Scholar]
  9. VermaJ. BhandariA. SinghG. Spark-based distributed intelligent network intrusion detection system for unified dataset. 2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1). Bangolor, India,16202310.1109/ICAIA57370.2023.10169765
    [Google Scholar]
  10. KumarP. TripathiM. NehraA. ContiM. LalC. SAFETY: Early detection and mitigation of TCP SYN flood utilizing entropy in SDN.IEEE Trans. Netw. Serv. Manag.20181541545155910.1109/TNSM.2018.2861741
    [Google Scholar]
  11. TivigT. BorcociE. BrumaruA. CiobanuA-I-E. Layer 3 forwarder application - implementation experiments based on Ryu SDN controller. 2021 International Symposium on Networks, Computers and Communications (ISNCC)Dubai, United Arab Emirates20211610.1109/ISNCC52172.2021.9615685
    [Google Scholar]
  12. Marín-TorderaE. Masip-BruinX. García-AlmiñanaJ. JukanA. RenG.J. ZhuJ. Do we all really know what a fog node is? Current trends towards an open definition.Comput. Commun.201710911713010.1016/j.comcom.2017.05.013
    [Google Scholar]
  13. HaeederM.N. MahdiN.J. POX controller and open flow performance evaluation in software defined networks (SDN) using mininet emulator. IOP Conference Series.: Material Science Engineering202010.1088/1757‑899X/881/1/012102
    [Google Scholar]
  14. BuragohainC. MedhiN. FlowTrApp: An SDN based architecture for DDoS attack detection and mitigation in data centers. 3rd International Conference on Signal Processing and Integrated Networks, SPIN 2016519524201610.1109/SPIN.2016.7566750
    [Google Scholar]
  15. BadotraS. PandaS.N. A review on software-defined networking enabled iot cloud computing.IIUM Eng. J.201920210512610.31436/iiumej.v20i2.1130
    [Google Scholar]
  16. HorvathR. NedbalD. StieningerM. A literature review on challenges and effects of software defined networking.Procedia Comput. Sci.20156455256110.1016/j.procs.2015.08.563
    [Google Scholar]
  17. BoussardM. DinhT.B. LaurentC. Software-defined LANs for interconnected smart environment.Proceedings - 2015 27th International Teletraffic Congress, ITC 2015201521922710.1109/ITC.2015.33
    [Google Scholar]
  18. SethiM. AhujaS. SinghS. SnehiJ. ChawlaM. An intelligent framework for alzheimer’s disease classification using efficientnet transfer learning model. 2022 International Conference on Emerging Smart Computing and Informatics (ESCI)20221410.1109/ESCI53509.2022.9758195
    [Google Scholar]
  19. FaeziS. ShirmarzA. A comprehensive survey on machine learning using in software defined networks (SDN).HCIS20233331234310.1007/s44230‑023‑00025‑3
    [Google Scholar]
  20. WenfengX. YonggangW. ChuanH.F. DusitN. HaiyongX. A survey on software-defined networking.Asian Pac. J. Reprod.2018727210.4103/2305‑0500.228016
    [Google Scholar]
  21. WangH. ZhouH. The research of intrusion detection system in cloud computing environment.Adv. Intell. Syst. Comp.2011128454910.1007/978‑3‑642‑25989‑0_8
    [Google Scholar]
  22. AtlamH. WaltersR. WillsG. Fog computing and the internet of things: A review.BDCC2018221010.3390/bdcc2020010
    [Google Scholar]
  23. MiyamuraT. MisawaA. KaniJ. Resource optimization of optical aggregation network for efficient software-defined datacenters.Opt. Switching Networking201932415010.1016/j.osn.2018.11.006
    [Google Scholar]
  24. AshfaqR.A.R. WangX.Z. HuangJ.Z. AbbasH. HeY.L. Fuzziness based semi-supervised learning approach for intrusion detection system.Inf. Sci.201737848449710.1016/j.ins.2016.04.019
    [Google Scholar]
  25. SharmaP.K. ChenM.Y. ParkJ.H. A software defined fog node based distributed blockchain cloud architecture for IoT.IEEE Access20186c11512410.1109/ACCESS.2017.2757955
    [Google Scholar]
  26. AikenJ. Scott-HaywardS. Investigating adversarial attacks against network intrusion detection systems in SDNs. IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2019 - Proceedings17201910.1109/NFV‑SDN47374.2019.9040101
    [Google Scholar]
  27. AleneziM. AlmustafaK. MeerjaK.A. Cloud based SDN and NFV architectures for IoT infrastructure.Egypt. Inform. J.201920111010.1016/j.eij.2018.03.004
    [Google Scholar]
  28. El-DairiM. HouseR.J. Optic nerve hypoplasia.Handbook of Pediatric Retinal OCT and the Eye-Brain Connection201928528710.1016/B978‑0‑323‑60984‑5.00062‑7
    [Google Scholar]
  29. SnehiM. BhandariA. An SDN/NFV based intelligent fog architecture for DDoS defense in cyber physical systems. 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)10-11 December 2021, MORADABAD, India202210.1109/SMART52563.2021.9676241
    [Google Scholar]
  30. SnehiJ. SnehiM. BagganV. BhandariA. AhujaR. Introspecting intrusion detection systems in dealing with security concerns in cloud environment. 10th International Conference on System Modeling & Advancement in Research Trends (SMART)202134534910.1109/SMART52563.2021.9676258
    [Google Scholar]
  31. HasanD. OthmanM. Efficient topology discovery in software defined networks: Revisited.Procedia Comput. Sci.201711653954710.1016/j.procs.2017.10.051
    [Google Scholar]
  32. VermaJ. BhandariA. SinghG. iNIDS: SWOT analysis and TOWS inferences of state-of-the-art NIDS solutions for the development of Intelligent Network Intrusion Detection System.Comput. Commun.202219522724710.1016/j.comcom.2022.08.022
    [Google Scholar]
  33. AliyuA.L. BullP. AbdallahA. Performance implication and analysis of the openflow SDN protocol. 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA)201739139610.1109/WAINA.2017.101
    [Google Scholar]
  34. de AlmeidaA.J.R. Santos-BoadaG. Sole-ParetaJ. A critical review of OpenFlow/SDN-based networks. 2014 16th International Conference on Transparent Optical Networks (ICTON)20221510.1109/ICTON.2014.6876509
    [Google Scholar]
  35. LiW. MengW. KwokL.F. A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures.J. Netw. Comput. Appl.20166812613910.1016/j.jnca.2016.04.011
    [Google Scholar]
  36. AditiSR KeerthanaM. SowmyaP. SivaramanE. OpenDaylight as software defined networking controller: Shortcomings and possible solutions. 2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)20221610.1109/CONECCT55679.2022.9865784
    [Google Scholar]
  37. KhattakZ.K. AwaisM. IqbalA. Performance evaluation of OpenDaylight SDN controller. Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS201567167610.1109/PADSW.2014.7097868
    [Google Scholar]
  38. AsadollahiS. GoswamiB. GonsaiA.M. Implementation of SDN using OpenDayLight Controller.IJIRCCE200732972218227
    [Google Scholar]
  39. SinghA. KaurN. KaurH. Extensive performance analysis of OpenDayLight (ODL) and Open Network Operating System (ONOS) SDN controllers.Microprocess. Microsyst.20229510471510.1016/j.micpro.2022.104715
    [Google Scholar]
  40. BerdeP. ONOS: towards an open, distributed SDN OS. Proceedings of the third workshop on Hot topics in software defined networking20141610.1145/2620728.2620744
    [Google Scholar]
  41. IurianC-M. IvanciuI-A. MarianB.M. ZincaD. DobrotaV. An SDN architecture for IoT networks using ONOS controller.2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)11-12 December 2020, Bucharest, Romania202010.1109/RoEduNet51892.2020.9324887
    [Google Scholar]
  42. EljackA.H. HassanA.H.M. ElaminH.H. Performance analysis of ONOS and floodlight SDN controllers based on TCP and UDP traffic. 2019 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)20191610.1109/ICCCEEE46830.2019.9071189
    [Google Scholar]
  43. RowshanradS. AbdiV. KeshtgariM. Performance evaluation of sdn controllers: Floodlight and opendaylight.IIUM Eng. J.2016172475710.31436/iiumej.v17i2.615
    [Google Scholar]
  44. LiY. GuoX. PangX. PengB. LiX. ZhangP. Performance analysis of floodlight and ryu SDN controllers under mininet simulator. 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops)2020859010.1109/ICCCWorkshops49972.2020.9209935
    [Google Scholar]
  45. AsadollahiS. GoswamiB. SameerM. Ryu controller’s scalability experiment on software defined networks. 2018 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC)20181510.1109/ICCTAC.2018.8370397
    [Google Scholar]
  46. BadaróV.N.F.J. MiguelC.J. de JesusA.C.S. SampaioP.N.M. SDN controllers - a comparative approach to market trends.HAL archives-ouvertes2021164851
    [Google Scholar]
  47. PriyadarshiniR. BarikR. K. A deep learning based intelligent framework to mitigate DDoS attack in fog environment.J. King Saud Univ. - Comput. Inf. Sci.201934382583110.1016/j.jksuci.2019.04.010
    [Google Scholar]
  48. IsyakuB. Mohd ZahidM.S. Bte KamatM. Abu BakarK. GhalebF.A. Software defined networking flow table management of openflow switches performance and security challenges: A survey.Future Internet202012914710.3390/fi12090147
    [Google Scholar]
  49. LawrenceN. LawrenceN. ItC. ZoneD. NetworkingS. Software Defined Networking (SDN) and its role in automating the provision and scaling of cloud native architectures in the data center through network programmability.2014162
    [Google Scholar]
  50. RazaM.H. SivakumarS.C. NafariehA. RobertsonB. A comparison of software defined network (SDN) implementation strategies.Procedia Comput. Sci.2014321050105510.1016/j.procs.2014.05.532
    [Google Scholar]
  51. PhamN.T. FooE. SuriadiS. JeffreyH. LahzaH.F.M. Improving performance of intrusion detection system using ensemble methods and feature selection. ACSW '18: Proceedings of the Australasian Computer Science Week Multiconference20181610.1145/3167918.3167951
    [Google Scholar]
  52. PriyadarsiniM. BeraP. Software defined networking architecture, traffic management, security, and placement: A survey.Comput. Netw.202119210804710.1016/j.comnet.2021.108047
    [Google Scholar]
  53. ChibaY. SugyouK. OpenFlow controller architecture for large-scale SDN networks.NEC Tech. J.2014824144
    [Google Scholar]
  54. EricksonD. The beacon openflow controller. Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking2013131810.1145/2491185.2491189
    [Google Scholar]
  55. ManuelT. GoswamiB.H. Experimenting with scalability of Beacon controller in software defined network.Int J Recent Technol Eng201975550555
    [Google Scholar]
  56. GeorgeM. Comparative analysis of performance of controllers in software defined networks using mininet.IJERT2019087
    [Google Scholar]
  57. ShahS.A. FaizJ. FarooqM. ShafiA. MehdiS.A. An architectural evaluation of SDN controllers. IEEE International Conference on Communicationsvol. 135043508201310.1109/ICC.2013.6655093
    [Google Scholar]
  58. KrishnanP. DuttaguptaS. AchuthanK. SDN/NFV security framework for fog‐to‐things computing infrastructure.Softw. Pract. Exper.202050575780010.1002/spe.2761
    [Google Scholar]
  59. VermaJ. BhandariA. SinghG. Network intrusion detection system employing big data and intelligent learning methods. 2022 4th International Conference on Artificial Intelligence and Speech Technology (AIST)202210.1109/AIST55798.2022.10064829
    [Google Scholar]
  60. KansalI. PopliR. VermaJ. BhardwajV. BhardwajR. Digital image processing and IoT in smart health care -a review. 2022 International Conference on Emerging Smart Computing and Informatics (ESCI)20221610.1109/ESCI53509.2022.9758227
    [Google Scholar]
  61. KumarK. SangalA.L. BhandariA. Traceback techniques against DDOS attacks: A comprehensive review.2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)201110.1109/ICCCT.2011.6075132
    [Google Scholar]
  62. SnehiJ. BhandariA. BagganV. SnehiM. Diverse methods for signature based intrusion detection schemes adopted.Int J Recent Technol Eng202092444910.35940/ijrte.A2791.079220
    [Google Scholar]
  63. SnehiM. Investigating convergence of cyber physical systems and big data analytics to develop real-time defense solution.Security and Resilience of Cyber Physical Systems.Chapman and Hall/CRC2022374810.1201/9781003185543‑4
    [Google Scholar]
  64. SnehiM. BhandariA. Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks.Comput. Sci. Rev.20214010037110.1016/j.cosrev.2021.100371
    [Google Scholar]
  65. SnehiJ. BhandariA. SnehiM. TandonU. BagganV. Global intrusion detection environments and platform for anomaly-based intrusion detection systems.Lecture Notes in Networks and SystemsLNNS202120381783110.1007/978‑981‑16‑0733‑2_58
    [Google Scholar]
  66. SnehiJ. BhandariA. SnehiM. BagganV. KaurH. AIDAAS: Incident handling and remediation anomaly-based IDaaS for cloud service providers. 10th International Conference on System Modeling & Advancement in Research Trends202135636010.1109/SMART52563.2021.9676296
    [Google Scholar]
  67. KumarA. LimT.J. EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques. 2019 IEEE 5th World Forum on Internet of Things (WF-IoT)201910.1109/WF‑IoT.2019.8767194
    [Google Scholar]
  68. Cisco Application Policy Infrastructure Controller Enterprise Module cross site scripting.2016Available from: https://vuldb.com/?id.80810
  69. Bin SarhanB. AltwaijryN. Insider threat detection using machine learning approach.Appl. Sci.202213125910.3390/app13010259
    [Google Scholar]
  70. AlhajA.N. DuttaN. Analysis of Security Attacks in SDN Network: A Comprehensive SurveySpringer Singapore2022
    [Google Scholar]
  71. MaguireD. What’s happening with the Optus data breach? What we know about the alleged hacker’s ransom, data release and apology.2022Available from: https://www.abc.net.au/news/2022-09-27/optus-data-breach-cyber-attack-hacker-ransom-sorry/101476316
    [Google Scholar]
  72. JyotiS. ManishS. RupaliG. Virtualization as an engine to drive cloud computing security.Commun. Comput. Inf. Sci.201116909988701479626610.1007/978‑3‑642‑22577‑2_9
    [Google Scholar]
  73. SnehiM. BhandariA. A novel distributed stack ensembled meta-learning-based optimized classification framework for real-time prolific iot traffic streams.Arab. J. Sci. Eng.20224789907993010.1007/s13369‑021‑06472‑z35070635
    [Google Scholar]
  74. GargA. LilhoreU.K. GhoshP. PrasadD. SimaiyaS. Machine learning-based model for prediction of student’s performance in higher education. 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN)202110.1109/SPIN52536.2021.9565999
    [Google Scholar]
  75. LilhoreU.K. SimaiyaS. PandeyH. GautamV. GargA. GhoshP. Breast cancer detection in the IoT cloud-based healthcare environment using fuzzy cluster segmentation and SVM classifier.Ambient Communications and Computer Systems. Lecture Notes in Networks and Systems. HuY.C. TiwariS. TrivediM.C. Mishraand K.K. SingaporeSpringer2022Vol. 35610.1007/978‑981‑16‑7952‑0_16
    [Google Scholar]
  76. AlmazroiA.A. AldhahriE.A. Al-ShareedaM.A. ManickamS. ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing.PLoS One2023186e028729110.1371/journal.pone.028729137352258
    [Google Scholar]
  77. MohammedB.A. Al-ShareedaM.A. ManickamS. Al-MekhlafiZ.G. AlaybaA.M. SallamA.A. ANAA-Fog: A novel anonymous authentication scheme for 5g-enabled vehicular fog computing.Mathematics2023116144610.3390/math11061446
    [Google Scholar]
  78. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. AlsewariA. Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks.Electronics202312487210.3390/electronics12040872
    [Google Scholar]
  79. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. RassemT.H. Efficient authentication scheme for 5g-enabled vehicular networks using fog computing.Sensors2023237354310.3390/s2307354337050601
    [Google Scholar]
  80. BadieaA.M. Al-ShareedaM.A. SelvakumarM. FC-PA: Fog computing-based pseudonym authentication scheme in 5g-enabled vehicular networks.IEEE Access202311185711858110.1109/ACCESS.2023.3247222
    [Google Scholar]
  81. XuG. DongJ. MaC. LiuJ. Omar CliffU. G. A certificateless signcryption mechanism based on blockchain for edge computing.IEEE Internet Things J.20231014119601197410.1109/JIOT.2022.3151359
    [Google Scholar]
  82. PopliR. IshaK. JyotiV. VikasK. RajeevK. AshutoshS. ROAD: Robotics-assisted onsite data collection and deep learning enabled robotic vision system for identification of cracks on diverse surfaces.Sustainability2023151293110.3390/su15129314
    [Google Scholar]
  83. KansalI. KhullarV. PopliR. VermaJ. KumarR. Face mask detection in foggy weather from digital images using transfer learning.Imaging Sci. J.2023202311210.1080/13682199.2023.2218222
    [Google Scholar]
  84. KansalI. IshaK. VikasK. JyotiV. RenuP. RajeevK. IoT-Fog-enabled robotics-based robust classification of hazy and normal season agricultural images for weed detection.Paladyn J. Behav. Robotics202314110.1515/pjbr‑2022‑0105
    [Google Scholar]
  85. SnehiJ. SDN-based cloud combining edge computing for IoT infrastructure.Software Defined Networks: Architecture and ApplicationsWiley202210.1002/9781119857921.ch14
    [Google Scholar]
  86. VermaJ. BhandariA. SinghG. Feature selection algorithm characterization for NIDS using machine and deep learning.Electronics and Mechatronics Conference (IEMTRONICS)202210.1109/IEMTRONICS55184.2022.9795709
    [Google Scholar]
  87. SethiM. VermaJ. SnehiM. BagganV. Web server security solution for detecting cross-site scripting attacks in real-time using deep learning.2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)202310.1109/ICAIA57370.2023.10169255
    [Google Scholar]
  88. BagganV. An efficient model of IGP for network-based communication: A comparison. 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)202110.1109/SMART52563.2021.9676272
    [Google Scholar]
/content/journals/raeeng/10.2174/0123520965273025231121173901
Loading
/content/journals/raeeng/10.2174/0123520965273025231121173901
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test