Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks. Bringhenti, D., Yusupov, J., Zarca, A. M., Valenza, F., Sisto, R., Bernabe, J. B., & Skarmeta, A. Elsevier Computer Networks, 213:109–123, 2022.
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks [pdf]Paper  doi  abstract   bibtex   5 downloads  
The pervasiveness of Internet of Things (IoT) has made the management of computer networks more troublesome. The softwarized control provided by Software-Defined Networking (SDN) is not sufficient to overcome the problems raising in this context. An increasing number of attacks can, in fact, occur in SDN-aware IoT networks if the security configuration enforced on the SDN switches is manually computed and not formally verified. To mitigate this problem, this paper proposes a novel methodology which leverages Maximum Satisfiability Modulo Theories (MaxSMT) to automatically compute a formally correct and optimized allocation scheme and configuration of SDN switches by refining security policies, user-defined or derived from detected attacks. This mechanism is compliant with the main characteristics of virtualized IoT-based networks, such as the simultaneous presence of numerous interconnected devices and strict latency requirements. The feasibility and the performance of the framework developed to implement this methodology have been validated in a realistic use case.

Downloads: 5