Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Secure routing in software defined networking and Internet of Things for big data

Secure routing in software defined networking and Internet of Things for big data

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Handbook of Big Data Analytics Volume 2: Applications in ICT, security and business analytics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The Internet of Things (IoT) witnesses a rapid increase in the number of devices getting networked together, along with a surge in big data. IoT causes various challenges, such as quality of service (QoS) for differentiated IoT tasks, power-constrained devices, time-critical applications, and a heterogeneous wireless environment. The big data generated from the billions of IoT devices needs different levels of services, providing big data service based on user requirements which is one of the complex tasks in the network. Software-defined networking (SDN) facilitates interoperability among IoT devices and QoS to the differentiated IoT tasks. SDN introduces programmability in the network by the decoupling of the control plane and data plane. The decoupling of the control logic to a centralized SDN controller drastically reduces power spent on network control on the IoT devices. Also, SDN considerably reduces hardware investments. In this chapter, we focus on discussing the feasibility of using SDN in big data generated by IoT devices. We discuss the architecture of IoT, the relationship between IoT and big data, the arrival of SDN in IoT and big data, routing mechanism, and security aspects of SDN and IoT routing and the application of SDN to IoT.

Chapter Contents:

  • 3.1 Introduction
  • 3.2 Architecture of IoT
  • 3.3 Intersection of big data and IoT
  • 3.4 Big data analytics
  • 3.4.1 Taxonomy of big data analytics
  • 3.4.2 Architecture of IoT big data
  • 3.5 Security and privacy challenges of big data
  • 3.6 Routing protocols in IoT
  • 3.7 Security challenges and existing solutions in IoT routing
  • 3.7.1 Selective forwarding attacks
  • 3.7.2 Sinkhole attacks
  • 3.7.3 HELLO flood and acknowledgment spoofing attacks
  • 3.7.4 Replay attacks
  • 3.7.5 Wormhole attacks
  • 3.7.6 Sybil attack
  • 3.7.7 Denial-of-service (DoS) attacks
  • 3.8 The arrival of SDN into big data and IoT
  • 3.9 Architecture of SDN
  • 3.10 Routing in SDN
  • 3.11 Attacks on SDN and existing solutions
  • 3.11.1 Conflicting flow rules
  • 3.11.2 TCAM exhaustion
  • 3.11.3 ARP poisoning
  • 3.11.4 Information disclosure
  • 3.11.5 Denial-of-service (DoS) attacks
  • 3.11.6 Exploiting vulnerabilities in OpenFlow switches
  • 3.11.7 Exploiting vulnerabilities in SDN controllers
  • 3.12 Can SDN be applied to IoT?
  • 3.13 Summary
  • References

Inspec keywords: software defined networking; Big Data; computer network security; telecommunication network routing; Internet of Things

Other keywords: Internet of Things; big data; secure routing; interoperability; control logic; programmability; software-defined networking; network control; IoT; SDN

Subjects: Other DBMS; Data security; Computer communications; Computer networks and techniques

Preview this chapter:
Zoom in
Zoomout

Secure routing in software defined networking and Internet of Things for big data, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc037g/PBPC037G_ch3-1.gif /docserver/preview/fulltext/books/pc/pbpc037g/PBPC037G_ch3-2.gif

Related content

content/books/10.1049/pbpc037g_ch3
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address