Enforcing Behavioral Profiles through Software-Defined Networks in the Industrial Internet of Things
The fourth industrial revolution is being mainly driven by the integration of Internet of Things (IoT) technologies to support the development lifecycle of systems and products. Despite the well-known advantages for the industry, an increasingly pervasive industrial ecosystem could make such devices...
Saved in:
Published in | Applied sciences Vol. 9; no. 21; p. 4576 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.11.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The fourth industrial revolution is being mainly driven by the integration of Internet of Things (IoT) technologies to support the development lifecycle of systems and products. Despite the well-known advantages for the industry, an increasingly pervasive industrial ecosystem could make such devices an attractive target for potential attackers. Recently, the Manufacturer Usage Description (MUD) standard enables manufacturers to specify the intended use of their devices, thereby restricting the attack surface of a certain system. In this direction, we propose a mechanism to manage securely the obtaining and enforcement of MUD policies through the use of a Software-Defined Network (SDN) architecture. We analyze the applicability and advantages of the use of MUD in industrial environments based on our proposed solution, and provide an exhaustive performance evaluation of the required processes. |
---|---|
AbstractList | The fourth industrial revolution is being mainly driven by the integration of Internet of Things (IoT) technologies to support the development lifecycle of systems and products. Despite the well-known advantages for the industry, an increasingly pervasive industrial ecosystem could make such devices an attractive target for potential attackers. Recently, the Manufacturer Usage Description (MUD) standard enables manufacturers to specify the intended use of their devices, thereby restricting the attack surface of a certain system. In this direction, we propose a mechanism to manage securely the obtaining and enforcement of MUD policies through the use of a Software-Defined Network (SDN) architecture. We analyze the applicability and advantages of the use of MUD in industrial environments based on our proposed solution, and provide an exhaustive performance evaluation of the required processes. |
Author | Molina Zarca, Alejandro Hernández-Ramos, José Luis García, Sara Nieves Matheu Bernabé, Jorge Bernal Gómez, Antonio Skarmeta |
Author_xml | – sequence: 1 givenname: Sara Nieves Matheu orcidid: 0000-0002-7997-5737 surname: García fullname: García, Sara Nieves Matheu – sequence: 2 givenname: Alejandro orcidid: 0000-0003-0038-9012 surname: Molina Zarca fullname: Molina Zarca, Alejandro – sequence: 3 givenname: José Luis orcidid: 0000-0001-7697-116X surname: Hernández-Ramos fullname: Hernández-Ramos, José Luis – sequence: 4 givenname: Jorge Bernal orcidid: 0000-0002-7538-4788 surname: Bernabé fullname: Bernabé, Jorge Bernal – sequence: 5 givenname: Antonio Skarmeta orcidid: 0000-0002-5525-1259 surname: Gómez fullname: Gómez, Antonio Skarmeta |
BookMark | eNpNkcFOGzEQhq0KpNLApU9gqbdKW-wd79o-QoASKYJKwNmyvXbiNLVT2wvi7bsQBJ3LjGa--Wek_ws6iCk6hL5S8gNAklO928mWso73n9BRS3jfAKP84L_6MzopZUOmkBQEJUdouIw-ZRviCp-7tX4MKest_pWTD1tXcF3nNK7W-C75-qSzay6cD9EN-MbVp5R_FxziBDm8iMNYag7T8iJWl6OrOHl8v56UyzE69Hpb3MlbnqGHq8v7-XWzvP25mJ8tGws9rY0HY7u-48IwMwhrhKDAeCulEJJpq70bbE99Sy1wQiZMADfQc0KlNoZpmKHFXndIeqN2OfzR-VklHdRrI-WV0rkGu3XKd8BdayRtB8m4NJJYT6kAZogXYprO0Le91i6nv6MrVW3SmOP0vmo7gF4w6NhEfd9TNqdSsvPvVylRL6aoD1PgH8RVgIE |
CitedBy_id | crossref_primary_10_1016_j_prime_2023_100186 crossref_primary_10_1109_ACCESS_2020_3016937 crossref_primary_10_1109_ACCESS_2021_3065123 crossref_primary_10_1109_JIOT_2021_3113577 crossref_primary_10_3390_s20071882 crossref_primary_10_3389_friot_2023_1306018 crossref_primary_10_1155_2024_7908506 crossref_primary_10_1016_j_csi_2023_103777 crossref_primary_10_1109_ACCESS_2021_3111477 crossref_primary_10_1016_j_jksuci_2024_102069 crossref_primary_10_1109_TII_2021_3084341 crossref_primary_10_3390_app10030736 crossref_primary_10_3390_sym12091576 |
Cites_doi | 10.1007/978-3-319-71734-0_7 10.3390/s16030358 10.17487/rfc2904 10.1145/1355734.1355746 10.1007/978-1-4842-2047-4_10 10.1016/j.future.2019.01.038 10.1109/AINA.2018.00131 10.17487/rfc6347 10.17487/RFC8520 10.17487/rfc5996 10.1109/INFCOMW.2017.8116438 10.1145/3314148.3314352 10.17487/rfc6241 10.17487/RFC8259 10.17487/rfc2131 10.17487/RFC8519 10.17487/rfc4764 10.17487/rfc3579 10.1109/WSC.2018.8632242 10.17487/rfc5247 10.1109/MC.2017.201 10.1145/2744769.2747942 10.1145/3229565.3229571 10.1145/3229565.3229566 10.17487/RFC8576 10.1109/JIOT.2019.2904123 |
ContentType | Journal Article |
Copyright | 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PIMPY PQEST PQQKQ PQUKI PRINS DOA |
DOI | 10.3390/app9214576 |
DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Korea Publicly Available Content Database ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database ProQuest Central ProQuest One Academic UKI Edition ProQuest Central Essentials ProQuest Central Korea ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Academic ProQuest Central China |
DatabaseTitleList | Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sciences (General) |
EISSN | 2076-3417 |
ExternalDocumentID | oai_doaj_org_article_f537e2b912d9479b90cf11834b0f88f5 10_3390_app9214576 |
GroupedDBID | .4S 5VS 7XC 8CJ 8FE 8FG 8FH AADQD AAFWJ AAYXX ABJCF ADBBV AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS APEBS ARAPS ARCSS ATCPS BBNVY BCNDV BENPR BHPHI BKSAR CCPQU CITATION CZ9 D1I D1J D1K GROUPED_DOAJ HCIFZ IAO K6- K6V K7- KB. KC. KQ8 L6V LK5 LK8 M0K M7P M7R M7S MODMG M~E OK1 P62 PATMY PCBAR PDBOC PIMPY PROAC PYCSY RIG TUS ABUWG AZQEC DWQXO PQEST PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c361t-f3bc56578b4bd8cb8813472998894acafedc61f21c370078b837b367019abb4a3 |
IEDL.DBID | BENPR |
ISSN | 2076-3417 |
IngestDate | Tue Oct 22 15:09:27 EDT 2024 Sat Nov 09 13:38:20 EST 2024 Fri Aug 23 05:00:05 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 21 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c361t-f3bc56578b4bd8cb8813472998894acafedc61f21c370078b837b367019abb4a3 |
ORCID | 0000-0002-7997-5737 0000-0001-7697-116X 0000-0003-0038-9012 0000-0002-7538-4788 0000-0002-5525-1259 |
OpenAccessLink | https://www.proquest.com/docview/2533684354?pq-origsite=%requestingapplication% |
PQID | 2533684354 |
PQPubID | 2032433 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_f537e2b912d9479b90cf11834b0f88f5 proquest_journals_2533684354 crossref_primary_10_3390_app9214576 |
PublicationCentury | 2000 |
PublicationDate | 2019-11-01 |
PublicationDateYYYYMMDD | 2019-11-01 |
PublicationDate_xml | – month: 11 year: 2019 text: 2019-11-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Applied sciences |
PublicationYear | 2019 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | Rosen (ref_12) 2015; 48 Kolias (ref_4) 2017; 50 ref_14 ref_36 ref_13 ref_35 ref_34 ref_32 ref_31 ref_30 Itsykson (ref_7) 2018; Volume 779 ref_19 ref_18 ref_17 ref_39 ref_16 ref_38 ref_15 ref_37 Perez (ref_33) 2019; 95 Zarca (ref_10) 2019; 6 McKeown (ref_11) 2008; 38 ref_25 ref_47 ref_24 ref_46 ref_23 ref_45 ref_22 ref_44 ref_21 ref_43 ref_20 ref_42 ref_41 ref_40 ref_1 ref_3 ref_2 ref_29 ref_28 ref_27 ref_26 ref_48 ref_9 ref_8 ref_5 ref_6 |
References_xml | – volume: Volume 779 start-page: 77 year: 2018 ident: ref_7 article-title: A Survey on Model-Based Testing Tools for Test Case Generation publication-title: Tools and Methods of Program Analysis doi: 10.1007/978-3-319-71734-0_7 contributor: fullname: Itsykson – ident: ref_9 – ident: ref_30 – ident: ref_32 doi: 10.3390/s16030358 – ident: ref_29 doi: 10.17487/rfc2904 – ident: ref_26 – volume: 38 start-page: 69 year: 2008 ident: ref_11 article-title: OpenFlow - enabling innovation in campus networks publication-title: ACM SIGCOMM Comput. Commun. Rev. doi: 10.1145/1355734.1355746 contributor: fullname: McKeown – ident: ref_1 doi: 10.1007/978-1-4842-2047-4_10 – volume: 95 start-page: 570 year: 2019 ident: ref_33 article-title: Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.01.038 contributor: fullname: Perez – ident: ref_25 doi: 10.1109/AINA.2018.00131 – ident: ref_16 – ident: ref_43 doi: 10.17487/rfc6347 – ident: ref_5 doi: 10.17487/RFC8520 – ident: ref_37 – ident: ref_14 – ident: ref_42 – ident: ref_18 – ident: ref_35 – ident: ref_21 – ident: ref_39 doi: 10.17487/rfc5996 – ident: ref_13 doi: 10.1109/INFCOMW.2017.8116438 – ident: ref_24 doi: 10.1145/3314148.3314352 – ident: ref_6 – ident: ref_44 doi: 10.17487/rfc6241 – ident: ref_8 – ident: ref_28 doi: 10.17487/RFC8259 – ident: ref_19 doi: 10.17487/rfc2131 – ident: ref_27 doi: 10.17487/RFC8519 – ident: ref_31 doi: 10.17487/rfc4764 – ident: ref_2 – ident: ref_46 – ident: ref_40 doi: 10.17487/rfc3579 – ident: ref_47 doi: 10.1109/WSC.2018.8632242 – ident: ref_48 – ident: ref_34 doi: 10.17487/rfc5247 – volume: 48 start-page: 567 year: 2015 ident: ref_12 article-title: About The Importance of Autonomy and Digital Twins for the Future of Manufacturing publication-title: IFAC contributor: fullname: Rosen – ident: ref_41 – ident: ref_15 – volume: 50 start-page: 80 year: 2017 ident: ref_4 article-title: DDoS in the IoT: Mirai and Other Botnets publication-title: Computer doi: 10.1109/MC.2017.201 contributor: fullname: Kolias – ident: ref_3 doi: 10.1145/2744769.2747942 – ident: ref_23 doi: 10.1145/3229565.3229571 – ident: ref_38 – ident: ref_36 – ident: ref_45 – ident: ref_17 doi: 10.1145/3229565.3229566 – ident: ref_22 doi: 10.17487/RFC8576 – ident: ref_20 – volume: 6 start-page: 8005 year: 2019 ident: ref_10 article-title: Security Management Architecture for NFV/SDN-aware IoT Systems publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2904123 contributor: fullname: Zarca |
SSID | ssj0000913810 |
Score | 2.284764 |
Snippet | The fourth industrial revolution is being mainly driven by the integration of Internet of Things (IoT) technologies to support the development lifecycle of... |
SourceID | doaj proquest crossref |
SourceType | Open Website Aggregation Database |
StartPage | 4576 |
SubjectTerms | Access control Automation Behavior Computer programs Cybersecurity digital twins Industrial applications Internet of Things Mud sdn security Security management Software-defined networking |
SummonAdditionalLinks | – databaseName: Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8NAEF2kJz2IrYrVKgt60MNis9kkO0erLcVDEbTQW8jsB3hJxUT8--5m0zbgwYvXsCRhJjvzJjvzHiE3mQBVOFzBBEjNhOCCAVcZS7SIAIwXGWkaZBfpfCmeV8mqI_Xle8ICPXAw3L1N4sxwhIhrEBkgjJV1oDgWOLZS2sBeOoZOMdXEYIg8dVXgI41dXe_Pg8GzcntykU4Gaoj6f8XhJrnMjshhiwrpQ3ibPtkz5YAcdLgCB6Tf7sKK3rZU0XfHRE_9NJFyC-hkO29PX4IOd0VbER766mLtd_Fp2JOx7o6aLkLzd0XfS7fI0J2ABw2_CE1N15YGUc8TspxN3x7nrNVNYCpOo5rZGJU_zZQoUEuFUvp5UZd3pARRqMIardLI8kjFmYcI6IpU9ERuERSIoohPSa9cl-aMUJ2qBAxKLjIUhsvCs72kIFGnJlaohuR6Y8v8I9Bj5K6s8BbPdxYfkok383aFp7RuLjhH562j878cPSSjjZPydp9VOXdoNZUO8onz_3jGBdl3gAjCrOGI9OrPL3PpQEeNV8339QMYHtQF priority: 102 providerName: Directory of Open Access Journals |
Title | Enforcing Behavioral Profiles through Software-Defined Networks in the Industrial Internet of Things |
URI | https://www.proquest.com/docview/2533684354 https://doaj.org/article/f537e2b912d9479b90cf11834b0f88f5 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV05T8MwFH6iZYEBUQ5RKJUlGGCwaBwnsSdEoQUxVIhDYoviC7G0pSni7-OXuIeExJpYHp79br_vAzjPuNSFjysol8JQzhmnkumMJoZHUlokGakeyI7Shzf--J68h4JbGZ5VLmxiZajNRGON_Ir5uCQV3rnz6-kXRdYo7K4GCo0GbDKfKfSasNkfjJ6el1UWRL0UUa_GJY19fo99YYno3AgysuaJKsD-P_a4cjLDXdgJ0SG5qY-zBRt2vAfba5iBe9AK2liSiwAZfbkPZoBTRdovIP3l3D15qvm4SxLIeMiLt7k_xczSO-v8joaM6kfgJfkc-0WWrIg8SF0qtHMycaQm9zyAt-Hg9faBBv4EquM0mlMXK41dTaG4MkIrIXBu1PsfISQvdOGs0WnkWKTjDEMF5ZNVhYBukSyU4kV8CM3xZGyPgJhUJ9IqwXimuGWiQNSXVAplUhtrpdtwtpBlPq1hMnKfXqDE85XE29BHMS9XILR19WEy-8iDpuQuiTPLlIyYkTyTSva081lQzFXPCeGSNnQWh5QHfSvz1e04_v_3CWz5kEfW04QdaM5n3_bUhxVz1YWGGN53ww3qVsn5L5mMz0A |
link.rule.ids | 315,783,787,867,2109,12777,21400,27936,27937,33385,33756,43612,43817,74363,74630 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3JTsMwEB2xHIADogVEWS3BAQ4WTeIk9gmxlQKlQqKVuEXxhri0pSni9_Ek7iIhcU1GPozt2TzzHsBZyoTKXVxBmeCaMhYyKkKV0lizQAiDJCNlg2w3affZ03v87gtuhW-rnNrE0lDrocIa-WXo4pKEO-fOrkZfFFmj8HXVU2gswyqLnK_GSfHWw6zGgpiXPGhWqKSRy-7xVVggNjdCjCz4oRKu_481Ll1Maws2fWxIrqvNrMGSGdRhYwExsA41fxcLcu4Boy-2Qd_jTJFyAuRmNnVPXis27oJ4Kh7y5izuTz429M5Yt6Im3aoFvCCfAydkyJzGg1SFQjMhQ0sqas8d6Lfue7dt6tkTqHKqmFAbSYVvmlwyqbmSnOPUqPM-nAuWq9warZLAhoGKUgwUpEtVJcK5BSKXkuXRLqwMhgOzB0QnKhZG8pClkpmQ54j5kggudWIiJVUDTqe6zEYVSEbmkgvUeDbXeANuUM0zCQS2Lj8Mxx-ZvyeZjaPUhFIEoRYsFVI0lXU5UMRk03Ju4wYcTjcp87etyOZnY___3yew1u69dLLOY_f5ANZd8COqucJDWJmMv82RCzAm8rg8Rb9Db87w |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1JSwMxFH5oBdGDuGJdA3rQQ7AzycwkJ7Ha4kYpLuBtmGzipa2din_fvJm0FQSvMyGHl7w1730fwGnGpS58XEG5FIZyHnMqY53RxPBISoskI1WDbC-9feX3b8lb6H8qQ1vl1CZWhtoMNdbIL2Ifl6TCO3d-4UJbRP-mezn6pMgghS-tgU5jEZYynrJWA5banV7_aVZxQQRMEbVqjFLmc318I5aI1I2AI7-8UgXe_8c2Vw6nuw5rIVIkV_XRbsCCHWzC6i_8wE3YCJpZkrMAH32-BaaDE0baLyDt2Qw-6dfc3CUJxDzk2dvf72Js6Y11fkdDenVDeEk-Bn6RJXNSD1KXDe2EDB2piT634bXbebm-pYFLgWqWRhPqmNL4wikUV0ZoJQTOkHpfJITkhS6cNTqNXBxplmHYoHziqhDcLZKFUrxgO9AYDAd2F4hJdSKtEjHPFLexKBABJpVCmdQyrXQTTqayzEc1ZEbuUw2UeD6XeBPaKObZCoS5rj4Mx-950JrcJSyzsZJRbCTPpJIt7XxGxLhqOSFc0oSD6SHlQffKfH5T9v7_fQzL_grlj3e9h31Y8ZGQrIcMD6AxGX_ZQx9tTNRRuEY_U9TUjQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enforcing+Behavioral+Profiles+through+Software-Defined+Networks+in+the+Industrial+Internet+of+Things&rft.jtitle=Applied+sciences&rft.au=Sara+Nieves+Matheu+Garc%C3%ADa&rft.au=Alejandro+Molina+Zarca&rft.au=Hern%C3%A1ndez-Ramos%2C+Jos%C3%A9+Luis&rft.au=Jorge+Bernal+Bernab%C3%A9&rft.date=2019-11-01&rft.pub=MDPI+AG&rft.eissn=2076-3417&rft.volume=9&rft.issue=21&rft.spage=4576&rft_id=info:doi/10.3390%2Fapp9214576&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon |