Enhancing Secure Data Transmission in Wireless Fog Networks through Software-Defined Networking Solutions

Authors

  • Deepthi Kothapeta Assistant Professor, Dept. of Computer Science, Chaitanya Deemed to be University
  • Madiraju Jagadeeshwar Professor, Dept. of Computer Science, Chaitanya Deemed to be University

Keywords:

Software Defined Network, Wireless Fog Networks, Secure Data Transmission, Routing Protocol, Trust Identity

Abstract

The centralised control intelligence in the next-generation networking architecture of Software-Defined Networks (SDN) is what gives them their strength. SDN's control plane can be extended to a variety of underlying networks, including fog and the Internet of Things (IoT). Real-time data management is currently possible with the fog-to-IoT architecture. However, most fog-to-IoT devices are geographically dispersed and have limited resources, which leaves them open to cyber attacks. Recently, a unique cyber foraging approach has emerged to shift heavy workloads from mobile devices to mobile cloudlets situated close to end users. Because wireless one-hop communication is common near the network edge, wireless mesh networks(WMNs) are being investigated as a potential solution for developing wireless fog networks. On the other hand, the global network administration and monitoring capabilities that fog networks require are limited by the distributed hop-by-hop routing protocols that WMNs utilize to depict apartial picture of the network. SDN is a great fit for fog-based communication systems since it enables centralized control and management of the entire network. The SDN Open Flow protocol is primarily meant for wired networks hence, it doesn’t enable  wireless fog networks. This paper proposes a novel trust-based identity model for the Internet of Things architecture for handling fog networks (TbI-IoT-FN) to provide safe data transmission in the network, combining the benefits of fog computing and software-defined networking. In software-defined networking, sophisticated algorithms for resource management and traffic control can be implemented thanks to a logically centralized network control plane. When comparing the suggested model to the current model, the findings show that the proposed model performs at a higher level.

Downloads

Download data is not yet available.

References

Arif, Muhammad, Ullah, Ihtisham, Raza, Basit,Ali, Sikandar, Abbasi, Irshad Ahmed, Baseer, Samad Irshad, Azeem, 2021, Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System,1939-0114, https://doi.org/10.1155/2021/6136670, 10.1155/2021/613667.

L. Tan, Y. Pan, J. Wu, J. Zhou, H. Jiang, and Y. Deng, “A new framework for DDoS attack detection and defense in SDN environment,” IEEE Access, vol. 8, Article ID 161919, 2020. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9186014

R. Santos, D. Souza, W. Santo, A. Ribeiro, and E. Moreno, “Machine learning algorithms to detect DDoS attacks in SDN,” Concurrency and Computation: Practice and Experience, vol. 32, no. 1, Article ID e5402, 2020. https://doi.org/10.1002/cpe.5402

.Galeano,J.M.Carmona,J.F.V.Valenzuela,andF.V.Luna,“Detection and mitigation of dos and ddos attacks in iot-based stateful sdn: an experimental approach,” Sensors, vol. 20, no. 3, 2020. https://doi.org/10.3390/s20030816

M. A. Khan and K. Salah, “IoT security: review, blockchain solutions, and open challenges,” Future Generation Computer Systems, vol. 82, pp. 395–411, 2018. https://www.sciencedirect.com/science/article/abs/pii/S0167739X17315765

J. Pacheco and S. Hariri, “IoT security framework for smart cyber infrastructures,” in Proceedings of the IEEE 1st International Workshops on Foundations and Applications of Self∗Systems (FAS∗W), IEEE, Augsburg, Germany, September 2016. https://ieeexplore.ieee.org/document/7789475

S. Ali, V. Kumar, A. A. Laghari, S. Karim, and A. B. Anwar, “Comparison of fog computing & cloud computing,” International Journal of Mathematics and Soft Computing, vol. 5, no. 1, pp. 31–41, 2019.

K. Kai, W. Cong, and L. Tao, “Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues,” The Journal of China Universities of Posts and Telecommunications, vol. 23, no. 2, pp. 56 – 96, 2016.

S. Ivanov, S. Balasubramaniam, D. Botvich, and O. B. Akan, “Gravity gradient routing for information delivery in fog wireless sensor networks,” Ad Hoc Networks, vol. 46, pp. 61 – 74, 2016.

Ku, Y. Lu, and M. Gerla, “Software-defined mobile cloud: Architecture, services and use cases,” in International Wireless Communications and Mobile Computing Conference, IWCMC 2014, Nicosia, Cyprus, August 4-8, 2014, 2014, pp. 1–6.

K. Liang, L. Zhao, X.Chu, and H.H.Chen, “An integrated architecture for software defined and virtualized radio access networks with fog computing,” IEEE Network, vol. 31, no. 1, pp. 80–87, 2017.

X. Sun and N. Ansari, “Edgeiot: Mobile edge computing for the internet of things,” IEEE Communications Magazine, vol. 54, no. 12, pp. 22–29, 2016.

X. He, Z. Ren, C. Shi, and J. Fang, “A novel load balancing strategy of software-defined cloud/fog networking in the internet of vehicles, ”China Communications, vol. 13, no. Supplement2, pp. 140–149, 2016.

S. A. Lazar and C. E. Stefan ,“Futurevehicularnetworks:Whatcontroltechnologies?”in2016International Conference on Communications (COMM), 2016, pp. 337–340.

Y. Xu, V. Mahendran, and S. Radhakrishnan,“ Towards sdn-based fog computing: Mqttbroker virtualization for effective and reliable delivery,” in 2016 8th International Conference on Communication Systems and Networks (COMSNETS), 2016, pp. 1–6.

R. Bruschi, P. Lago, G. Lamanna, C. Lombardo, and S. Mangialardi, “Openvolcano: An open- source software platform for fog computing,” in 2016 28th International Teletraffic Congress (ITC 28), vol. 02, 2016, pp.22–27.

Betzler, F. Quer, D. Camps-Mur, I. Demirkol, and E. Garcia- Villegas, “On the benefits of wireless sdnin networks of constrained edge devices,” in 2016 European Conference on Networks and Communications (Eu CNC), 2016, pp. 37–41.

L. Huang, G. Li, J. Wu, L. Li, J. Li, and R. Morello,“ Software-defined qos provisioning for fog computing advanced wireless sensor networks,” in 2016 IEEE SENSORS, 2016, pp. 1–3.

Diro and N. Chilamkurti, “Leveraging LSTM networks for attack detection in fog-to-things communications,” IEEE Communications Magazine, vol. 56, no. 9, pp. 124–130, 2018.View at: Publisher Site| Google Scholar N. Chockwanich and V. Visoottiviseth, “Intrusion detection by deep learning with tensor flow,” in Proceedingsofthe21stInterna-tionalConferenceonAdvanced Communication Technology (ICACT), IEEE Pyeong Chang, Korea(South),May2019.

Samy, H. Yu, and H. Zhang, “Fog-based attack detection framework for internet of things using deep learning,” IEEE Access, vol. 8, Article ID 74585, 2020.

M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system,” Simulation Modelling Practice and Theory, vol. 101, Article ID 102031, 2020.

D. K. K. Reddy, H. S. Behera, J. Nayak, B. Naik, U. Ghosh, and P. Sharma, “Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment,” Journal of Information Security and Applications, vol. 60, Article ID 102866, 2021.

Zuo, J. Shao, G. Wei, M. Xie, and M. Ji, “CA-secure ABE with outsourced decryption for fog computing,” Future Generation Computer Systems, vol. 78, pp. 730–738, 2018.

Shrivastava, A., Chakkaravarthy, M., Shah, M.A..A Novel Approach Using Learning Algorithm for Parkinson’s Disease Detection with Handwritten Sketches. In Cybernetics and Systems, 2022

Shrivastava, A., Chakkaravarthy, M., Shah, M.A., A new machine learning method for predicting systolic and diastolic blood pressure using clinical characteristics. In Healthcare Analytics, 2023, 4, 100219

Shrivastava, A., Chakkaravarthy, M., Shah, M.A.,Health Monitoring based Cognitive IoT using Fast Machine Learning Technique. In International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(6s), pp. 720–729

Shrivastava, A., Rajput, N., Rajesh, P., Swarnalatha, S.R., IoT-Based Label Distribution Learning Mechanism for Autism Spectrum Disorder for Healthcare Application. In Practical Artificial Intelligence for Internet of Medical Things: Emerging Trends, Issues, and Challenges, 2023, pp. 305–321

Boina, R., Ganage, D., Chincholkar, Y.D., .Chinthamu, N., Shrivastava, A., Enhancing Intelligence Diagnostic Accuracy Based on Machine Learning Disease Classification. In International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(6s), pp. 765–774

Shrivastava, A., Pundir, S., Sharma, A., ...Kumar, R., Khan, A.K. Control of A Virtual System with Hand Gestures. In Proceedings - 2023 3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023, 2023, pp. 1716–1721

Vishwanath, R. Peruri, and J. H. Selena, Security in Fog Computing through Encryption, Digital Commons@ Kennesaw State University, Kennesaw, Georgia, USA, 2016.

M. Ring, S. Wunderlich, D.Grüdl,D.Landes,andA.Hotho,“Flow-based benchmark datasets for intrusion detection,” in Proceedings of the 16th European Conference on Cyber Warfare and Security, pp.361–369,ACPI, Dublin, Ireland, June 2017.

K. M. S. Azad, N. Hossain, M. J. Islam, A. Rahman, and S. Kabir, “Preventive determination and avoidance of DDoS attack with SDN over the IoT networks,” in Proceedings of the 2021 International Conference on Automation, Control and Mechatronics for Industry 4.0(ACMI),pp.1–6, IEEE, Rajshahi, Bangladesh,July2021.

F.KHussain,W.Rahayu,andM.Takizawa,“Specialissueonintelligentfogandinternetofthings (IoT)-Based services,” World Wide Web, vol. 24, no. 3, pp. 925–927, 2021.

S. Strecker, W. V. Haaften, and R.Dave,“Ananalysis of IoT cyber security driven by machine learning,”in Proceedings of the International Conference on Communication and Computational Technologies, pp. 725–753, Springer, Jaipur, India, February 2021.

T. A. Tang, L. Mhamdi, D. McLernon, S. A. Raza Zaidi,and M.Ghogho,“Deep learning approach for network intrusion detection in software defined networking,” in Proceedings of the 2016 international conference on wireless networks and mobile communications (WINCOM), pp. 258–263, IEEE, Fez, Morocco, October 2016.

Yin, Y. Zhu, J. Fei, and X. He, “A deep learning approach for intrusion detection using recurrent neural networks,” Ieee Access, vol. 5, pp. 21954–21961, 2017.

F. Jiang, Y. Fu, B. B. Gupta et al., “Deep learning based multi-channel intelligent attack detection for data security,” IEEE transactions on Sustainable Computing, vol. 5, no. 2, pp. 204–212, 2018.

Y. Xin, L. Kong, Z. Liuetal.,“Machine learning and deep learning methods for cyber security,”Ieee access, vol. 6, Article ID 35381, 2018.

S. Prabavathy, K. Sundarakantham, and S. M. Shalinie, “Design of cognitive fog computing for intrusion detection in Internet of Things,” Journal of Communications and Networks, vol. 20, no. 3, pp. 291– 298, 2018.

S. Rathore, J. H. Park, and H. P. Jong, “Semi-supervised learning based distributed attack detection framework for IoT,” Applied Soft Computing, vol. 72, pp. 79–89, 2018.

V. L. L. Thing, “IEEE 802.11 network anomaly detection and attack classification: a deep learning approach, “in Proceedings of the IEEE Wireless Communications and Networking Conference(WCNC),pp.1–6, IEEE, San Francisco, CA, USA, May 2017.

Q. Yaseen, M. Aldwairi, Y. Jararweh, M. A. Ayyoub, and B. Gupta, “Collusion attacks mitigation in internet of things: a fog based model,” Multimedia Tools and Applications, vol. 77, no. 14, pp. 18249– 18268, 2018.

C. Byers, “Architectural imperatives for fog computing: use cases, requirements, and architectural techniques for fog-enabled iot networks,” IEEE Communications Magazine, vol. 55, no. 8, pp. 14–20, 2017.

Abeshu and N. Chilamkurti, “Deep learning: the frontier for distributed attack detection in fog-to-things computing,” IEEE Communications Magazine, vol. 56, no. 2, pp. 169–175, 2018.

S. Khater, B. W. B. A. Wahab, M. Y. I. B. Idris, M. A. Hussain, and A. A. Ibrahim, “A lightweight perceptron-based intrusion detection system for fog computing,” Applied Sciences, vol. 9, no.1, 2019.

O. E. Zaballa, D Franco, and M Aguado, “Next-generation SDN and fog computing: a new paradigm for SDN-based edge computing,” in Proceedings of the 2nd Workshop on Fog Computing and the IoT (Fog-IoT2020), Schloss Dags

Downloads

Published

24.03.2024

How to Cite

Kothapeta, D. ., & Jagadeeshwar, M. . (2024). Enhancing Secure Data Transmission in Wireless Fog Networks through Software-Defined Networking Solutions. International Journal of Intelligent Systems and Applications in Engineering, 12(18s), 25–33. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4946

Issue

Section

Research Article