Abstract
1. Introduction
Recently, interest in the Internet of Things (IoT) as a new technology has been increasing, and studies on various devices and solutions related to it have been accelerated [1].
In an IoT environment, different types of packets and variable traffic can be generated from numerous devices including sensors. Accordingly, the issue of proactively controlling such information in the existing network environment is gradually coming to the fore. In addition, concerning security, as an IoT environment has limitations in performance because it is comprised of sensor devices with inferior specifications, there exists a problem that the existing device security technologies are difficult to apply [1–3]. However, if appropriate security actions are not taken, there are risks of information leakage, data forgery/falsification, and large-scale denial of service attack. Accordingly, studies are required on a security frame for safety in an IoT environment [4, 5].
In this paper, a security framework in an IoT environment utilizing a software-defined network (SDN) is studied. SDN is a technology that has been attracting attention as a means to enhance the efficiency of an existing network environment and reduce the difficulty in managing it. The service provided by the existing network control device can be utilized through software, and detailed and proactive network management is possible depending on the software used [6]. In this paper, a security framework is proposed that utilizes the characteristics of such an environment to develop a plan to provide authentication, access control, network and system security, integrity, and confidentiality, and a big-data security analysis system is developed to cope with new attacks.
2. Background
2.1. IoT
IoT can be regarded as a next-generation IT environment that can provide new services by analyzing diverse data collected from the Internet to which all things are connected. IoT is diversely defined by companies and organizations and in general it can be defined as the technology through which information is shared through wire/wireless networks without being limited by both time and space and the entry into a hyperconnected society through interaction with diverse services is realized [3–5].
IoT can be divided into three categories: device (terminal and sensor) domain, network (wire/wireless) domain, and service interface (platform and application) domain. The device domain transmits the data collected and extracted from a specific system using the system's embedded communication function to other systems. The network domain is the wire/wireless channel through which the data transmitted between the user and a system and between systems are transmitted and received. The service interface domain generates information by processing the data and controls and manages different devices.
2.2. SDN
SDNs are attracting attention as a solution to various problems of the existing network environment. One of the most significant problems is that the different packets generated by various network devices and the variable traffic are difficult to be processed. Expensive network devices are installed in the related domain to process the different packets and variable traffic, causing the network environment to become complex owing to the protocols and services associated with the difference devices, which makes management of the system difficult. In addition, such devices rely on the network vendor who might be unable to have fast response with the user requirements [6].
SDNs involve the concept of separating the control plane and the transfer plane. The Openflow technology of ONF is attracting attention for specific purposes, and diverse technologies are being studied.
The best feature of Openflow is that it separates the control plane and data plane, and the network can be controlled through a controller using the Openflow protocol. This technology can be used to enable automatic communication through setting by reducing the complexity of the environment of the existing network device and defining diverse protocols. If the program for the control plane is modified, free protocols can be generated within the range of four network layers and specific services can be defined [6–12].
Figure 1 shows the SDN framework.

SDN framework.
2.3. SDIoT
A software-defined based Internet of Things (SDIoT) framework is an environment used to efficiently manage an IoT environment by combining the infrastructure of the IoT environment with SDN technology. Recently, studies on an SDIoT environment have been carried out and various studies on software-defined controllers are in progress. Jararweh et al. published a paper on the framework of an IoT environment based on different software-defined controller models in which IoT device protocols and network functions can be dealt with. Their model is such that the network is basically managed by software-defined technology and security is provided through a software-defined security (SDSec) [13].
3. Security Threats in IoT
3.1. Unauthorized Access
An IoT framework can provide services by collecting data generated from different sensor devices and processing it into valuable data. Alternatively, the sensor devices themselves can collect data and provide services. In such an environment, there is a threat of data leakage and data falsification by users who access the data without permission.
Table 1 shows the problems that may occur in the main IoT environment.
Security threat of unauthorized access by users in main IoT environment.
3.2. Increasing DDoS Attack
According to the data analysis report on the DDoS attacks in the third quarter of 2014, which was recently announced by Akamai, traffic volumes increased significantly from the third quarter of 2013 and the new type of DDoS attack has been renewed. Overall, attacks using the UDP or SYN protocol-based layer are increasing, and the occurrence rate is ~72 million packets per second [14]. In addition, a simple service discovery protocol (SSDP) amplification attack has been recently identified and is known to affect smart TVs, smart cameras, and so forth. Hence, the threat of a large-scale DDoS attack on an IoT environment is expected to increase [15].
Table 2 shows the rates of increase in DDoS attacks and the bandwidth in the third quarter of 2013 and the second quarter of 2014 [14, 15].
The rates of increase in DDos attacks and the bandwidth.
3.3. False Positive and False Negative
Different packets and variable traffic are a result of an increase in the number of devices in the network. It is difficult for existing security systems to accurately detect such new/variant attacks. To deal with such attacks, existing network security systems analyze the patterns of attacks, update the relevant patterns, and cut off the attacks that correspond to the updated patterns. However, such a process is associated with false positive and false negative detections [16].
4. Proposed Security Framework Models
In this study, an SDIoT environment is developed and methods of building a security framework suited to the SDIoT environment are studied. Basically, the controller system is expanded to provide centralized network management and security in order to simplify the environment of the infrastructure. As the control over the network may be lost if there is an overhead in the function used to control the network, a distributed controller environment is developed and the influence of each sector of the distributed environment on other sectors is minimized. Security functions are comprised of authentication and access control, network security, and big-data security analysis. In addition, a simulation test is carried out for the established framework to determine whether the security framework is applicable to the environment.
4.1. SDIoT Network Models
In this study, a network model created by applying the IoT infrastructure to a basic SDN environment is presented. The flow equipment for network connection is operated through the Openflow-Gateway of the SDN and control is achieved using a software-defined controller. An IoT service system is connected to one Openflow-Gateway and is configured in the state where basic access is denied. The sensor devices and the user devices are connected to each other after being authenticated by the controller. In this process, a lightweight authentication process is carried out, and services related to security are set to be carried out by the controller and the Openflow-Gateway. Different security services are configured in the controller.
Figure 2 shows the SDIoT network models.

Proposed SDIoT network models.
4.2. Proposed Security Framework Models
The SDIoT security framework model is divided into an infrastructure layer, control layer, and application layer following the form of the existing SDN framework.
The infrastructure layer is where the network devices are located. It is comprised of various sensor devices and user devices and the systems of the IoT service infrastructure. The network devices for data forwarding are controlled by Openflow-based devices.
The control layer provides services for network control. The additional services it provides include authentication and access control, network and system security, confidentiality and integrity verification, and big-data security analysis. Such services are provided by the software developed for the controller, not by the existing network security devices and a server in a separate location.
The application layer comprises service applications for users and administrator applications for system management by the administrator. The service application is used by users to attain IoT services, and the administrator application is used to control the SDIoT environment.
Figure 3 shows the SDIoT security framework model.

Proposed SDIoT security framework models.
4.2.1. Infra. Layer
4.2.2. Control Layer
As SDP technology has a blind effect of providing a server-concealing function for the internal network controlled by the controller, it is difficult for an unauthenticated device to access the network and even more difficult to collect information about the internal environment. When network resources are desired to be used in the relevant environment, an SPA should be carried out, and as an authentication function is provided through a single packet, lightweight services can be provided with low-specification sensor devices.
Figure 4 shows the outline of the sensor device authentication and data transmission.

Proposed SDIoT authentication and access model (SPA).
The authentication process is as follows.
Step 1.
The sensor device carries out the initial registration process and transmits SPA information to the connected Openflow-Gateway.
Step 2.
If the SPA information is authenticated, the sensor device updates the system information that can be transmitted to the flow table of the Openflow-Gateway.
Step 3.
The sensor device requests for a TLS connection after transmitting the SPA information.
Step 4.
A TLS connection is established between the sensor device and the SDIoT service system.
Step 5.
Sensing data is transmitted.

Proposed SDIoT authentication and access model (certificates).
The authentication process is as follows.
Step 1.
The user device obtains a certificate from a third-party CA through the application.
Step 2.
The user device transmits the certificate and authentication information through the Openflow-Gateway using the application.
Step 3.
The controller verifies the certificate through the third-party CA.
Step 4.
If the certificate is valid, the flow table of the Openflow-Gateway is updated.
Step 5.
A TLS connection between the user device and the SDIoT service infrastructure is attempted.
Step 6.
The IoT service is requested.
Step 7.
The IoT service is provided.
Figure 6 shows the outline of the proposed network security model.

Proposed SDIoT network security module.
Figure 7 shows an example of the encryption and integrity verification process during the data storage process using lightweight codes and the hash function.

Proposed SDIoT integrity and confidentiality service model.
The big-data security analysis module collects all abnormal logs (attack event logs, logs related to failure in log-in, and logs of system use at a specific time) from each distributed module and detects abnormal signs through the security indexes based on the collected log information.
In this study, logs are collected through log agents in the software from the network security module, authentication module, and network control module, and as the software can collect information related to the devices and network, the environment can be more simplified than that comprised of complicated devices in the existing network [17–19].
Figure 8 shows an example of the big-data security analysis architecture of the proposed security framework.

Proposed SDIoT big-data security analysis module.
4.2.3. Application Layer
5. Security Analysis
5.1. Authentication and Access Control
As data leakage, data falsification, and other malicious attacks can be committed through unauthorized access to devices in an IoT environment, an appropriate authentication and access control technology should be implemented. In particular, as there are many low electric power/low specification IoT devices, an authentication and access control technology suitable for these is required. In this study, a means of providing authentication and access control is presented by which the SPA technology of the SDP is applied to configure a security framework. The relevant technology allows different devices to access the network only if they transmit an SPA packet at the beginning of the process. If there is no answer to the relevant information, it is difficult for the attacker to determine whether the attack is successful even when the attacker generates and sends an SPA message randomly. In addition, all the packets received from unauthenticated devices are blocked.
When the SPA process is completed, the controller attempts to establish a TLS connection, which updates the flow table by designating the services, servers, and devices that can be connected to the device that has been authenticated. Hence, it is impossible for the attacker to access other systems through a route other than the designed route in an environment where the controller is protected. Even when the attacker is connected to the network environment through this route, access to other resources is difficult, as the attacker cannot get access to the desired route from the controller.
For safety in the situation above, the controller should be physically protected, and the secret information values for SPA should be safely shared in the new-device registration and update processes. In addition, the SPA information, identification information unique to devices, and additional authentication information should be safely stored and additional security technologies for verification should be applied.
5.2. DDoS Attack Decreases
As the devices that use the network service in an IoT environment increase, the scale of DDoS attack also increases. This may lead to problems in different IoT fields by causing damage greater than that of the existing DDoS attacks.
In this study, as access to the network and traffic are permitted using the SPA function for connection to the network, it is difficult for the attacker to launch attacks because all the traffic is denied unless the information about the SPA registered in the controller is acquired. Accordingly, if the information about the SPA is safely stored, the threat of DDoS attack can be reduced. If DDoS attacks are considered normal behavior circumventing such a method, bandwidth distribution can be utilized as a traffic control policy.
5.3. Abnormality Detection for New Attacks
In an IoT environment where the number of devices using the service increases, the threat of new and different attacks increases in comparison to that for the existing network environment. It is difficult to detect such attacks using the pattern detection technology of the existing security service. New/variant attacks can circumvent the pattern detection rules of the existing security service, which can lead to the problem of false negatives and false positives. In addition, it is difficult to cope with such attacks, as it is difficult to detect them before significant damage actually occurs.
In this study, big-data security analysis technology is used to solve such problems so that the system can be built to detect abnormal signs for new/variant attacks. At present, many companies and researchers are studying big-data security analysis platforms, and several solutions have been developed and supplied. In this study, a big-data security analysis platform is developed and managed as software using the characteristics of a software-defined environment. It can be built by integrating a security service module, an authentication and access control module, IoT service infrastructure, and a control module. Regarding the functional aspect, abnormal signs can be detected by utilizing the data collection technologies of the existing big-data security analysis platform, as they can comprehensively collect system error logs, security event logs, and access logs and analyze their correlation. The correlation analysis is performed using the security indexes, with which countermeasures against new/variant attacks can be set by defining the data to be collected in detail in accordance with the type of abnormal sign to be detected.
6. Simulation Test Performance Analysis
The simulation evaluates the possibility of the functions of the existing security system to be suitably carried out by the software in the proposed security framework model and determines whether the overhead generated in the process of collecting, analyzing, and transmitting the actual data is reduced.
Table 3 shows the environment in which the simulation test is conducted.
Test environment.
6.1. Implementation
The setup for the simulation test of the functional part of the security framework proposed in this paper is shown in Figure 9. The network environment for Openflow of the SDN was built using Mininet 2.0, and KVM technology was used to develop a Hadoop system, a floodlight controller, and a security analysis module. An IP was set for each VM instance through the network bridge in the control layer. The Openflow-switches in the infrastructure layer are controlled by connecting the network to the floodlight controller. Network control is set to enable communication between hosts by setting the flow-entry as the default value. Each host plays the role of replacing an IoT device and continuously communicates with other hosts. Information about the packets and traffic generated during communication is collected through the traffic collection software separated as a VM instance, and the security analysis software performs attack detection based on the collected information.

Test environment configuration.
6.2. Simulation Test
In the test, different hosts continuously exchange messages in the Openflow environment organized as a mininetwork, and several specific attack hosts are designated to carry out SYNFlooding attacks. The security analysis module detects attacks by analyzing the SYNFlooding attacks while the hosts transmit and receive messages to and from each other. In addition, it measures the overhead of the CPU and memory while the data are transmitted to the Hadoop file system for big-data security analysis. To determine an efficient way to build the security framework, the rate of the increase in the CPU and memory usage when the security service is provided from a single controller system must be considered.
The test is carried out as follows.
Step 1.
One Openflow-switch is configured and two hosts are generated and connected to the controller using Mininet 2.0.
Step 2.
Host 1 carries out a SYNFlooding attack on Host 2.
Step 3.
Four hosts are configured, among which two hosts continuously transmit and receive messages while the other two hosts perform SYNFlooding attacks.
Step 4.
Eight hosts are configured, among which four hosts continuously transmit and receive messages while the other four hosts perform SYNFlooding attacks.
Step 5.
Steps 2 to 4 are repeated for each switch host, increasing the number of Openflow-switches to 10.
6.3. Analysis of Test Results and Performance
In this study, the security service is provided through software and, at the same time, a big-data security analysis function is added to cope with new/variant attacks. However, the control system overhead may increase in the process of collecting information to detect attacks or abnormal signs or in the process of providing security services. If the overhead of the controller system increases, the controller system may stop and control over the network may be lost.
Accordingly, a means of building the system in an environment where the modules are distributed is proposed to reduce the overhead. By conducting an actual test, it was found that the overhead can be reduced by operating the security modules being separated from each other. The test results are shown in Table 4. Consequently, though the CPU and memory use in a controller system in a distributed module environment shows a high occupancy rate when the number of hosts is small, the increase in the occupancy rate drops as the number of hosts and switches increases. This shows that a distributed system has an advantage in computing data in the process of collecting and analyzing the data.
Test result.
This result shows that the relevant controller functions can be provided using cloud service in the future, and it is expected that security services can be provided and networks can be managed efficiently by virtualizing modules and increasing the number of virtual instances depending on the scale of each field of the IoT environment.
7. Conclusion
A security framework for the IoT environment that uses SDN technology has been studied. SDN has attracted attention as a means to improve the efficiency and solve the limitations of the existing network environment. It uses software to organize the services provided by the existing network device through improvement of the existing security control environment. In addition, detailed and positive management of the network can be achieved depending on the development and setup of the software. In this study, a security framework that can provide authentication and access control, network and system security, integrity, and confidentiality by utilizing the characteristics of such an environment has been proposed, and a means of building it has been studied. In addition, the feasibility of the system has been evaluated and its safety and efficiency have been studied by conducting a test for determining the possibility of using the security service and for determining whether the distributed module environment can reduce the overhead.
The test results indicated that security services could be provided over the entire network through the controller software by improving the existing network environment. In addition, to solve the problem of the overhead in the process of providing the security service, it was concluded that it is relatively efficient to process data in a distributed module environment. To apply the proposed security framework model in the future, additional studies are required on the detailed system configuration and means of efficiently operating the system. To achieve efficiency, the overhead of the control layer during collection and processing of data should be reduced, and studies on the environment where extension is easy should be conducted.
In the situation where service devices are developed in diverse fields as IoT technology advances in the future, many studies are required on the efficient management of devices and organization of the security services and security control environment. The result of this study can be utilized as the base for such studies, and if an optimized environment is developed by modifying the proposed framework to fit various environments of IoT through verification of its safety, a safe IoT environment can be developed.
