TY - GEN
T1 - Securing wireless software defined networks: Appraising threats, defenses & research challenges
AU - Bakhshi, Taimur
PY - 2018/2/1
Y1 - 2018/2/1
N2 - Software defined networking (SDN) separates the network control logic from data forwarding functionality, offering real-time network programmability and granular policy management. Initial successful SDN implementations offering scalability and automated resource provisioning in wired network environments have motivated efforts to bring the paradigm to the wireless domain. Wireless software defined networking (WSDN) formulation in traditional and emerging (IoT, smart grid, vehicular) wireless environments have therefore, raised concerns about the inherent security challenges in WSDN architecture. The wireless medium poses additional security concerns and provides opportunities for attackers to target the control plane, data forwarding elements as well as individual wireless applications. The present paper reviews and classifies the key security threats facing WSDN environments. Furthermore, presently available mitigation techniques and their state-of-the-art adoption in WSDN is discussed. Finally, the paper highlights present and future research challenges that need to be addressed for successful adoption of WSDN in carrier-grade or realistic operations.
AB - Software defined networking (SDN) separates the network control logic from data forwarding functionality, offering real-time network programmability and granular policy management. Initial successful SDN implementations offering scalability and automated resource provisioning in wired network environments have motivated efforts to bring the paradigm to the wireless domain. Wireless software defined networking (WSDN) formulation in traditional and emerging (IoT, smart grid, vehicular) wireless environments have therefore, raised concerns about the inherent security challenges in WSDN architecture. The wireless medium poses additional security concerns and provides opportunities for attackers to target the control plane, data forwarding elements as well as individual wireless applications. The present paper reviews and classifies the key security threats facing WSDN environments. Furthermore, presently available mitigation techniques and their state-of-the-art adoption in WSDN is discussed. Finally, the paper highlights present and future research challenges that need to be addressed for successful adoption of WSDN in carrier-grade or realistic operations.
U2 - 10.1109/icacs.2018.8333279
DO - 10.1109/icacs.2018.8333279
M3 - Conference contribution
T3 - 2018 International Conference on Advancements in Computational Sciences (ICACS)
BT - 2018 International Conference on Advancements in Computational Sciences (ICACS)
PB - Institute of Electrical and Electronics Engineers
T2 - 2018 International Conference on Advancements in Computational Sciences
Y2 - 19 February 2018 through 21 February 2018
ER -