Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/2951
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lakpriya, R. A. K | - |
dc.contributor.author | Rathsara, W. A. S | - |
dc.contributor.author | Fernando, P. N. R. S | - |
dc.contributor.author | Thenuwara, H. S | - |
dc.contributor.author | Ruggahakotuwa, L. O | - |
dc.contributor.author | Senarathne, A. N | - |
dc.date.accessioned | 2022-09-02T10:23:46Z | - |
dc.date.available | 2022-09-02T10:23:46Z | - |
dc.date.issued | 2022-04-07 | - |
dc.identifier.citation | R. A. K. Lakpriya, W. A. S. Rathsara, P. N. R. S. Fernando, H. S. Thenuwara, L. O. Ruggahakotuwa and A. N. Senarathne, "Secure IoT Middleware Using SDN and Intent-Based Routing," 2022 IEEE 7th International conference for Convergence in Technology (I2CT), 2022, pp. 1-7, doi: 10.1109/I2CT54291.2022.9824866. | en_US |
dc.identifier.isbn | 978-1-6654-2168-3 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/2951 | - |
dc.description.abstract | With the rapidly increasing volume of IoT devices in the last decade due to the adaptation of the smart home/office concepts around the world, IoT devices are being targeted by hackers to perform attacks like DDOS and most likely creating botnets which will drastically decrease the performance of IoT devices and may also compromise the networks they are connected to. It is difficult to detect compromised IoT devices because there is more than one device in a simple IoT network, and it is difficult to monitor every device in the network. To solve this issue, this research proposes a Secure Middleware for IoT devices that will collect data generated by IoT devices, scan them for any malicious activity and then trigger an alert if any threat is detected in the IoT Network. The secure middleware is implemented in the proposed SDN architecture that uses Fog Computing, Cloud Computing, and VPN technologies to create a secure, scalable, flexible, and fast network architecture. A machine learning model is used to examine and detect any malicious activity in the IoT network. An open-source SIEM called the ELK stack is used to trigger alerts for the malicious activity identified by the ML model. With the help of the ML model and the SIEM, this proposed middleware will efficiently secure the IoT Software Defined network by detecting malicious attacks in real-time. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2022 IEEE 7th International conference for Convergence in Technology (I2CT); | - |
dc.subject | Secure IoT | en_US |
dc.subject | Middleware | en_US |
dc.subject | Intent-Based Routing | en_US |
dc.subject | Using SDN | en_US |
dc.title | Secure IoT Middleware Using SDN and Intent-Based Routing | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/I2CT54291.2022.9824866 | en_US |
Appears in Collections: | Department of Computer Systems Engineering Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Secure_IoT_Middleware_Using_SDN_and_Intent-Based_Routing.pdf Until 2050-12-31 | 2.21 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.