|
Security requirements | Challenges | Open issues and future directions |
|
| Profiling and tracking | Comprehensive privacy-preserving frameworks |
Privacy | Localization | Context-aware privacy policies |
Secure data transmission | Game theory based privacy-preserving incentives |
Network virtualization and SDNs |
|
Confidentiality | Lightweight primitives | Efficient holistic frameworks |
Consume low resource | Utilization of SDNs for lightweight security provisioning |
|
Secure routing | Secure route establishment | IoT network performance focused routing protocol design |
Isolation of malicious nodes | Effective and fine grained control over routing activities leveraging SDN |
Self-stabilization of the security protocol | |
Preservation of location privacy | |
|
Robust and resilient management | Attack tolerance | SDN-based centralized management frameworks |
Early detection of attacks | |
Quick recovery from failures | |
|
Attack detection (DDOS and insider) | Resource efficient DoS attack detection | Lightweight solution for resource constraint device |
Resource efficient countermeasures | Centralized SDN detection and mitigation algorithms |
Resource efficient insider attack detection | |
|