Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Series

Munster Technological University

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Secap Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes, Dylan Smyth, Sandra Scott-Hayward, Victor Cionca, Sean Mcsweeney, Donna O'Shea Jan 2023

Secap Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes, Dylan Smyth, Sandra Scott-Hayward, Victor Cionca, Sean Mcsweeney, Donna O'Shea

Department of Computer Science Publications

Programmable networking is evolving from programmable control plane solutions such as OpenFlow-based software-defined networking (SDN) to programmable data planes such as P4-based SDN. To support the functionality of the SDN, the correct view of the network topology is required. However, multiple attacks aimed at topology poisoning have been demonstrated in SDNs. While several controller-centralised security solutions have been proposed to defeat topology poisoning attacks, some attacks e.g., the Data Plane ARP Cache Poisoning Attack and the relay-type Link Fabrication Attack are difficult to detect using a fully centralised security solution. In this paper, we present the Security-Aware Programmable (SECAP) Switch—a …


Security, Privacy And Trust For Smart Mobile- Internet Of Things (M-Iot): A Survey, Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeock Lim Sep 2020

Security, Privacy And Trust For Smart Mobile- Internet Of Things (M-Iot): A Survey, Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeock Lim

Publications

With an enormous range of applications, the Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. With the evolution of wireless infrastructure, the focus from simple IoT has been shifted to smart, connected and mobile IoT (M-IoT) devices and platforms, which can enable low-complexity, low-cost and efficient computing through sensors, machines, and even crowdsourcing. All these devices can be grouped under a common term of M-IoT. Even though the positive impact on applications has been tremendous, security, privacy and trust are …