1 Introduction
1.1 Related Surveys
Tech | Reference | Year | Main topic |
---|---|---|---|
SDN | [11] | 2021 | Solutions to cyber defence on SDN based systems with taxonomy |
[12] | 2021 | Security and Privacy concerns of Controllers of SDN | |
[13] | 2021 | SDN based Security for 5G framework | |
[14] | 2021 | Survey of Solution to DDoS and DoS attack in SDN | |
[15] | 2021 | SDN-based systematic review for edge and cloud computing in IoT | |
[16] | 2021 | SDN framework for smart industrial IoT environment | |
[17] | 2019 | Integration of SDN and Smart Building | |
[18] | 2019 | Application of SDN for improving security in computer networks | |
[19] | 2018 | SDN–NFV framework for ensuring security in IoT environment | |
[20] | 2018 | Security aspects and open challenges of SDN technology | |
BC | [21] | 2021 | Management and Improvement of information systems security using BC |
[22] | 2021 | Analysis of the evolution, security of the BC technology | |
[23] | 2021 | Aspects of BC with future research scopes | |
[24] | 2021 | A survey of the application of BC specifically in decentralization method | |
[25] | 2021 | BC for addressing challenges and security aspects in IIoT | |
[26] | 2021 | Integration of IoT and BC for enhancing security | |
[27] | 2020 | Improvements in Industry 4.0 by integrating BC technology | |
[28] | 2020 | Approaches for enhancing security in BC technology | |
[29] | 2020 | Security issues of IoT and solutions provided by BC technology | |
[30] | 2019 | Classification of security vulnerabilities in BC technology | |
[31] | 2019 | Privacy issues associated with BC-based applications | |
[32] | 2018 | Applications and challenges of BC for IoT and other paradigms | |
[33] | 2018 | Proof- and voting-based algorithms for consensus in BC technology | |
[34] | 2018 | BC-based approaches for different security services | |
[35] | 2018 | Overview of BC technology and classification of its threat models | |
[36] | 2018 | BC-based security techniques designed for, or applicable to IoT |
1.2 Contributions and Organization of the Survey
Acronym | Definition |
---|---|
ACL
| Access Control List |
AI
| Artificial Intelligence |
API
| Application Programming Interface |
BC
| Blockchain |
DDoS
| Distributed Denial of Service |
DL
| Deep Learning |
IDS
| Intrusion Detection System |
ML
| Machine Learning |
NFV
| Network Function Virtualization |
P2P
| Peer to Peer |
PoS
| Proof of Stake |
PoW
| Proof of Work |
SC
| Smart Contract |
SDN
| Software-Defined Networking |
SPBFT
| Simplified Practical Byzantine Fault Tolerance |
VANET
| Vehicular Ad hoc Network |
-
We discuss the state-of-art literature and provide a general overview about BC and SDN.
-
We present the effective benefits of the integration of SDN with BC; we also investigate its existing and upcoming features.
-
We discuss security and privacy issues of BC and SDN and their integration (i.e. BC–SDN).
-
We review the applications of these technologies in different fields.
-
Finally, we describe issues, open challenges, and future investigations related to considered technologies.
2 Background Overview
2.1 Blockchain
2.1.1 Key Aspects of Blockchain
2.1.2 Types of Blockchain
2.1.3 Attaining Consensus in Blockchain
2.2 Software Defined Networking
3 Integration of Blockchain with SDN
3.1 Motivations
3.2 State-of-Art Proposals
4 Security and Privacy Issues in BC–SDN Systems
4.1 Security and Privacy Issues in Blockchain
4.1.1 Majority Attacks (51% Attack)
4.1.2 Forking Attacks
-
Hard fork: a hard-fork is a significant change within a cryptocurrency protocol that is incompatible with the previous version. It usually changes or improves an existing protocol or creates a new independent protocol (and consequently a new chain). The node that does not update to the new version will not be able to process transactions or push new blocks to the BC. If a group of nodes continues to use the old version, a permanent split occurs in the BC.
-
Soft fork: a soft-fork is actually a change in a cryptocurrency protocol that is back-compatible and where non-updated nodes are able to process transactions and add new blocks to the BC.
4.1.3 Selfish Mining
4.1.4 Social Engineering
4.1.5 Privacy in Blockchain: Confidentiality and Authentication
4.1.6 Authorization
4.1.7 Other Issues
4.2 Security Management in SDN
4.3 Security and Privacy Issues of BC–SDN
4.3.1 Aim and Challenges of BC–SDN for Security
4.3.2 Confidentiality and Privacy in BC–SDN
5 Notable Applications
5.1 Blockchain Applications
Reference | Year | Application field |
---|---|---|
[115] | 2021 | Application of BC for the sustainability of Prefabricated Housing Construction |
[116] | 2021 | Barriers for adopting BC technology in sustainable supply chains |
[117] | 2021 | Constructing a smart city IoT framework with BC and SDN that is energy aware and distributed securely |
[118] | 2021 | Blockchain application for supply chain in the area of construction industry |
[119] | 2021 | Blokchain technology for the safety of the management of food data |
[120] | 2021 | Application of Blockchain for financial sector |
[121] | 2021 | BC-based architecture for intelligent vaccine distribution approaches in COVID-19 pandemic situation |
[122] | 2021 | Integration of Blockchain for Supply chain management |
[123] | 2021 | Blockchain-based privacy for smart healthcare management |
[124] | 2020 | Impact of BC on applications covering different industrial sectors |
[125] | 2020 | Effects of BC technology on the logistics industry and other business models |
[126] | 2020 | Framework for the analysis of BC integrating institutional, market, and technical factors |
[127] | 2020 | BC-based decentralized app for smart building system management |
[128] | 2020 | Blockchain-based security for cloud storage management in IoT networks |
[129] | 2019 | Applications in the architecture, engineering, and construction industries |
[130] | 2019 | BC-enabled SCs in different application scenarios (e.g., finance, energy, etc.) |
[131] | 2019 | Review of the BC systems exploited in the oil and gas industry |
[132] | 2019 | Main trends of BC usage in supply chains management and logistics |
[133] | 2019 | SDN–IoT model with NFV implementation for smart cities based on a distributed protected BC architecture |
[134] | 2019 | Applications for smart communities (e.g., smart grid, transportation, healthcare) |
[135] | 2018 | BC-connected gateways to maintain user privacy in IoT networks |
[136] | 2018 | LedgerGuard : a tool for ledger integrity, detecting and recovering corrupted blocks |
[137] | 2018 | Patient monitoring system using SC and private BC based on the Ethereum protocol |
[138] | 2018 | Potential applications of BC in travel industry |
[139] | 2018 | Decentralized apps and design of a certificate system based on Ethereum BC |
[140] | 2018 | Model for academic certificate verification using BC technology |
[141] | 2018 | BC for Education to support protection and secure management of certificates |
[142] | 2017 | Lightweight instance of a BC system for smart home environments |
[143] | 2017 | Current and possible future applications of BC in various domains |
[144] | 2017 | FruitChains: a new protocol to ensure fairness in a BC |
[145] | 2016 | BC-based distributed system for educational record and reputation |