Review on Network Virtualization and SDN in Industrial IoT (IIoT)

Authors

  • Venkata Kishore Chilakapati Technical Advisor, Microsoft. Author
  • Srikanth Reddy Keshireddy Senior Software Engineer, Keen Info Tek Inc. Author
  • Venkata Teja Nagumotu Sr Network Engineer, Techno-bytes Inc. Author
  • Harsha Vardhan Reddy Kavuluri Lead database administrator, Wissen infotech. Author
  • Akhil Kumar Pathani Network Engineer, Ebay. Author
  • Ajay Dasari Senior Support Engineer, Microsoft. Author

DOI:

https://doi.org/10.63282/3050-9262.IJAIDSML-V3I1P117

Keywords:

Network Virtualization, Software-Defined Networking (SDN), Industrial Internet of Things (IIoT), Virtual Network Embedding (VNE), Network Function Virtualization (NFV), Industrial Automation

Abstract

Network virtualization and Software-defined networking (SDN) is regarded as a breakthrough technology that has significantly altered factory communication systems. In the IIoT scenario, such technologies are the ones that provide the power of a highly versatile, scalable, and smart network architecture that can cater to the various industrial requirements. Through virtualization, physical resources are transformed into virtual machines, containers, and virtual network functions, thus cutting down the cost of resource utilization, increasing the number of users and providing quick access to the services in distributed industrial environments. SDN does the same thing by isolating control from the network nodes and data planes. The combination of both these technologies is what makes the virtual network embedding, secure multi-tenancy, dynamic slicing, and edge-fog-cloud orchestration essential for industrial automation happen together. The integration of these technologies improves the overall performance by making it more reliable, reducing the operational complexity, providing stronger security, and enabling the usage and storage of digital twins for predictive maintenance and real-time monitoring. In summary, SDN provides the foundation for highly resilient, adaptive, future-oriented IIoT systems and network virtualization.

References

[1] P. Pathak, A. Shrivastava, and S. Gupta, “A survey on various security issues in delay tolerant networks,” J Adv Shell Progr., vol. 2, no. 2, pp. 12–18, 2015.

[2] I. Ud Din et al., “The Internet of Things: A Review of Enabled Technologies and Future Challenges,” IEEE Access, vol. 7, pp. 7606–7640, 2019, doi: 10.1109/ACCESS.2018.2886601.

[3] Y. Kim, J. Nam, T. Park, S. Scott-Hayward, and S. Shin, “SODA: A software-defined security framework for IoT environments,” Comput. Networks, vol. 163, p. 106889, Nov. 2019, doi: 10.1016/j.comnet.2019.106889.

[4] F. A. Ruambo and J. A. Mwakatobe, “Virtualizing the Iot Ecosystem: a Brief Review, Addressing Nfv Strategies,” Int. J. Eng. Appl. Sci. Technol., vol. 4, no. 3, pp. 322–331, 2019, doi: 10.33564/ijeast.2019.v04i03.053.

[5] R. Horvath, D. Nedbal, and M. Stieninger, “A Literature Review on Challenges and Effects of Software Defined Networking,” Procedia Comput. Sci., vol. 64, pp. 552–561, 2015, doi: 10.1016/j.procs.2015.08.563.

[6] Y. Li and M. Chen, “Software-Defined Network Function Virtualization: A Survey,” IEEE Access, vol. 3, pp. 2542–2553, 2015, doi: 10.1109/ACCESS.2015.2499271.

[7] W. Ben Jaballah, M. Conti, and C. Lal, “A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions,” May 2019, doi: 10.48550/arXiv.1904.04577.

[8] Y. Lu, “Industry 4.0: A survey on technologies, applications and open research issues,” J. Ind. Inf. Integr., vol. 6, pp. 1–10, Jun. 2017, doi: 10.1016/j.jii.2017.04.005.

[9] B. Rodrigues, F. Cerveira, R. Barbosa, and J. Bernardino, “Virtualization: Past and Present Challenges,” in Proceedings of the 13th International Conference on Software Technologies, 2018, pp. 755–761. doi: 10.5220/0006910707550761.

[10] R. Mijumbi, J. Serrat, J.-L. Gorricho, N. Bouten, F. De Turck, and R. Boutaba, “Network Function Virtualization: State-of-the-Art and Research Challenges,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 236–262, 2016, doi: 10.1109/COMST.2015.2477041.

[11] I. Alam et al., “IoT Virtualization: A Survey of Software Definition & Function Virtualization Techniques for Internet of Things,” pp. 1–30, 2019.

[12] S. K. Tayyaba, M. A. Shah, O. A. Khan, and A. W. Ahmed, “Software Defined Network (SDN) Based Internet of Things (IoT),” in Proceedings of the International Conference on Future Networks and Distributed Systems, 2017, pp. 1–8. doi: 10.1145/3102304.3102319.

[13] C. Tipantuna and P. Yanchapaxi, “Network functions virtualization: An overview and open-source projects,” in 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM), IEEE, Oct. 2017, pp. 1–6. doi: 10.1109/ETCM.2017.8247541.

[14] X. Hesselbach, J. R. Amazonas, S. Villanueva, and J. F. Botero, “Coordinated node and link mapping VNE using a new paths algebra strategy,” J. Netw. Comput. Appl., vol. 69, pp. 14–26, Jul. 2016, doi: 10.1016/j.jnca.2016.02.025.

[15] A. Kushwaha, P. Pathak, and S. Gupta, “Review of optimize load balancing algorithms in cloud,” Int. J. Distrib. Cloud Comput., vol. 4, no. 2, pp. 1–9, 2016.

[16] K. E. U. Ahmed, J. Blech, M. A. Gregory, and H. (Heinz) W. Schmidt, “Software Defined Networks in Industrial Automation,” J. Sens. Actuator Networks, vol. 7, no. 3, p. 33, Aug. 2018, doi: 10.3390/jsan7030033.

[17] M. Karakus and A. Durresi, “A survey: Control plane scalability issues and approaches in Software-Defined Networking (SDN),” Comput. Networks, vol. 112, pp. 279–293, Jan. 2017, doi: 10.1016/j.comnet.2016.11.017.

[18] B. A. A. Nunes, M. Mendonca, X.-N. Nguyen, K. Obraczka, and T. Turletti, “A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks,” IEEE Commun. Surv. Tutorials, vol. 16, no. 3, pp. 1617–1634, 2014, doi: 10.1109/SURV.2014.012214.00180.

[19] A. R, Samiksha, A. S, and J. S. K, “Efficient operating system level virtualization techniques for cloud resources,” IOP Conf. Ser. Mater. Sci. Eng., vol. 263, p. 042002, Nov. 2017, doi: 10.1088/1757-899X/263/4/042002.

[20] A. Wang, Z. Zha, Y. Guo, and S. Chen, “Software-Defined Networking Enhanced Edge Computing: A Network-Centric Survey,” Proc. IEEE, vol. 107, no. 8, pp. 1500–1519, Aug. 2019, doi: 10.1109/JPROC.2019.2924377.

[21] N. M. M. K. Chowdhury and R. Boutaba, “Network virtualization: state of the art and research challenges,” IEEE Commun. Mag., vol. 47, no. 7, pp. 20–26, Jul. 2009, doi: 10.1109/MCOM.2009.5183468.

[22] I. Ullah, S. Ahmad, F. Mehmood, and D. Kim, “Cloud Based IoT Network Virtualization for Supporting Dynamic Connectivity among Connected Devices,” Electronics, vol. 8, no. 7, p. 742, Jun. 2019, doi: 10.3390/electronics8070742.

[23] H. Yang, S. Kumara, S. T. S. Bukkapatnam, and F. Tsung, “The internet of things for smart manufacturing: A review,” IISE Trans., vol. 51, no. 11, pp. 1190–1216, Nov. 2019, doi: 10.1080/24725854.2018.1555383.

[24] I. Bedhief, L. Foschini, P. Bellavista, M. Kassar, and T. Aguili, “Toward Self-Adaptive Software Defined Fog Networking Architecture for IIoT and Industry 4.0,” in 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, pp. 1–5. doi: 10.1109/CAMAD.2019.8858499.

[25] S. Gupta and C. Ravishankar, “Lower bounds for Arrangement-based Range-Free Localization in Sensor Networks,” 2012.

[26] Z. Sheng, C. Mahapatra, C. Zhu, and V. C. M. Leung, “Recent Advances in Industrial Wireless Sensor Networks Toward Efficient Management in IoT,” IEEE Access, vol. 3, pp. 622–637, 2015, doi: 10.1109/ACCESS.2015.2435000.

[27] K. Gopalakrishnan and B. Chander, “Security vulnerabilities and issues of traditional wireless sensors networks in IoT,” in Principles of internet of things (IoT) ecosystem: Insight paradigm, Springer, 2019, pp. 519–549.

[28] S. Garg, “Predictive Analytics and Auto Remediation using Artificial Inteligence and Machine learning in Cloud Computing Operations,” Int. J. Innov. Res. Eng. Multidiscip. Phys. Sci., vol. 7, no. 2, 2019, doi: 10.5281/zenodo.15362327.

[29] M. Fahim and A. Sillitti, “Anomaly Detection, Analysis and Prediction Techniques in IoT Environment: A Systematic Literature Review,” IEEE Access, vol. 7, pp. 81664–81681, 2019, doi: 10.1109/ACCESS.2019.2921912.

[30] M. Burhan, R. A. Rehman, B. Khan, and B.-S. Kim, “IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey,” Sensors, vol. 18, no. 9, 2018, doi: 10.3390/s18092796.

[31] J. Sen, “A survey on wireless sensor network security,” arXiv Prepr. arXiv1011.1529, 2010.

[32] M. El Barachi, A. Kadiwal, R. Glitho, F. Khendek, and R. Dssouli, “A Presence-based architecture for the integration of the sensing capabilities of Wireless Sensor Networks in the IP Multimedia subsystem,” IEEE Wirel. Commun. Netw. Conf. WCNC, pp. 3116–3121, 2008, doi: 10.1109/wcnc.2008.544.

[33] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures,” IEEE Access, vol. 7, pp. 82721–82743, 2019, doi: 10.1109/ACCESS.2019.2924045.

[34] H. I. Ahmed, A. Nasr, S. Abdel-Mageid, and H. K. Aslan, “A survey of IoT security threats and defenses,” Int. J. Adv. Comput. Res., vol. 9, no. 45, pp. 325–350, Oct. 2019, doi: 10.19101/IJACR.2019.940088.

[35] I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, and W. Ni, “Anatomy of Threats to the Internet of Things,” IEEE Commun. Surv. Tutorials, vol. 21, no. 2, pp. 1636–1675, 2019, doi: 10.1109/COMST.2018.2874978.

[36] Z. Ma, M. Xiao, Y. Xiao, Z. Pang, H. V. Poor, and B. Vucetic, “High-Reliability and Low-Latency Wireless Communication for Internet of Things: Challenges, Fundamentals, and Enabling Technologies,” IEEE Internet Things J., vol. 6, no. 5, pp. 7946–7970, Oct. 2019, doi: 10.1109/JIOT.2019.2907245.

[37] M. Ahmad, “Reliability Models for the Internet of Things: A Paradigm Shift,” in 2014 IEEE International Symposium on Software Reliability Engineering Workshops, IEEE, Nov. 2014, pp. 52–59. doi: 10.1109/ISSREW.2014.107.

[38] M. Rassam, A. Zainal, and M. Maarof, “Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues,” Sensors, vol. 13, no. 8, pp. 10087–10122, Aug. 2013, doi: 10.3390/s130810087.

[39] A. Ukil, S. Bandyoapdhyay, C. Puri, and A. Pal, “IoT Healthcare Analytics: The Importance of Anomaly Detection,” in 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), 2016, pp. 994–997. doi: 10.1109/AINA.2016.158.

[40] A. Chirayil, R. Maharjan, and C.-S. Wu, “Survey on Anomaly Detection in Wireless Sensor Networks (WSNs),” in 2019 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), IEEE, Jul. 2019, pp. 150–157. doi: 10.1109/SNPD.2019.8935827.

[41] D. ElMenshawy and W. Helmy, “Detection techniques of data anomalies in IoT: A literature survey,” Int. J. Civ. Eng. Technol., vol. 9, pp. 794–807, 2018.

[42] S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues, and Y. Park, “Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges,” IEEE Access, vol. 8, pp. 3343–3363, 2019, doi: 10.1109/ACCESS.2019.2962829.

[43] E. Siow, T. Tiropanis, and W. Hall, “Analytics for the internet of things: A survey,” ACM Comput. Surv., vol. 51, no. 4, pp. 1–36, 2018, doi: 10.48550/arXiv.1807.00971.

[44] L. Cui, S. Yang, F. Chen, Z. Ming, N. Lu, and J. Qin, “A survey on application of machine learning for Internet of Things,” Int. J. Mach. Learn. Cybern., vol. 9, no. 8, pp. 1399–1417, 2018.

[45] X. Ma et al., “A Survey on Deep Learning Empowered IoT Applications,” IEEE Access, vol. 7, pp. 181721–181732, 2019, doi: 10.1109/ACCESS.2019.2958962.

[46] G. M. Dias, B. Bellalta, and S. Oechsner, “A survey about prediction-based data reduction in wireless sensor networks,” ACM Comput. Surv., vol. 49, no. 3, pp. 1–35, 2016.

[47] D. Kateris, D. Moshou, X.-E. Pantazi, I. Gravalos, N. Sawalhi, and S. Loutridis, “A machine learning approach for the condition monitoring of rotating machinery,” J. Mech. Sci. Technol., vol. 28, no. 1, pp. 61–71, 2014.

[48] M. El-Shamouty, K. Kleeberger, A. Lämmle, and M. Huber, “Simulation-driven machine learning for robotics and automation,” tm - Tech. Mess., vol. 86, no. 11, pp. 673–684, Nov. 2019, doi: 10.1515/teme-2019-0072.

[49] Polu, A. R., Buddula, D. V. K. R., Narra, B., Gupta, A., Vattikonda, N., & Patchipulusu, H. (2021). Evolution of AI in Software Development and Cybersecurity: Unifying Automation, Innovation, and Protection in the Digital Age. Available at SSRN 5266517.

[50] Padur, S. K. R. (2020). From centralized control to democratized insights: Migrating enterprise reporting from IBM Cognos to Microsoft Power BI. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, 6(1), 218-225.

[51] Bitkuri, V., Kendyala, R., Kurma, J., Mamidala, V., Enokkaren, S. J., & Attipalli, A. (2021). Systematic Review of Artificial Intelligence Techniques for Enhancing Financial Reporting and Regulatory Compliance. International Journal of Emerging Trends in Computer Science and Information Technology, 2(4), 73-80.

[52] Padur, S. K. R. (2019). Machine learning for predictive capacity planning: Evolution from analytical modeling to autonomous infrastructure. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 5(5), 285-293.

[53] Attipalli, A., Enokkaren, S., BITKURI, V., Kendyala, R., KURMA, J., & Mamidala, J. V. (2021). Enhancing Cloud Infrastructure Security Through AI-Powered Big Data Anomaly Detection. Available at SSRN 5741305.

[54] Singh, A. A. S., Tamilmani, V., Maniar, V., Kothamaram, R. R., Rajendran, D., & Namburi, V. D. (2021). Predictive Modeling for Classification of SMS Spam Using NLP and ML Techniques. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 2(4), 60-69.

[55] Padur, S. K. R. (2020). AI augmented disaster recovery simulations: From chaos engineering to autonomous resilience orchestration. International Journal of Scientific Research in Science, Engineering and Technology, 7(6), 367-378.

[56] Reddy Padur, S. K. (2021). From Scripts to Platforms-as-Code: The Role of Terraform and Ansible in Declarative Infrastructure Rollouts. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 621-628.

[57] Kothamaram, R. R., Rajendran, D., Namburi, V. D., Singh, A. A. S., Tamilmani, V., & Maniar, V. (2021). A Survey of Adoption Challenges and Barriers in Implementing Digital Payroll Management Systems in Across Organizations. International Journal of Emerging Research in Engineering and Technology, 2(2), 64-72.

[58] Padur, S. K. R. (2018). Autonomous cloud economics: AI driven right sizing and cost optimization in hybrid infrastructures. International Journal of Scientific Research in Science and Technology, 4(5), 2090-2097.

[59] Rajendran, D., Namburi, V. D., Singh, A. A. S., Tamilmani, V., Maniar, V., & Kothamaram, R. R. (2021). Anomaly Identification in IoT-Networks Using Artificial Intelligence-Based Data-Driven Techniques in Cloud Environmen. International Journal of Emerging Trends in Computer Science and Information Technology, 2(2), 83-91.

[60] Padur, S. K. R. (2021). Bridging Human, System, and Cloud Integration through RESTful Automation and Governance. the International Journal of Science, Engineering and Technology, 9(6).

[61] Attipalli, A., BITKURI, V., KURMA, J., Enokkaren, S., Kendyala, R., & Mamidala, J. V. (2021). A Survey of Artificial Intelligence Methods in Liquidity Risk Management: Challenges and Future Directions. Available at SSRN 5741342.

[62] Padur, S. K. R. (2021). From Control to Code: Governance Models for Multi-Cloud ERP Modernization. International Journal of Scientific Research & Engineering Trends, 7(3).

[63] Routhu, K. K. (2021). Harnessing AI Dashboards in Oracle Cloud HCM: Advancing Predictive Workforce Intelligence and Managerial Agility. International Journal of Scientific Research & Engineering Trends, 7(6).

[64] Padur, S. K. R. (2021). Deep learning and process mining for ERP anomaly detection: Toward predictive and self-monitoring enterprise platforms. Available at SSRN 5605531.

Published

2022-03-30

Issue

Section

Articles

How to Cite

1.
Chilakapati VK, Keshireddy SR, Nagumotu VT, Reddy Kavuluri HV, Pathani AK, Dasari A. Review on Network Virtualization and SDN in Industrial IoT (IIoT). IJAIDSML [Internet]. 2022 Mar. 30 [cited 2026 Apr. 29];3(1):162-7. Available from: https://ijaidsml.org/index.php/ijaidsml/article/view/485