Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms
The software defined network (SDN) integrated with internet of things (IoT) reduces the scalability of IoT devices by managing the network. The SDN, on the other hand, is particularly subject to attacks since it relies on a centralised controller for network management, which attackers can simply al...
Uložené v:
| Vydané v: | International journal of information technology (Singapore. Online) Ročník 15; číslo 1; s. 335 - 344 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Singapore
Springer Nature Singapore
01.01.2023
Springer Nature B.V |
| Predmet: | |
| ISSN: | 2511-2104, 2511-2112 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The software defined network (SDN) integrated with internet of things (IoT) reduces the scalability of IoT devices by managing the network. The SDN, on the other hand, is particularly subject to attacks since it relies on a centralised controller for network management, which attackers can simply alter. Communication between users and resources must be authenticated using the internal security approach. The proposed work introduces the SAF-Secure Authentication framework, which improves security and delivers efficient services to entities by efficiently utilising the existing challenges. Initially, all the users and applications are registered with attributes by using the keccak-256 hashing algorithm based on the registration, the Authentication is performed to ensure legitimacy by generating digital certificates based on the attributes by using Bliss-B algorithm. The comparison of the proposed method with several relevant works are performed to evaluate and validate the performance. The proposed SAF architecture provides better computation overhead and resource utilization. |
|---|---|
| AbstractList | The software defined network (SDN) integrated with internet of things (IoT) reduces the scalability of IoT devices by managing the network. The SDN, on the other hand, is particularly subject to attacks since it relies on a centralised controller for network management, which attackers can simply alter. Communication between users and resources must be authenticated using the internal security approach. The proposed work introduces the SAF-Secure Authentication framework, which improves security and delivers efficient services to entities by efficiently utilising the existing challenges. Initially, all the users and applications are registered with attributes by using the keccak-256 hashing algorithm based on the registration, the Authentication is performed to ensure legitimacy by generating digital certificates based on the attributes by using Bliss-B algorithm. The comparison of the proposed method with several relevant works are performed to evaluate and validate the performance. The proposed SAF architecture provides better computation overhead and resource utilization. |
| Author | Brahmananda, S. H. Sahana, D. S. |
| Author_xml | – sequence: 1 givenname: D. S. orcidid: 0000-0003-2046-8113 surname: Sahana fullname: Sahana, D. S. email: ssanthos@gitam.edu organization: Department of CSE, GITAM School of Technology, GITAM(Deemed to be University) – sequence: 2 givenname: S. H. surname: Brahmananda fullname: Brahmananda, S. H. email: bsavadat@gitam.edu organization: Department of CSE, GITAM School of Technology, GITAM(Deemed to be University) |
| BookMark | eNp9kD9PAzEMxSMEElD6BZgiMQfs5HJ3HflXqEAwtEwMUZombaBNILlTxbfnaBFIDEy2rPezn98h2Q0xWEKOEU4RoDrLBdYVMOCcAUJVsPUOOeASkXFEvvvTQ7FP-jn7KQjkpZAVHpDnsTVtsvS8bRY2NN7oxsdAh0mv7DqmV-piouOrBzaKExpss5m12Yc5vbPG6FfGZUl1mNGLpc-ZXVC9nMfkm8UqH5E9p5fZ9r9rjzwNryeXt-z-8WZ0eX7PDBfFmqEwU13LGlBLKws3qE1VoUHuiukMQIAQ6ErX-TXAy4EuwQGfDTQXtqxdJ-iRk-3etxTfW5sb9RLbFLqTSnApOQpeyE5Vb1UmxZyTdcr4ZvNtk7RfKgT1labapqm6NNUmTbXuUP4HfUt-pdPH_5DYQrkTh7lNv67-oT4BrfGH9g |
| CitedBy_id | crossref_primary_10_32604_cmc_2024_052994 crossref_primary_10_1007_s41870_024_02064_w crossref_primary_10_1007_s41870_023_01402_8 crossref_primary_10_1007_s41870_023_01393_6 crossref_primary_10_1007_s41870_024_02238_6 |
| Cites_doi | 10.21817/indjcse/2020/v11i4/201104270 10.1016/j.future.2020.11.010 10.1109/TIFS.2019.2946928 10.1109/ACCESS.2020.3002815 10.1109/JIOT.2020.3024058 10.1109/TNSM.2018.2886379 10.1007/s11277-019-07010-9 10.1109/JIOT.2019.2960033 10.1109/TNSE.2020.3036456 10.1016/j.comnet.2019.05.022 10.1109/TNET.2020.2977006 10.1145/1355734.1355746 10.1109/JIOT.2020.2997651 10.1016/j.jpdc.2020.09.006 10.1109/tifs.2019.2946928 10.1145/2534169.2486019 10.1007/s10586-019-02945-x 10.1109/JSYST.2020.2996185 10.1007/s41870-018-0258-1 10.1007/s41870-018-0199-8 10.1007/978-3-319-11698-3_6 10.1007/s41870-019-00354-2 10.1109/MIC.2011.50 10.1109/IEMCON.2019.8936207 10.1109/ACCESS.2019.2941084 10.1007/s13198-021-01054-6 10.1007/s41870-022-00938-5 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2022. Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2022. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2022. Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2022. |
| DBID | AAYXX CITATION 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
| DOI | 10.1007/s41870-022-01074-w |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central Database Suite (ProQuest) ProQuest Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Collection (ProQuest) ProQuest Computer Science Collection Computer Science Database (ProQuest) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 2511-2112 |
| EndPage | 344 |
| ExternalDocumentID | 10_1007_s41870_022_01074_w |
| GroupedDBID | -EM 0R~ 406 AACDK AAHNG AAIAL AAJBT AANZL AASML AATNV AATVU AAUYE ABAKF ABDZT ABECU ABFTV ABJNI ABJOX ABKCH ABMQK ABQBU ABTEG ABTKH ABTMW ABXPI ACAOD ACDTI ACGFS ACHSB ACMLO ACOKC ACPIV ACZOJ ADHHG ADKNI ADKPE ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEJRE AEMSY AEOHA AESKC AEVLU AEXYK AFBBN AFQWF AGDGC AGMZJ AGQEE AGRTI AHSBF AIAKS AIGIU AILAN AITGF AJRNO AJZVZ ALFXC ALMA_UNASSIGNED_HOLDINGS AMKLP AMXSW AMYLF AMYQR AXYYD BGNMA CSCUP DNIVK DPUIP EBLON EBS EIOEI EJD FERAY FIGPU FINBP FNLPD FSGXE GGCAI GJIRD IKXTQ IWAJR J-C JZLTJ KOV LLZTM M4Y NPVJJ NQJWS NU0 O9J PT4 RLLFE ROL RSV SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE TSG UOJIU UTJUX UZXMN VFIZW Z7Z Z81 Z83 Z88 ZMTXR AAYXX ABBRH ABDBE ABFSG ABRTQ ABUWG ACSTC AEZWR AFDZB AFHIU AFKRA AFOHR AHPBZ AHWEU AIXLP ARAPS ATHPR AYFIA AZQEC BENPR BGLVJ CCPQU CITATION DWQXO GNUQQ HCIFZ K7- PHGZM PHGZT PQGLB 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK JQ2 L7M L~C L~D M0N P62 PKEHL PQEST PQQKQ PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c234w-13cba85801a5e54f98c771c12f4bd0030331f6f357c0269a60f02d9a23e68f003 |
| IEDL.DBID | P5Z |
| ISSN | 2511-2104 |
| IngestDate | Tue Sep 30 03:20:56 EDT 2025 Tue Nov 18 21:07:10 EST 2025 Sat Nov 29 03:11:46 EST 2025 Fri Feb 21 02:44:46 EST 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 1 |
| Keywords | SDN-IoT Hash value IFogSim Authentication Keccak-256 hashing algorithm Internet of things (IoT) Digital signature Bliss-B algorithm SDN Trusted authority |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c234w-13cba85801a5e54f98c771c12f4bd0030331f6f357c0269a60f02d9a23e68f003 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-2046-8113 |
| PQID | 3255213245 |
| PQPubID | 2034493 |
| PageCount | 10 |
| ParticipantIDs | proquest_journals_3255213245 crossref_citationtrail_10_1007_s41870_022_01074_w crossref_primary_10_1007_s41870_022_01074_w springer_journals_10_1007_s41870_022_01074_w |
| PublicationCentury | 2000 |
| PublicationDate | 20230100 2023-01-00 20230101 |
| PublicationDateYYYYMMDD | 2023-01-01 |
| PublicationDate_xml | – month: 1 year: 2023 text: 20230100 |
| PublicationDecade | 2020 |
| PublicationPlace | Singapore |
| PublicationPlace_xml | – name: Singapore – name: Heidelberg |
| PublicationSubtitle | An Official Journal of Bharati Vidyapeeth's Institute of Computer Applications and Management |
| PublicationTitle | International journal of information technology (Singapore. Online) |
| PublicationTitleAbbrev | Int. j. inf. tecnol |
| PublicationYear | 2023 |
| Publisher | Springer Nature Singapore Springer Nature B.V |
| Publisher_xml | – name: Springer Nature Singapore – name: Springer Nature B.V |
| References | GuoXLinHLiZPengMDeep-reinforcement-learning-based QoS-aware secure routing for SDN-IoTIEEE Internet Things J202076242625110.1109/JIOT.2019.2960033 WuTZhouPWangBLiATangXXuZChenKDingXJoint traffic control and multi-channel reassignment for core backbone network in SDN-IoT: a multi-agent deep reinforcement learning approachIEEE Trans Netw Sci Eng20218231245423179210.1109/TNSE.2020.3036456 Al-JamaliNAAl-RaweshidyHSIntelligent traffic management and load balance based on spike ISDN-IoTIEEE Syst J2021151640165110.1109/JSYST.2020.2996185 AtiewiSAl-RahayfehAAAlmianiMYussofSAlfandiOAbugabahAJararwehYScalable and secure big data IoT system based on multifactor authentication and lightweight cryptographyIEEE Access2020811349811351110.1109/ACCESS.2020.3002815 ZhangPWuHZhangDLiQVerifying rule enforcement in software defined networks with REVIEEE/ACM Trans Netw202028291792910.1109/TNET.2020.2977006 Zhang W, Yue, M (2021) The application of building energy management system based on IoT technology in smart city. Int J Syst Assur Eng Manag 12:617–628. https://doi.org/10.1007/s13198-021-01054-6 DeebakBDAl-turjmanFLightweight authentication for IoT/Cloud-based forensics in intelligent data computingFuture Gener Comput Syst202111640642510.1016/j.future.2020.11.010 LengXHouKChenYBuKSongLLiYA lightweight policy enforcement system for resource protection and management in the SDN-based cloudComput Networks2019161688110.1016/j.comnet.2019.05.022 Sahana D S, Dr. Dayanand Lal N, Neetha K S, Nida kousar G, Sakkari DS (2020) SDN evolution: a quality viewpoint for enterprise management. http://www.warse.org/IJETER/static/pdf/file/ijeter85872020.pdf KangHYegneswaranVGhoshSPorrasPAShinSAutomated permission model generation for securing SDN control-planeIEEE Trans Inf Forensics Secur2020151668168210.1109/TIFS.2019.2946928 IqbalWAbbasHDengPWanJRaufBAbbasYRashidIALAM: anonymous lightweight authentication mechanism for SDN-enabled smart homesIEEE Internet Things J202189622963310.1109/JIOT.2020.3024058 AwoyemiBSAlfaASMaharajBTResource optimisation in 5G and internet-of-things networkingWireless Pers Commun202011142671270210.1007/s11277-019-07010-9 Burikova S et al. (2019) A trust management framework for software defined networks-based internet of things," 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). pp. 0325-0331, doi: https://doi.org/10.1109/IEMCON.2019.8936207 McKeownNAndersonTBalakrishnanHParulkarGPetersonLRexfordJShenkerSTurnerJOpenFlow: enabling innovation in campus networksACM SIGCOMM Comput Commun Rev2008382697410.1145/1355734.1355746 NerurkarPChandaneMBhirudSUnderstanding structure and behavior of systems: a network perspectiveInt J Inf Tecnol2022141145115910.1007/s41870-019-00354-2 Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M, Zolla J (2013) "B4: Experience with a globally-deployed software defined WAN", In proceedings of Association for Computing Machinery's Special Interest Group on Data Communications Computer Communication Review, vol.43, no.4, pp.3-14 ChenIGuoJWangDTsaiJAl-HamadiHYouITrust-based service management for mobile cloud IoT systemsIEEE Trans Netw Serv Manag20191624626310.1109/TNSM.2018.2886379 TangYLiuTHeXYuJQinPA lightweight two-way authentication scheme between communication nodes for software defined optical access networkIEEE Access2019713324813325610.1109/ACCESS.2019.2941084 MishraJSheetlaniJReddyKHKData center network energy consumption minimization: a hierarchical FAT-tree approachInt J Inf Tecnol20221450751910.1007/s41870-018-0258-1 Shuangyu H, Jianwei L, Jian M, Jie C (2015) “Hierarchical solution for access control and authentication in software defined networks”, In International Conference on Network and System Security, pp. 70–81 HuTZhangZYiPLiangDLiZRenQHuYLanJSEAPP: a secure application management framework based on REST API access control in SDN-enabled cloud environmentJ Parallel Distributed Comput202114710812310.1016/j.jpdc.2020.09.006 Dangovas V, Kuliesius F (2014) "SDN-driven authentication and access control system", In The International Conference on Digital Information, Networking, and Wireless Communications (DINWC) Society of Digital Information and Wireless Communication, pp.20 RavindraSMAPSDN-EESC: a modeling of authentication process for the SDNusing encrypted entity scheme cryptographyIndian J Comput Sci Eng (IJCSE)202011439440410.21817/indjcse/2020/v11i4/201104270 BadawyMMAliZHAliHAQoS provisioning framework for service-oriented internet of things (IoT)Clust Comput201910.1007/s10586-019-02945-x GaoHHuJHuangTWangJChenYSecurity issues in online social networksIEEE Internet Comput2011154566310.1109/MIC.2011.50 AhmadMSinghSKhuranaSCryptographic one-way hash function generation using twelve-terms 4D nonlinear systemInt J Inf Tecnol2021132295230310.1007/s41870-018-0199-8 BoussahaRChallalYBouabdallahABessedikMOptimized in-network authentication against pollution attacks in software-defined-named data networkingJ Inform Secur Appl202050 KangHYegneswaranVGhoshzSPorrasPShinSAutomated permission model generation for securing SDN control-planeIEEE Trans Inf Forensics Secur201910.1109/tifs.2019.2946928 SudhakarTRamalingamPJagatheswariSAn improved proxy-vehicle based authentication scheme for vehicular ad-hoc networksInt J Inf Tecnol2022142441244910.1007/s41870-022-00938-5 IqbalWAbbasHDaneshmandMRaufBBangashYAAn in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined securityIEEE Internet Things J20207102501027610.1109/JIOT.2020.2997651 I Chen (1074_CR14) 2019; 16 H Kang (1074_CR20) 2020; 15 X Leng (1074_CR19) 2019; 161 M Ahmad (1074_CR13) 2021; 13 1074_CR28 1074_CR29 1074_CR3 1074_CR5 1074_CR23 W Iqbal (1074_CR7) 2020; 7 W Iqbal (1074_CR16) 2021; 8 T Sudhakar (1074_CR8) 2022; 14 S Ravindra (1074_CR26) 2020; 11 NA Al-Jamali (1074_CR6) 2021; 15 BS Awoyemi (1074_CR12) 2020; 111 R Boussaha (1074_CR24) 2020; 50 H Gao (1074_CR10) 2011; 15 Y Tang (1074_CR27) 2019; 7 J Mishra (1074_CR17) 2022; 14 T Hu (1074_CR21) 2021; 147 P Zhang (1074_CR25) 2020; 28 X Guo (1074_CR30) 2020; 7 MM Badawy (1074_CR9) 2019 N McKeown (1074_CR2) 2008; 38 H Kang (1074_CR22) 2019 1074_CR1 S Atiewi (1074_CR18) 2020; 8 T Wu (1074_CR4) 2021; 8 BD Deebak (1074_CR15) 2021; 116 P Nerurkar (1074_CR11) 2022; 14 |
| References_xml | – reference: DeebakBDAl-turjmanFLightweight authentication for IoT/Cloud-based forensics in intelligent data computingFuture Gener Comput Syst202111640642510.1016/j.future.2020.11.010 – reference: HuTZhangZYiPLiangDLiZRenQHuYLanJSEAPP: a secure application management framework based on REST API access control in SDN-enabled cloud environmentJ Parallel Distributed Comput202114710812310.1016/j.jpdc.2020.09.006 – reference: IqbalWAbbasHDengPWanJRaufBAbbasYRashidIALAM: anonymous lightweight authentication mechanism for SDN-enabled smart homesIEEE Internet Things J202189622963310.1109/JIOT.2020.3024058 – reference: Al-JamaliNAAl-RaweshidyHSIntelligent traffic management and load balance based on spike ISDN-IoTIEEE Syst J2021151640165110.1109/JSYST.2020.2996185 – reference: TangYLiuTHeXYuJQinPA lightweight two-way authentication scheme between communication nodes for software defined optical access networkIEEE Access2019713324813325610.1109/ACCESS.2019.2941084 – reference: Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M, Zolla J (2013) "B4: Experience with a globally-deployed software defined WAN", In proceedings of Association for Computing Machinery's Special Interest Group on Data Communications Computer Communication Review, vol.43, no.4, pp.3-14 – reference: MishraJSheetlaniJReddyKHKData center network energy consumption minimization: a hierarchical FAT-tree approachInt J Inf Tecnol20221450751910.1007/s41870-018-0258-1 – reference: AtiewiSAl-RahayfehAAAlmianiMYussofSAlfandiOAbugabahAJararwehYScalable and secure big data IoT system based on multifactor authentication and lightweight cryptographyIEEE Access2020811349811351110.1109/ACCESS.2020.3002815 – reference: WuTZhouPWangBLiATangXXuZChenKDingXJoint traffic control and multi-channel reassignment for core backbone network in SDN-IoT: a multi-agent deep reinforcement learning approachIEEE Trans Netw Sci Eng20218231245423179210.1109/TNSE.2020.3036456 – reference: NerurkarPChandaneMBhirudSUnderstanding structure and behavior of systems: a network perspectiveInt J Inf Tecnol2022141145115910.1007/s41870-019-00354-2 – reference: AwoyemiBSAlfaASMaharajBTResource optimisation in 5G and internet-of-things networkingWireless Pers Commun202011142671270210.1007/s11277-019-07010-9 – reference: LengXHouKChenYBuKSongLLiYA lightweight policy enforcement system for resource protection and management in the SDN-based cloudComput Networks2019161688110.1016/j.comnet.2019.05.022 – reference: Zhang W, Yue, M (2021) The application of building energy management system based on IoT technology in smart city. Int J Syst Assur Eng Manag 12:617–628. https://doi.org/10.1007/s13198-021-01054-6 – reference: Burikova S et al. (2019) A trust management framework for software defined networks-based internet of things," 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). pp. 0325-0331, doi: https://doi.org/10.1109/IEMCON.2019.8936207 – reference: McKeownNAndersonTBalakrishnanHParulkarGPetersonLRexfordJShenkerSTurnerJOpenFlow: enabling innovation in campus networksACM SIGCOMM Comput Commun Rev2008382697410.1145/1355734.1355746 – reference: Dangovas V, Kuliesius F (2014) "SDN-driven authentication and access control system", In The International Conference on Digital Information, Networking, and Wireless Communications (DINWC) Society of Digital Information and Wireless Communication, pp.20 – reference: GaoHHuJHuangTWangJChenYSecurity issues in online social networksIEEE Internet Comput2011154566310.1109/MIC.2011.50 – reference: RavindraSMAPSDN-EESC: a modeling of authentication process for the SDNusing encrypted entity scheme cryptographyIndian J Comput Sci Eng (IJCSE)202011439440410.21817/indjcse/2020/v11i4/201104270 – reference: GuoXLinHLiZPengMDeep-reinforcement-learning-based QoS-aware secure routing for SDN-IoTIEEE Internet Things J202076242625110.1109/JIOT.2019.2960033 – reference: AhmadMSinghSKhuranaSCryptographic one-way hash function generation using twelve-terms 4D nonlinear systemInt J Inf Tecnol2021132295230310.1007/s41870-018-0199-8 – reference: BoussahaRChallalYBouabdallahABessedikMOptimized in-network authentication against pollution attacks in software-defined-named data networkingJ Inform Secur Appl202050 – reference: KangHYegneswaranVGhoshSPorrasPAShinSAutomated permission model generation for securing SDN control-planeIEEE Trans Inf Forensics Secur2020151668168210.1109/TIFS.2019.2946928 – reference: ChenIGuoJWangDTsaiJAl-HamadiHYouITrust-based service management for mobile cloud IoT systemsIEEE Trans Netw Serv Manag20191624626310.1109/TNSM.2018.2886379 – reference: ZhangPWuHZhangDLiQVerifying rule enforcement in software defined networks with REVIEEE/ACM Trans Netw202028291792910.1109/TNET.2020.2977006 – reference: Sahana D S, Dr. Dayanand Lal N, Neetha K S, Nida kousar G, Sakkari DS (2020) SDN evolution: a quality viewpoint for enterprise management. http://www.warse.org/IJETER/static/pdf/file/ijeter85872020.pdf – reference: BadawyMMAliZHAliHAQoS provisioning framework for service-oriented internet of things (IoT)Clust Comput201910.1007/s10586-019-02945-x – reference: Shuangyu H, Jianwei L, Jian M, Jie C (2015) “Hierarchical solution for access control and authentication in software defined networks”, In International Conference on Network and System Security, pp. 70–81 – reference: SudhakarTRamalingamPJagatheswariSAn improved proxy-vehicle based authentication scheme for vehicular ad-hoc networksInt J Inf Tecnol2022142441244910.1007/s41870-022-00938-5 – reference: KangHYegneswaranVGhoshzSPorrasPShinSAutomated permission model generation for securing SDN control-planeIEEE Trans Inf Forensics Secur201910.1109/tifs.2019.2946928 – reference: IqbalWAbbasHDaneshmandMRaufBBangashYAAn in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined securityIEEE Internet Things J20207102501027610.1109/JIOT.2020.2997651 – volume: 11 start-page: 394 issue: 4 year: 2020 ident: 1074_CR26 publication-title: Indian J Comput Sci Eng (IJCSE) doi: 10.21817/indjcse/2020/v11i4/201104270 – volume: 116 start-page: 406 year: 2021 ident: 1074_CR15 publication-title: Future Gener Comput Syst doi: 10.1016/j.future.2020.11.010 – volume: 15 start-page: 1668 year: 2020 ident: 1074_CR20 publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2019.2946928 – volume: 8 start-page: 113498 year: 2020 ident: 1074_CR18 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3002815 – volume: 8 start-page: 9622 year: 2021 ident: 1074_CR16 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.3024058 – ident: 1074_CR29 – volume: 16 start-page: 246 year: 2019 ident: 1074_CR14 publication-title: IEEE Trans Netw Serv Manag doi: 10.1109/TNSM.2018.2886379 – volume: 111 start-page: 2671 issue: 4 year: 2020 ident: 1074_CR12 publication-title: Wireless Pers Commun doi: 10.1007/s11277-019-07010-9 – volume: 7 start-page: 6242 year: 2020 ident: 1074_CR30 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2019.2960033 – volume: 8 start-page: 231 year: 2021 ident: 1074_CR4 publication-title: IEEE Trans Netw Sci Eng doi: 10.1109/TNSE.2020.3036456 – volume: 161 start-page: 68 year: 2019 ident: 1074_CR19 publication-title: Comput Networks doi: 10.1016/j.comnet.2019.05.022 – volume: 28 start-page: 917 issue: 2 year: 2020 ident: 1074_CR25 publication-title: IEEE/ACM Trans Netw doi: 10.1109/TNET.2020.2977006 – volume: 38 start-page: 69 issue: 2 year: 2008 ident: 1074_CR2 publication-title: ACM SIGCOMM Comput Commun Rev doi: 10.1145/1355734.1355746 – volume: 7 start-page: 10250 year: 2020 ident: 1074_CR7 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.2997651 – volume: 147 start-page: 108 year: 2021 ident: 1074_CR21 publication-title: J Parallel Distributed Comput doi: 10.1016/j.jpdc.2020.09.006 – year: 2019 ident: 1074_CR22 publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/tifs.2019.2946928 – ident: 1074_CR3 doi: 10.1145/2534169.2486019 – year: 2019 ident: 1074_CR9 publication-title: Clust Comput doi: 10.1007/s10586-019-02945-x – volume: 15 start-page: 1640 year: 2021 ident: 1074_CR6 publication-title: IEEE Syst J doi: 10.1109/JSYST.2020.2996185 – volume: 50 year: 2020 ident: 1074_CR24 publication-title: J Inform Secur Appl – volume: 14 start-page: 507 year: 2022 ident: 1074_CR17 publication-title: Int J Inf Tecnol doi: 10.1007/s41870-018-0258-1 – volume: 13 start-page: 2295 year: 2021 ident: 1074_CR13 publication-title: Int J Inf Tecnol doi: 10.1007/s41870-018-0199-8 – ident: 1074_CR28 – ident: 1074_CR5 doi: 10.1007/978-3-319-11698-3_6 – volume: 14 start-page: 1145 year: 2022 ident: 1074_CR11 publication-title: Int J Inf Tecnol doi: 10.1007/s41870-019-00354-2 – volume: 15 start-page: 56 issue: 4 year: 2011 ident: 1074_CR10 publication-title: IEEE Internet Comput doi: 10.1109/MIC.2011.50 – ident: 1074_CR23 doi: 10.1109/IEMCON.2019.8936207 – volume: 7 start-page: 133248 year: 2019 ident: 1074_CR27 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2941084 – ident: 1074_CR1 doi: 10.1007/s13198-021-01054-6 – volume: 14 start-page: 2441 year: 2022 ident: 1074_CR8 publication-title: Int J Inf Tecnol doi: 10.1007/s41870-022-00938-5 |
| SSID | ssib031263571 ssj0002710285 |
| Score | 2.2722583 |
| Snippet | The software defined network (SDN) integrated with internet of things (IoT) reduces the scalability of IoT devices by managing the network. The SDN, on the... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 335 |
| SubjectTerms | Artificial Intelligence Authentication Computer Imaging Computer Science Cybersecurity Digital certificates Enforcement Hash based algorithms Image Processing and Computer Vision Internet of Things Machine Learning Original Research Pattern Recognition and Graphics Resource utilization Smart houses Software Engineering Software-defined networking Vision |
| SummonAdditionalLinks | – databaseName: SpringerLINK Contemporary 1997-Present dbid: RSV link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fT8IwEL4o-qAPoqgRRdMH37QJazvWPYpKNBpiBAmJD8vWrYjiMIDy73vdD1CjJvq8rmnurr37rl_vAA7DAHUZSMQmkc2pULgVpZCaauWggxeuo5JUdufaaTZlt-veZI_CxjnbPb-STE7q2WM3YUnTJIUZKoFhEU4XYQndnTQNG25bndyKuGXqq2RBzmNytWacqOEymnCaIsYR2euZ76f97KHmYeeXm9LEATWK_1v6OqxlASc5SS1kAxaiuATFvJkDyfZ2CVY_VCbchPskDx8Rk0EzfKI0sUcaOZWLYKxLWmdNejlskzilkhPDoe-RK6OuJ4pBDvHjkNQHqFpaJ_6gNxz1Jw_P4y24a5y3Ty9o1oeBKsbFlFpcBb600Zf5dmQL7UrlOJaymBZBaE4Jzi1d0yh0hYjO9WtVXWWh6zMe1aTGAdtQiIdxtANEBWHEuMMkHqsIzUJEWyFjusa0xe0w0GWwctl7KitSbnplDLxZeeVElh7K0ktk6U3LcDT75yUt0fHr6EquUi_brmOPI7BiiMuFXYbjXIXzzz_Ptvu34XuwYtrVpymcChQmo9doH5bV26Q_Hh0kZvwO8nHoFQ priority: 102 providerName: Springer Nature |
| Title | Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms |
| URI | https://link.springer.com/article/10.1007/s41870-022-01074-w https://www.proquest.com/docview/3255213245 |
| Volume | 15 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2511-2112 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0002710285 issn: 2511-2104 databaseCode: P5Z dateStart: 20230101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2511-2112 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0002710285 issn: 2511-2104 databaseCode: K7- dateStart: 20230101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2511-2112 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0002710285 issn: 2511-2104 databaseCode: BENPR dateStart: 20230101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 2511-2112 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002710285 issn: 2511-2104 databaseCode: RSV dateStart: 20170301 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFH9iHwd2GJ_TCqPyYTewWGyncU4ThVWgTVW1ddU0DlFix_ugpKUt9N_nPcdZYRK7cMkltpX4Z78v__wewL4tEMtCo29SxpIrg1tRK-24MwkqeJUmxoeyRydJv68vLtJBCLjNA62ykYleUNuJoRj5e4m2r0DXScWH0x-cqkbR6WooobEGG5QlgUo3DOLLZj3JiDKtBHPn1h-ykTolViMZ1hy9HRXu0fjbdCrSVIVFEFeBaIrLv3XVygC9d2bqVVHvyf_-xFPYDkYo-1CvmmfwqKyew9YfqQlfwFcfiC8ZhdCIUFRH9liv4XIxNHbZ2ac-_zIZsqrmkjMi0V-xY8LrG0crh-WVZd0xYsu7LB9f4acsrr_PX8J572j48TMPhRi4EVIteSRNkesYlVkel7FyqTZJEplIOFVYEhNSRq7jcK4NunRp3jlwB8KmuZBlRztssAPr1aQqd4GZwpZCJkKjXEXfzKK7ZYVwHeEiGdvCtSBqpjwzIUs5FcsYZ3f5lT1MGcKUeZiyZQve3vWZ1jk6Hmy912CThf06z1bAtOBdg-7q9b9He_XwaK_hMdWnr2M2e7C-mP0s38Cm-bW4mc_asNE96g9O27B2nPC2X7v4PD0b_QYuqO6N |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3Nb9MwFH8aAwk4wIAhCgN8gBNYW2wncQ5oYoxqVUuFREGTOGSJP7ZBScdaqPZP7W_ce06yAhK77bBzHCuOf-_7C-CFLfEuS422iYslVwZJUSvtuTcpCniVpSa4sr8M0uFQ7-5mH5fgtK2FobTKlicGRm0nhnzk6xJ1X4Gmk4o3j35ymhpF0dV2hEYNi747maPJNn3T28b7fSlE9_3o3Q5vpgpwI6Sa80iastAxcuYidrHymTZpGplIeFVawryUkU-8jPEzRZIVyYbfEDYrhHSJ9rgA970G15XUKdFVP-UtfmVEnV0a9epbCOqR-KYsSlLkOVpXqqnbCdV7KtI09UVQbgSlRc7_lo0LhfefGG0Qfd27V-2nrcCdRslmb2uquAdLrroPt_9ovfgAvoZAg2PkIqSEqdpzybptrhpDZZ592h7y3mTEqjpXnlGRwD7rEx6_c9TiWFFZtjVG7PItVoz38eizgx_TVfh8Kad7CMvVpHKPgJnSOiFToVFuoO1p0Zy0QvhE-EjGtvQdiNorzk3ThZ2GgYzz8_7RARY5wiIPsMjnHXh1_s5R3YPkwtVrLRbyhh9N8wUQOvC6RdPi8f93e3zxbs_h5s7owyAf9Ib9J3BLoAZY-6fWYHl2_Ms9hRvm9-xwevwsUAqDvctG2RkbHUTX |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VFiE4UJ5iSws-wAmsNraTOAeE2m5XrLZarURBFRxC4kdbWLKlu2XFX-PXMeMkXUCitx44x7Hi-LPn9c0MwDNb4l6WGm0TF0uuDB5FrbTn3qQo4FWWmuDKfr-fDof68DAbLcHPNheGaJXtnRguajsx5CPflKj7CjSdVLzpG1rEqNt7ffqNUwcpirS27TRqiAzcjzmab9NX_S7u9XMhensHu29402GAGyHVnEfSlIWO8ZYuYhcrn2mTppGJhFelJfxLGfnEyxg_WSRZkWz5LWGzQkiXaI8DcN5rsJKijUl0wlH8ocWyjKjKS6NqfQ4BPhLlxKgkpZ6jpaWaHJ6QyaciTR1gBPEkiCI5_1NOLpTfv-K1QQz2Vv_nH3gHbjfKN9uuT8tdWHLVPbj1W0nG-_AxBCAcI9chEalqjybrtRw2hko-e9sd8v7kgFU1h55R8sARGxBOv3DU7lhRWbYzRkzzHVaMj3Dps-Ov0wfw7kpW9xCWq0nlHgEzpXVCpkKjPEGb1KKZaYXwifCRjG3pOxC1252bpjo7NQkZ5xd1pQNEcoRIHiCSzzvw4uKd07o2yaWj11tc5M09Nc0XoOjAyxZZi8f_nm3t8tmewg0EV77fHw4ew02BimHttlqH5dnZuduA6-b77GR69iQcGgafrhpkvwBn9k37 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Authentication+Framework+for+SDN-IoT+network+using+Keccak-256+and+Bliss-B+algorithms&rft.jtitle=International+journal+of+information+technology+%28Singapore.+Online%29&rft.au=Sahana%2C+D.+S.&rft.au=Brahmananda%2C+S.+H.&rft.date=2023-01-01&rft.issn=2511-2104&rft.eissn=2511-2112&rft.volume=15&rft.issue=1&rft.spage=335&rft.epage=344&rft_id=info:doi/10.1007%2Fs41870-022-01074-w&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s41870_022_01074_w |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2511-2104&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2511-2104&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2511-2104&client=summon |