Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms

The software defined network (SDN) integrated with internet of things (IoT) reduces the scalability of IoT devices by managing the network. The SDN, on the other hand, is particularly subject to attacks since it relies on a centralised controller for network management, which attackers can simply al...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:International journal of information technology (Singapore. Online) Ročník 15; číslo 1; s. 335 - 344
Hlavní autori: Sahana, D. S., Brahmananda, S. H.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Singapore Springer Nature Singapore 01.01.2023
Springer Nature B.V
Predmet:
ISSN:2511-2104, 2511-2112
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The software defined network (SDN) integrated with internet of things (IoT) reduces the scalability of IoT devices by managing the network. The SDN, on the other hand, is particularly subject to attacks since it relies on a centralised controller for network management, which attackers can simply alter. Communication between users and resources must be authenticated using the internal security approach. The proposed work introduces the SAF-Secure Authentication framework, which improves security and delivers efficient services to entities by efficiently utilising the existing challenges. Initially, all the users and applications are registered with attributes by using the keccak-256 hashing algorithm based on the registration, the Authentication is performed to ensure legitimacy by generating digital certificates based on the attributes by using Bliss-B algorithm. The comparison of the proposed method with several relevant works are performed to evaluate and validate the performance. The proposed SAF architecture provides better computation overhead and resource utilization.
AbstractList The software defined network (SDN) integrated with internet of things (IoT) reduces the scalability of IoT devices by managing the network. The SDN, on the other hand, is particularly subject to attacks since it relies on a centralised controller for network management, which attackers can simply alter. Communication between users and resources must be authenticated using the internal security approach. The proposed work introduces the SAF-Secure Authentication framework, which improves security and delivers efficient services to entities by efficiently utilising the existing challenges. Initially, all the users and applications are registered with attributes by using the keccak-256 hashing algorithm based on the registration, the Authentication is performed to ensure legitimacy by generating digital certificates based on the attributes by using Bliss-B algorithm. The comparison of the proposed method with several relevant works are performed to evaluate and validate the performance. The proposed SAF architecture provides better computation overhead and resource utilization.
Author Brahmananda, S. H.
Sahana, D. S.
Author_xml – sequence: 1
  givenname: D. S.
  orcidid: 0000-0003-2046-8113
  surname: Sahana
  fullname: Sahana, D. S.
  email: ssanthos@gitam.edu
  organization: Department of CSE, GITAM School of Technology, GITAM(Deemed to be University)
– sequence: 2
  givenname: S. H.
  surname: Brahmananda
  fullname: Brahmananda, S. H.
  email: bsavadat@gitam.edu
  organization: Department of CSE, GITAM School of Technology, GITAM(Deemed to be University)
BookMark eNp9kD9PAzEMxSMEElD6BZgiMQfs5HJ3HflXqEAwtEwMUZombaBNILlTxbfnaBFIDEy2rPezn98h2Q0xWEKOEU4RoDrLBdYVMOCcAUJVsPUOOeASkXFEvvvTQ7FP-jn7KQjkpZAVHpDnsTVtsvS8bRY2NN7oxsdAh0mv7DqmV-piouOrBzaKExpss5m12Yc5vbPG6FfGZUl1mNGLpc-ZXVC9nMfkm8UqH5E9p5fZ9r9rjzwNryeXt-z-8WZ0eX7PDBfFmqEwU13LGlBLKws3qE1VoUHuiukMQIAQ6ErX-TXAy4EuwQGfDTQXtqxdJ-iRk-3etxTfW5sb9RLbFLqTSnApOQpeyE5Vb1UmxZyTdcr4ZvNtk7RfKgT1labapqm6NNUmTbXuUP4HfUt-pdPH_5DYQrkTh7lNv67-oT4BrfGH9g
CitedBy_id crossref_primary_10_32604_cmc_2024_052994
crossref_primary_10_1007_s41870_024_02064_w
crossref_primary_10_1007_s41870_023_01402_8
crossref_primary_10_1007_s41870_023_01393_6
crossref_primary_10_1007_s41870_024_02238_6
Cites_doi 10.21817/indjcse/2020/v11i4/201104270
10.1016/j.future.2020.11.010
10.1109/TIFS.2019.2946928
10.1109/ACCESS.2020.3002815
10.1109/JIOT.2020.3024058
10.1109/TNSM.2018.2886379
10.1007/s11277-019-07010-9
10.1109/JIOT.2019.2960033
10.1109/TNSE.2020.3036456
10.1016/j.comnet.2019.05.022
10.1109/TNET.2020.2977006
10.1145/1355734.1355746
10.1109/JIOT.2020.2997651
10.1016/j.jpdc.2020.09.006
10.1109/tifs.2019.2946928
10.1145/2534169.2486019
10.1007/s10586-019-02945-x
10.1109/JSYST.2020.2996185
10.1007/s41870-018-0258-1
10.1007/s41870-018-0199-8
10.1007/978-3-319-11698-3_6
10.1007/s41870-019-00354-2
10.1109/MIC.2011.50
10.1109/IEMCON.2019.8936207
10.1109/ACCESS.2019.2941084
10.1007/s13198-021-01054-6
10.1007/s41870-022-00938-5
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2022. Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2022.
Copyright_xml – notice: The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2022. Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
– notice: The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2022.
DBID AAYXX
CITATION
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s41870-022-01074-w
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central Database Suite (ProQuest)
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Collection (ProQuest)
ProQuest Computer Science Collection
Computer Science Database (ProQuest)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
DatabaseTitleList Computer Science Database

Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 2511-2112
EndPage 344
ExternalDocumentID 10_1007_s41870_022_01074_w
GroupedDBID -EM
0R~
406
AACDK
AAHNG
AAIAL
AAJBT
AANZL
AASML
AATNV
AATVU
AAUYE
ABAKF
ABDZT
ABECU
ABFTV
ABJNI
ABJOX
ABKCH
ABMQK
ABQBU
ABTEG
ABTKH
ABTMW
ABXPI
ACAOD
ACDTI
ACGFS
ACHSB
ACMLO
ACOKC
ACPIV
ACZOJ
ADHHG
ADKNI
ADKPE
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEJRE
AEMSY
AEOHA
AESKC
AEVLU
AEXYK
AFBBN
AFQWF
AGDGC
AGMZJ
AGQEE
AGRTI
AHSBF
AIAKS
AIGIU
AILAN
AITGF
AJRNO
AJZVZ
ALFXC
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMXSW
AMYLF
AMYQR
AXYYD
BGNMA
CSCUP
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
FERAY
FIGPU
FINBP
FNLPD
FSGXE
GGCAI
GJIRD
IKXTQ
IWAJR
J-C
JZLTJ
KOV
LLZTM
M4Y
NPVJJ
NQJWS
NU0
O9J
PT4
RLLFE
ROL
RSV
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
TSG
UOJIU
UTJUX
UZXMN
VFIZW
Z7Z
Z81
Z83
Z88
ZMTXR
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ABUWG
ACSTC
AEZWR
AFDZB
AFHIU
AFKRA
AFOHR
AHPBZ
AHWEU
AIXLP
ARAPS
ATHPR
AYFIA
AZQEC
BENPR
BGLVJ
CCPQU
CITATION
DWQXO
GNUQQ
HCIFZ
K7-
PHGZM
PHGZT
PQGLB
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
JQ2
L7M
L~C
L~D
M0N
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c234w-13cba85801a5e54f98c771c12f4bd0030331f6f357c0269a60f02d9a23e68f003
IEDL.DBID P5Z
ISSN 2511-2104
IngestDate Tue Sep 30 03:20:56 EDT 2025
Tue Nov 18 21:07:10 EST 2025
Sat Nov 29 03:11:46 EST 2025
Fri Feb 21 02:44:46 EST 2025
IsPeerReviewed false
IsScholarly true
Issue 1
Keywords SDN-IoT
Hash value
IFogSim
Authentication
Keccak-256 hashing algorithm
Internet of things (IoT)
Digital signature
Bliss-B algorithm
SDN
Trusted authority
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c234w-13cba85801a5e54f98c771c12f4bd0030331f6f357c0269a60f02d9a23e68f003
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-2046-8113
PQID 3255213245
PQPubID 2034493
PageCount 10
ParticipantIDs proquest_journals_3255213245
crossref_citationtrail_10_1007_s41870_022_01074_w
crossref_primary_10_1007_s41870_022_01074_w
springer_journals_10_1007_s41870_022_01074_w
PublicationCentury 2000
PublicationDate 20230100
2023-01-00
20230101
PublicationDateYYYYMMDD 2023-01-01
PublicationDate_xml – month: 1
  year: 2023
  text: 20230100
PublicationDecade 2020
PublicationPlace Singapore
PublicationPlace_xml – name: Singapore
– name: Heidelberg
PublicationSubtitle An Official Journal of Bharati Vidyapeeth's Institute of Computer Applications and Management
PublicationTitle International journal of information technology (Singapore. Online)
PublicationTitleAbbrev Int. j. inf. tecnol
PublicationYear 2023
Publisher Springer Nature Singapore
Springer Nature B.V
Publisher_xml – name: Springer Nature Singapore
– name: Springer Nature B.V
References GuoXLinHLiZPengMDeep-reinforcement-learning-based QoS-aware secure routing for SDN-IoTIEEE Internet Things J202076242625110.1109/JIOT.2019.2960033
WuTZhouPWangBLiATangXXuZChenKDingXJoint traffic control and multi-channel reassignment for core backbone network in SDN-IoT: a multi-agent deep reinforcement learning approachIEEE Trans Netw Sci Eng20218231245423179210.1109/TNSE.2020.3036456
Al-JamaliNAAl-RaweshidyHSIntelligent traffic management and load balance based on spike ISDN-IoTIEEE Syst J2021151640165110.1109/JSYST.2020.2996185
AtiewiSAl-RahayfehAAAlmianiMYussofSAlfandiOAbugabahAJararwehYScalable and secure big data IoT system based on multifactor authentication and lightweight cryptographyIEEE Access2020811349811351110.1109/ACCESS.2020.3002815
ZhangPWuHZhangDLiQVerifying rule enforcement in software defined networks with REVIEEE/ACM Trans Netw202028291792910.1109/TNET.2020.2977006
Zhang W, Yue, M (2021) The application of building energy management system based on IoT technology in smart city. Int J Syst Assur Eng Manag 12:617–628. https://doi.org/10.1007/s13198-021-01054-6
DeebakBDAl-turjmanFLightweight authentication for IoT/Cloud-based forensics in intelligent data computingFuture Gener Comput Syst202111640642510.1016/j.future.2020.11.010
LengXHouKChenYBuKSongLLiYA lightweight policy enforcement system for resource protection and management in the SDN-based cloudComput Networks2019161688110.1016/j.comnet.2019.05.022
Sahana D S, Dr. Dayanand Lal N, Neetha K S, Nida kousar G, Sakkari DS (2020) SDN evolution: a quality viewpoint for enterprise management. http://www.warse.org/IJETER/static/pdf/file/ijeter85872020.pdf
KangHYegneswaranVGhoshSPorrasPAShinSAutomated permission model generation for securing SDN control-planeIEEE Trans Inf Forensics Secur2020151668168210.1109/TIFS.2019.2946928
IqbalWAbbasHDengPWanJRaufBAbbasYRashidIALAM: anonymous lightweight authentication mechanism for SDN-enabled smart homesIEEE Internet Things J202189622963310.1109/JIOT.2020.3024058
AwoyemiBSAlfaASMaharajBTResource optimisation in 5G and internet-of-things networkingWireless Pers Commun202011142671270210.1007/s11277-019-07010-9
Burikova S et al. (2019) A trust management framework for software defined networks-based internet of things," 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). pp. 0325-0331, doi: https://doi.org/10.1109/IEMCON.2019.8936207
McKeownNAndersonTBalakrishnanHParulkarGPetersonLRexfordJShenkerSTurnerJOpenFlow: enabling innovation in campus networksACM SIGCOMM Comput Commun Rev2008382697410.1145/1355734.1355746
NerurkarPChandaneMBhirudSUnderstanding structure and behavior of systems: a network perspectiveInt J Inf Tecnol2022141145115910.1007/s41870-019-00354-2
Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M, Zolla J (2013) "B4: Experience with a globally-deployed software defined WAN", In proceedings of Association for Computing Machinery's Special Interest Group on Data Communications Computer Communication Review, vol.43, no.4, pp.3-14
ChenIGuoJWangDTsaiJAl-HamadiHYouITrust-based service management for mobile cloud IoT systemsIEEE Trans Netw Serv Manag20191624626310.1109/TNSM.2018.2886379
TangYLiuTHeXYuJQinPA lightweight two-way authentication scheme between communication nodes for software defined optical access networkIEEE Access2019713324813325610.1109/ACCESS.2019.2941084
MishraJSheetlaniJReddyKHKData center network energy consumption minimization: a hierarchical FAT-tree approachInt J Inf Tecnol20221450751910.1007/s41870-018-0258-1
Shuangyu H, Jianwei L, Jian M, Jie C (2015) “Hierarchical solution for access control and authentication in software defined networks”, In International Conference on Network and System Security, pp. 70–81
HuTZhangZYiPLiangDLiZRenQHuYLanJSEAPP: a secure application management framework based on REST API access control in SDN-enabled cloud environmentJ Parallel Distributed Comput202114710812310.1016/j.jpdc.2020.09.006
Dangovas V, Kuliesius F (2014) "SDN-driven authentication and access control system", In The International Conference on Digital Information, Networking, and Wireless Communications (DINWC) Society of Digital Information and Wireless Communication, pp.20
RavindraSMAPSDN-EESC: a modeling of authentication process for the SDNusing encrypted entity scheme cryptographyIndian J Comput Sci Eng (IJCSE)202011439440410.21817/indjcse/2020/v11i4/201104270
BadawyMMAliZHAliHAQoS provisioning framework for service-oriented internet of things (IoT)Clust Comput201910.1007/s10586-019-02945-x
GaoHHuJHuangTWangJChenYSecurity issues in online social networksIEEE Internet Comput2011154566310.1109/MIC.2011.50
AhmadMSinghSKhuranaSCryptographic one-way hash function generation using twelve-terms 4D nonlinear systemInt J Inf Tecnol2021132295230310.1007/s41870-018-0199-8
BoussahaRChallalYBouabdallahABessedikMOptimized in-network authentication against pollution attacks in software-defined-named data networkingJ Inform Secur Appl202050
KangHYegneswaranVGhoshzSPorrasPShinSAutomated permission model generation for securing SDN control-planeIEEE Trans Inf Forensics Secur201910.1109/tifs.2019.2946928
SudhakarTRamalingamPJagatheswariSAn improved proxy-vehicle based authentication scheme for vehicular ad-hoc networksInt J Inf Tecnol2022142441244910.1007/s41870-022-00938-5
IqbalWAbbasHDaneshmandMRaufBBangashYAAn in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined securityIEEE Internet Things J20207102501027610.1109/JIOT.2020.2997651
I Chen (1074_CR14) 2019; 16
H Kang (1074_CR20) 2020; 15
X Leng (1074_CR19) 2019; 161
M Ahmad (1074_CR13) 2021; 13
1074_CR28
1074_CR29
1074_CR3
1074_CR5
1074_CR23
W Iqbal (1074_CR7) 2020; 7
W Iqbal (1074_CR16) 2021; 8
T Sudhakar (1074_CR8) 2022; 14
S Ravindra (1074_CR26) 2020; 11
NA Al-Jamali (1074_CR6) 2021; 15
BS Awoyemi (1074_CR12) 2020; 111
R Boussaha (1074_CR24) 2020; 50
H Gao (1074_CR10) 2011; 15
Y Tang (1074_CR27) 2019; 7
J Mishra (1074_CR17) 2022; 14
T Hu (1074_CR21) 2021; 147
P Zhang (1074_CR25) 2020; 28
X Guo (1074_CR30) 2020; 7
MM Badawy (1074_CR9) 2019
N McKeown (1074_CR2) 2008; 38
H Kang (1074_CR22) 2019
1074_CR1
S Atiewi (1074_CR18) 2020; 8
T Wu (1074_CR4) 2021; 8
BD Deebak (1074_CR15) 2021; 116
P Nerurkar (1074_CR11) 2022; 14
References_xml – reference: DeebakBDAl-turjmanFLightweight authentication for IoT/Cloud-based forensics in intelligent data computingFuture Gener Comput Syst202111640642510.1016/j.future.2020.11.010
– reference: HuTZhangZYiPLiangDLiZRenQHuYLanJSEAPP: a secure application management framework based on REST API access control in SDN-enabled cloud environmentJ Parallel Distributed Comput202114710812310.1016/j.jpdc.2020.09.006
– reference: IqbalWAbbasHDengPWanJRaufBAbbasYRashidIALAM: anonymous lightweight authentication mechanism for SDN-enabled smart homesIEEE Internet Things J202189622963310.1109/JIOT.2020.3024058
– reference: Al-JamaliNAAl-RaweshidyHSIntelligent traffic management and load balance based on spike ISDN-IoTIEEE Syst J2021151640165110.1109/JSYST.2020.2996185
– reference: TangYLiuTHeXYuJQinPA lightweight two-way authentication scheme between communication nodes for software defined optical access networkIEEE Access2019713324813325610.1109/ACCESS.2019.2941084
– reference: Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M, Zolla J (2013) "B4: Experience with a globally-deployed software defined WAN", In proceedings of Association for Computing Machinery's Special Interest Group on Data Communications Computer Communication Review, vol.43, no.4, pp.3-14
– reference: MishraJSheetlaniJReddyKHKData center network energy consumption minimization: a hierarchical FAT-tree approachInt J Inf Tecnol20221450751910.1007/s41870-018-0258-1
– reference: AtiewiSAl-RahayfehAAAlmianiMYussofSAlfandiOAbugabahAJararwehYScalable and secure big data IoT system based on multifactor authentication and lightweight cryptographyIEEE Access2020811349811351110.1109/ACCESS.2020.3002815
– reference: WuTZhouPWangBLiATangXXuZChenKDingXJoint traffic control and multi-channel reassignment for core backbone network in SDN-IoT: a multi-agent deep reinforcement learning approachIEEE Trans Netw Sci Eng20218231245423179210.1109/TNSE.2020.3036456
– reference: NerurkarPChandaneMBhirudSUnderstanding structure and behavior of systems: a network perspectiveInt J Inf Tecnol2022141145115910.1007/s41870-019-00354-2
– reference: AwoyemiBSAlfaASMaharajBTResource optimisation in 5G and internet-of-things networkingWireless Pers Commun202011142671270210.1007/s11277-019-07010-9
– reference: LengXHouKChenYBuKSongLLiYA lightweight policy enforcement system for resource protection and management in the SDN-based cloudComput Networks2019161688110.1016/j.comnet.2019.05.022
– reference: Zhang W, Yue, M (2021) The application of building energy management system based on IoT technology in smart city. Int J Syst Assur Eng Manag 12:617–628. https://doi.org/10.1007/s13198-021-01054-6
– reference: Burikova S et al. (2019) A trust management framework for software defined networks-based internet of things," 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). pp. 0325-0331, doi: https://doi.org/10.1109/IEMCON.2019.8936207
– reference: McKeownNAndersonTBalakrishnanHParulkarGPetersonLRexfordJShenkerSTurnerJOpenFlow: enabling innovation in campus networksACM SIGCOMM Comput Commun Rev2008382697410.1145/1355734.1355746
– reference: Dangovas V, Kuliesius F (2014) "SDN-driven authentication and access control system", In The International Conference on Digital Information, Networking, and Wireless Communications (DINWC) Society of Digital Information and Wireless Communication, pp.20
– reference: GaoHHuJHuangTWangJChenYSecurity issues in online social networksIEEE Internet Comput2011154566310.1109/MIC.2011.50
– reference: RavindraSMAPSDN-EESC: a modeling of authentication process for the SDNusing encrypted entity scheme cryptographyIndian J Comput Sci Eng (IJCSE)202011439440410.21817/indjcse/2020/v11i4/201104270
– reference: GuoXLinHLiZPengMDeep-reinforcement-learning-based QoS-aware secure routing for SDN-IoTIEEE Internet Things J202076242625110.1109/JIOT.2019.2960033
– reference: AhmadMSinghSKhuranaSCryptographic one-way hash function generation using twelve-terms 4D nonlinear systemInt J Inf Tecnol2021132295230310.1007/s41870-018-0199-8
– reference: BoussahaRChallalYBouabdallahABessedikMOptimized in-network authentication against pollution attacks in software-defined-named data networkingJ Inform Secur Appl202050
– reference: KangHYegneswaranVGhoshSPorrasPAShinSAutomated permission model generation for securing SDN control-planeIEEE Trans Inf Forensics Secur2020151668168210.1109/TIFS.2019.2946928
– reference: ChenIGuoJWangDTsaiJAl-HamadiHYouITrust-based service management for mobile cloud IoT systemsIEEE Trans Netw Serv Manag20191624626310.1109/TNSM.2018.2886379
– reference: ZhangPWuHZhangDLiQVerifying rule enforcement in software defined networks with REVIEEE/ACM Trans Netw202028291792910.1109/TNET.2020.2977006
– reference: Sahana D S, Dr. Dayanand Lal N, Neetha K S, Nida kousar G, Sakkari DS (2020) SDN evolution: a quality viewpoint for enterprise management. http://www.warse.org/IJETER/static/pdf/file/ijeter85872020.pdf
– reference: BadawyMMAliZHAliHAQoS provisioning framework for service-oriented internet of things (IoT)Clust Comput201910.1007/s10586-019-02945-x
– reference: Shuangyu H, Jianwei L, Jian M, Jie C (2015) “Hierarchical solution for access control and authentication in software defined networks”, In International Conference on Network and System Security, pp. 70–81
– reference: SudhakarTRamalingamPJagatheswariSAn improved proxy-vehicle based authentication scheme for vehicular ad-hoc networksInt J Inf Tecnol2022142441244910.1007/s41870-022-00938-5
– reference: KangHYegneswaranVGhoshzSPorrasPShinSAutomated permission model generation for securing SDN control-planeIEEE Trans Inf Forensics Secur201910.1109/tifs.2019.2946928
– reference: IqbalWAbbasHDaneshmandMRaufBBangashYAAn in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined securityIEEE Internet Things J20207102501027610.1109/JIOT.2020.2997651
– volume: 11
  start-page: 394
  issue: 4
  year: 2020
  ident: 1074_CR26
  publication-title: Indian J Comput Sci Eng (IJCSE)
  doi: 10.21817/indjcse/2020/v11i4/201104270
– volume: 116
  start-page: 406
  year: 2021
  ident: 1074_CR15
  publication-title: Future Gener Comput Syst
  doi: 10.1016/j.future.2020.11.010
– volume: 15
  start-page: 1668
  year: 2020
  ident: 1074_CR20
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2019.2946928
– volume: 8
  start-page: 113498
  year: 2020
  ident: 1074_CR18
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3002815
– volume: 8
  start-page: 9622
  year: 2021
  ident: 1074_CR16
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.3024058
– ident: 1074_CR29
– volume: 16
  start-page: 246
  year: 2019
  ident: 1074_CR14
  publication-title: IEEE Trans Netw Serv Manag
  doi: 10.1109/TNSM.2018.2886379
– volume: 111
  start-page: 2671
  issue: 4
  year: 2020
  ident: 1074_CR12
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-019-07010-9
– volume: 7
  start-page: 6242
  year: 2020
  ident: 1074_CR30
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2019.2960033
– volume: 8
  start-page: 231
  year: 2021
  ident: 1074_CR4
  publication-title: IEEE Trans Netw Sci Eng
  doi: 10.1109/TNSE.2020.3036456
– volume: 161
  start-page: 68
  year: 2019
  ident: 1074_CR19
  publication-title: Comput Networks
  doi: 10.1016/j.comnet.2019.05.022
– volume: 28
  start-page: 917
  issue: 2
  year: 2020
  ident: 1074_CR25
  publication-title: IEEE/ACM Trans Netw
  doi: 10.1109/TNET.2020.2977006
– volume: 38
  start-page: 69
  issue: 2
  year: 2008
  ident: 1074_CR2
  publication-title: ACM SIGCOMM Comput Commun Rev
  doi: 10.1145/1355734.1355746
– volume: 7
  start-page: 10250
  year: 2020
  ident: 1074_CR7
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.2997651
– volume: 147
  start-page: 108
  year: 2021
  ident: 1074_CR21
  publication-title: J Parallel Distributed Comput
  doi: 10.1016/j.jpdc.2020.09.006
– year: 2019
  ident: 1074_CR22
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/tifs.2019.2946928
– ident: 1074_CR3
  doi: 10.1145/2534169.2486019
– year: 2019
  ident: 1074_CR9
  publication-title: Clust Comput
  doi: 10.1007/s10586-019-02945-x
– volume: 15
  start-page: 1640
  year: 2021
  ident: 1074_CR6
  publication-title: IEEE Syst J
  doi: 10.1109/JSYST.2020.2996185
– volume: 50
  year: 2020
  ident: 1074_CR24
  publication-title: J Inform Secur Appl
– volume: 14
  start-page: 507
  year: 2022
  ident: 1074_CR17
  publication-title: Int J Inf Tecnol
  doi: 10.1007/s41870-018-0258-1
– volume: 13
  start-page: 2295
  year: 2021
  ident: 1074_CR13
  publication-title: Int J Inf Tecnol
  doi: 10.1007/s41870-018-0199-8
– ident: 1074_CR28
– ident: 1074_CR5
  doi: 10.1007/978-3-319-11698-3_6
– volume: 14
  start-page: 1145
  year: 2022
  ident: 1074_CR11
  publication-title: Int J Inf Tecnol
  doi: 10.1007/s41870-019-00354-2
– volume: 15
  start-page: 56
  issue: 4
  year: 2011
  ident: 1074_CR10
  publication-title: IEEE Internet Comput
  doi: 10.1109/MIC.2011.50
– ident: 1074_CR23
  doi: 10.1109/IEMCON.2019.8936207
– volume: 7
  start-page: 133248
  year: 2019
  ident: 1074_CR27
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2941084
– ident: 1074_CR1
  doi: 10.1007/s13198-021-01054-6
– volume: 14
  start-page: 2441
  year: 2022
  ident: 1074_CR8
  publication-title: Int J Inf Tecnol
  doi: 10.1007/s41870-022-00938-5
SSID ssib031263571
ssj0002710285
Score 2.2722583
Snippet The software defined network (SDN) integrated with internet of things (IoT) reduces the scalability of IoT devices by managing the network. The SDN, on the...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 335
SubjectTerms Artificial Intelligence
Authentication
Computer Imaging
Computer Science
Cybersecurity
Digital certificates
Enforcement
Hash based algorithms
Image Processing and Computer Vision
Internet of Things
Machine Learning
Original Research
Pattern Recognition and Graphics
Resource utilization
Smart houses
Software Engineering
Software-defined networking
Vision
SummonAdditionalLinks – databaseName: SpringerLINK Contemporary 1997-Present
  dbid: RSV
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fT8IwEL4o-qAPoqgRRdMH37QJazvWPYpKNBpiBAmJD8vWrYjiMIDy73vdD1CjJvq8rmnurr37rl_vAA7DAHUZSMQmkc2pULgVpZCaauWggxeuo5JUdufaaTZlt-veZI_CxjnbPb-STE7q2WM3YUnTJIUZKoFhEU4XYQndnTQNG25bndyKuGXqq2RBzmNytWacqOEymnCaIsYR2euZ76f97KHmYeeXm9LEATWK_1v6OqxlASc5SS1kAxaiuATFvJkDyfZ2CVY_VCbchPskDx8Rk0EzfKI0sUcaOZWLYKxLWmdNejlskzilkhPDoe-RK6OuJ4pBDvHjkNQHqFpaJ_6gNxz1Jw_P4y24a5y3Ty9o1oeBKsbFlFpcBb600Zf5dmQL7UrlOJaymBZBaE4Jzi1d0yh0hYjO9WtVXWWh6zMe1aTGAdtQiIdxtANEBWHEuMMkHqsIzUJEWyFjusa0xe0w0GWwctl7KitSbnplDLxZeeVElh7K0ktk6U3LcDT75yUt0fHr6EquUi_brmOPI7BiiMuFXYbjXIXzzz_Ptvu34XuwYtrVpymcChQmo9doH5bV26Q_Hh0kZvwO8nHoFQ
  priority: 102
  providerName: Springer Nature
Title Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms
URI https://link.springer.com/article/10.1007/s41870-022-01074-w
https://www.proquest.com/docview/3255213245
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 2511-2112
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0002710285
  issn: 2511-2104
  databaseCode: P5Z
  dateStart: 20230101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 2511-2112
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0002710285
  issn: 2511-2104
  databaseCode: K7-
  dateStart: 20230101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2511-2112
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0002710285
  issn: 2511-2104
  databaseCode: BENPR
  dateStart: 20230101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 2511-2112
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002710285
  issn: 2511-2104
  databaseCode: RSV
  dateStart: 20170301
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFH9iHwd2GJ_TCqPyYTewWGyncU4ThVWgTVW1ddU0DlFix_ugpKUt9N_nPcdZYRK7cMkltpX4Z78v__wewL4tEMtCo29SxpIrg1tRK-24MwkqeJUmxoeyRydJv68vLtJBCLjNA62ykYleUNuJoRj5e4m2r0DXScWH0x-cqkbR6WooobEGG5QlgUo3DOLLZj3JiDKtBHPn1h-ykTolViMZ1hy9HRXu0fjbdCrSVIVFEFeBaIrLv3XVygC9d2bqVVHvyf_-xFPYDkYo-1CvmmfwqKyew9YfqQlfwFcfiC8ZhdCIUFRH9liv4XIxNHbZ2ac-_zIZsqrmkjMi0V-xY8LrG0crh-WVZd0xYsu7LB9f4acsrr_PX8J572j48TMPhRi4EVIteSRNkesYlVkel7FyqTZJEplIOFVYEhNSRq7jcK4NunRp3jlwB8KmuZBlRztssAPr1aQqd4GZwpZCJkKjXEXfzKK7ZYVwHeEiGdvCtSBqpjwzIUs5FcsYZ3f5lT1MGcKUeZiyZQve3vWZ1jk6Hmy912CThf06z1bAtOBdg-7q9b9He_XwaK_hMdWnr2M2e7C-mP0s38Cm-bW4mc_asNE96g9O27B2nPC2X7v4PD0b_QYuqO6N
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3Nb9MwFH8aAwk4wIAhCgN8gBNYW2wncQ5oYoxqVUuFREGTOGSJP7ZBScdaqPZP7W_ce06yAhK77bBzHCuOf-_7C-CFLfEuS422iYslVwZJUSvtuTcpCniVpSa4sr8M0uFQ7-5mH5fgtK2FobTKlicGRm0nhnzk6xJ1X4Gmk4o3j35ymhpF0dV2hEYNi747maPJNn3T28b7fSlE9_3o3Q5vpgpwI6Sa80iastAxcuYidrHymTZpGplIeFVawryUkU-8jPEzRZIVyYbfEDYrhHSJ9rgA970G15XUKdFVP-UtfmVEnV0a9epbCOqR-KYsSlLkOVpXqqnbCdV7KtI09UVQbgSlRc7_lo0LhfefGG0Qfd27V-2nrcCdRslmb2uquAdLrroPt_9ovfgAvoZAg2PkIqSEqdpzybptrhpDZZ592h7y3mTEqjpXnlGRwD7rEx6_c9TiWFFZtjVG7PItVoz38eizgx_TVfh8Kad7CMvVpHKPgJnSOiFToVFuoO1p0Zy0QvhE-EjGtvQdiNorzk3ThZ2GgYzz8_7RARY5wiIPsMjnHXh1_s5R3YPkwtVrLRbyhh9N8wUQOvC6RdPi8f93e3zxbs_h5s7owyAf9Ib9J3BLoAZY-6fWYHl2_Ms9hRvm9-xwevwsUAqDvctG2RkbHUTX
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VFiE4UJ5iSws-wAmsNraTOAeE2m5XrLZarURBFRxC4kdbWLKlu2XFX-PXMeMkXUCitx44x7Hi-LPn9c0MwDNb4l6WGm0TF0uuDB5FrbTn3qQo4FWWmuDKfr-fDof68DAbLcHPNheGaJXtnRguajsx5CPflKj7CjSdVLzpG1rEqNt7ffqNUwcpirS27TRqiAzcjzmab9NX_S7u9XMhensHu29402GAGyHVnEfSlIWO8ZYuYhcrn2mTppGJhFelJfxLGfnEyxg_WSRZkWz5LWGzQkiXaI8DcN5rsJKijUl0wlH8ocWyjKjKS6NqfQ4BPhLlxKgkpZ6jpaWaHJ6QyaciTR1gBPEkiCI5_1NOLpTfv-K1QQz2Vv_nH3gHbjfKN9uuT8tdWHLVPbj1W0nG-_AxBCAcI9chEalqjybrtRw2hko-e9sd8v7kgFU1h55R8sARGxBOv3DU7lhRWbYzRkzzHVaMj3Dps-Ov0wfw7kpW9xCWq0nlHgEzpXVCpkKjPEGb1KKZaYXwifCRjG3pOxC1252bpjo7NQkZ5xd1pQNEcoRIHiCSzzvw4uKd07o2yaWj11tc5M09Nc0XoOjAyxZZi8f_nm3t8tmewg0EV77fHw4ew02BimHttlqH5dnZuduA6-b77GR69iQcGgafrhpkvwBn9k37
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Authentication+Framework+for+SDN-IoT+network+using+Keccak-256+and+Bliss-B+algorithms&rft.jtitle=International+journal+of+information+technology+%28Singapore.+Online%29&rft.au=Sahana%2C+D.+S.&rft.au=Brahmananda%2C+S.+H.&rft.date=2023-01-01&rft.issn=2511-2104&rft.eissn=2511-2112&rft.volume=15&rft.issue=1&rft.spage=335&rft.epage=344&rft_id=info:doi/10.1007%2Fs41870-022-01074-w&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s41870_022_01074_w
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2511-2104&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2511-2104&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2511-2104&client=summon