A Novel Security Model for Cooperative Virtual Networks in the IoT Era
The Internet of Things (IoT) has particular applications in public safety as well as other domains such as smart cities, health monitoring, smart homes and environments, smart industry, and various types of pervasive systems. The attacker can simply attack the IoT device in such applications, becaus...
Uložené v:
| Vydané v: | International journal of parallel programming Ročník 48; číslo 2; s. 280 - 295 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
New York
Springer US
01.04.2020
Springer Nature B.V |
| Predmet: | |
| ISSN: | 0885-7458, 1573-7640 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The Internet of Things (IoT) has particular applications in public safety as well as other domains such as smart cities, health monitoring, smart homes and environments, smart industry, and various types of pervasive systems. The attacker can simply attack the IoT device in such applications, because it is randomly distributed, dynamic topology and not reliable due to energy and communication limitation. Moreover, the threat to confidentiality and security is increasing as the number of devices connected in IoT is increasing. As the numbers of devices connected to the Internet is expanding, the threat to confidentiality and security is increasing. The aim of this paper is design a typical network security model for cooperative virtual networks in the IoT era. This paper presents and discusses network security vulnerabilities, threats, attacks and risks in switches, firewalls and routers, in addition to a policy to mitigate those risks. The paper provides the fundamentals of secure networking system including firewall, router, AAA server and VLAN technology. It presents a novel security model to defense the network from internal and external attacks and threats in the IoT Era. A testbed is built to investigate the proposed model, and the performed assessment show an effective security performance with a good network performance. |
|---|---|
| AbstractList | The Internet of Things (IoT) has particular applications in public safety as well as other domains such as smart cities, health monitoring, smart homes and environments, smart industry, and various types of pervasive systems. The attacker can simply attack the IoT device in such applications, because it is randomly distributed, dynamic topology and not reliable due to energy and communication limitation. Moreover, the threat to confidentiality and security is increasing as the number of devices connected in IoT is increasing. As the numbers of devices connected to the Internet is expanding, the threat to confidentiality and security is increasing. The aim of this paper is design a typical network security model for cooperative virtual networks in the IoT era. This paper presents and discusses network security vulnerabilities, threats, attacks and risks in switches, firewalls and routers, in addition to a policy to mitigate those risks. The paper provides the fundamentals of secure networking system including firewall, router, AAA server and VLAN technology. It presents a novel security model to defense the network from internal and external attacks and threats in the IoT Era. A testbed is built to investigate the proposed model, and the performed assessment show an effective security performance with a good network performance. |
| Author | Din, Sadia Al-Turjman, Fadi Alabady, Salah A. |
| Author_xml | – sequence: 1 givenname: Salah A. surname: Alabady fullname: Alabady, Salah A. organization: Computer Engineering Department, College of Engineering, University of Mosul – sequence: 2 givenname: Fadi surname: Al-Turjman fullname: Al-Turjman, Fadi email: fadi.alturjman@antalya.edu.tr organization: Department of Computer Engineering, Antalya Bilim University – sequence: 3 givenname: Sadia surname: Din fullname: Din, Sadia organization: Kyungpook National University |
| BookMark | eNp9kF1LwzAUhoNMcJv-AO8CXkfz0TTN5RibDua8cHob0jTVztrMJJ1sv96OCoKgV4cD73M-nhEYNK6xAFwSfE0wFjeBYJGmCJMMYZ5hdDgBQ8IFQyJN8AAMcZZxJBKenYFRCBuMsRRZNgTzCVy5na3hozWtr-Ie3ruia0vn4dS5rfU6VjsLnysfW13DlY2fzr8FWDUwvlq4cGs48_ocnJa6Dvbiu47B03y2nt6h5cPtYjpZIsNIGhGxhBoqUpwaKTgmlNpES80kSYXMy0IYXeS8NHnBmU2YyAtJpRVFwdKcMsLZGFz1c7fefbQ2RLVxrW-6lYpiITkliWBdSvQp410I3pbKVLH7wzXR66pWBKujNNVLU500dZSmDh1JfpFbX71rv_-XoT0TumzzYv3PTX9DXxWygDU |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2019_2923203 crossref_primary_10_1155_2021_3329581 crossref_primary_10_1007_s11227_018_2524_1 crossref_primary_10_1109_ACCESS_2019_2893501 crossref_primary_10_1177_09520767241263233 crossref_primary_10_1007_s13369_020_04461_2 crossref_primary_10_1093_bjc_azac089 crossref_primary_10_1016_j_comnet_2023_110140 crossref_primary_10_1109_JIOT_2018_2876133 crossref_primary_10_3390_su12166469 crossref_primary_10_1155_2022_6604286 crossref_primary_10_61882_jist_48455_13_50_130 crossref_primary_10_1002_ett_3723 crossref_primary_10_1109_JIOT_2018_2869847 crossref_primary_10_1007_s11036_020_01663_8 crossref_primary_10_1016_j_comcom_2021_09_006 crossref_primary_10_1109_COMST_2019_2896380 crossref_primary_10_1007_s12652_021_03498_x crossref_primary_10_3390_electronics13152900 crossref_primary_10_1016_j_compeleceng_2023_108813 crossref_primary_10_1515_comp_2024_0004 crossref_primary_10_1016_j_compeleceng_2021_107527 crossref_primary_10_1109_ACCESS_2019_2935797 crossref_primary_10_1016_j_future_2019_08_009 crossref_primary_10_3233_THC_213004 crossref_primary_10_32604_cmes_2023_022783 crossref_primary_10_1109_ACCESS_2023_3281655 |
| Cites_doi | 10.1016/j.comnet.2010.05.010 10.1016/j.future.2017.11.035 10.1109/COMST.2015.2474118 10.1109/MCOM.2010.5394037 10.1109/JIOT.2017.2683200 10.1007/s11277-011-0288-5 10.1109/TIFS.2014.2334272 10.1016/j.compeleceng.2012.06.005 10.1109/SURV.2012.062612.00056 10.1109/TIFS.2015.2453936 10.1109/MCOM.2015.7081074 10.1109/access.2017.2766090 10.1080/23738871.2017.1366536 10.1016/j.bjp.2013.10.014 10.1109/TE.2010.2048215 10.1049/iet-ifs.2014.0545 10.1109/TPDS.2008.263 10.1016/j.pmcj.2017.06.004 10.1109/TLA.2012.6222581 10.1109/WD.2017.7918122 10.1109/ICTTA.2008.4530276 10.1109/LCN.Workshops.2017.82 10.1145/2491185.2491215 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2018 International Journal of Parallel Programming is a copyright of Springer, (2018). All Rights Reserved. |
| Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2018 – notice: International Journal of Parallel Programming is a copyright of Springer, (2018). All Rights Reserved. |
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U |
| DOI | 10.1007/s10766-018-0580-z |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) Research Library (Alumni Edition) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection ProQuest Technology Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business (UW System Shared) ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-7640 |
| EndPage | 295 |
| ExternalDocumentID | 10_1007_s10766_018_0580_z |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C -~X .4S .86 .DC .VR 06D 0R~ 0VY 199 1N0 2.D 203 28- 29J 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 78A 7WY 8FE 8FG 8FL 8G5 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYJJ AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDBF ABDPE ABDZT ABECU ABFSI ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTAH ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACIHN ACKNC ACMDZ ACMLO ACNCT ACOKC ACOMO ACPIV ACREN ACUHS ACZOJ ADHIR ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEAQA AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AOCGG ARAPS ARCSS ARMRJ AXYYD AYJHY AZFZN AZQEC B-. B0M BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BKOMP BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO E.L EAD EAP EAS EBLON EBS EDO EIOEI EJD EMK EPL ESBYG ESX FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ H~9 I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- MS~ N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TAE TEORI TN5 TSG TSK TSV TUC TUS U2A U5U UG4 UOJIU UTJUX UZXMN VC2 VFIZW VXZ W23 W48 WH7 WK8 YLTOR Z45 Z7R Z7X Z81 Z83 Z88 Z8R Z8W Z92 ZMTXR ZY4 ~8M ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D MBDVC PKEHL PQEST PQUKI Q9U |
| ID | FETCH-LOGICAL-c316t-1e12c27606c9750122e4a9a391679bfd7cadb5fcbd53e437bd929e7dd36b23153 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 37 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000522863200008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0885-7458 |
| IngestDate | Tue Nov 04 21:59:06 EST 2025 Sat Nov 29 01:59:45 EST 2025 Tue Nov 18 21:19:23 EST 2025 Fri Feb 21 02:37:21 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | Security of IoT Configuration weaknesses Attacks Network security policy Internal and external threats |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c316t-1e12c27606c9750122e4a9a391679bfd7cadb5fcbd53e437bd929e7dd36b23153 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2079521473 |
| PQPubID | 48389 |
| PageCount | 16 |
| ParticipantIDs | proquest_journals_2079521473 crossref_citationtrail_10_1007_s10766_018_0580_z crossref_primary_10_1007_s10766_018_0580_z springer_journals_10_1007_s10766_018_0580_z |
| PublicationCentury | 2000 |
| PublicationDate | 20200400 2020-4-00 20200401 |
| PublicationDateYYYYMMDD | 2020-04-01 |
| PublicationDate_xml | – month: 4 year: 2020 text: 20200400 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | International journal of parallel programming |
| PublicationTitleAbbrev | Int J Parallel Prog |
| PublicationYear | 2020 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Ahmad, Namal, Ylianttila, Gurtov (CR12) 2015; 17 Bechtsoudis, Sklavos (CR14) 2012; 10 Zhou, Wu, Jiang, Zhou, Gao, Pan, Huang (CR11) 2000; 53 CR10 Lee, Uluagac, Fairbanks, Copeland (CR27) 2011; 54 Al-Turjman, Kirsal Ever, Enver, Nguyen, David (CR1) 2017 Carter, Idika, Streilein (CR15) 2014; 9 Liu, Gouda (CR17) 2009; 20 Salah, Chaudary (CR13) 2015; 9 Qiu, Paterson (CR19) 2010; 48 CR3 Luigi, Iera, Morabito (CR7) 2010; 54 Lin, Yu, Zhang, Yang, Zhang, Zhao (CR5) 2017; 4 Al-Turjman (CR9) 2017 CR28 CR26 Liang, Xiao (CR20) 2013; 15 Al-Turjman (CR4) 2017 Maple (CR2) 2017; 2 CR23 CR22 CR21 Faezipour, Mehrdad, Adnan, Sateesh (CR6) 2012; 2 Shin, Wang, Gu (CR18) 2015; 10 Alabady (CR24) 2009; 1 Giotis (CR25) 2014; 62 Mukhtar, Salah, Iraqi (CR16) 2012; 38 Debasis, Jaydip (CR8) 2011; 58 A Luigi (580_CR7) 2010; 54 B Debasis (580_CR8) 2011; 58 C Maple (580_CR2) 2017; 2 H Mukhtar (580_CR16) 2012; 38 S Shin (580_CR18) 2015; 10 K Giotis (580_CR25) 2014; 62 H Zhou (580_CR11) 2000; 53 SA Alabady (580_CR24) 2009; 1 F Al-Turjman (580_CR1) 2017 CP Lee (580_CR27) 2011; 54 580_CR3 X Liang (580_CR20) 2013; 15 580_CR10 I Ahmad (580_CR12) 2015; 17 M Faezipour (580_CR6) 2012; 2 X Qiu (580_CR19) 2010; 48 AX Liu (580_CR17) 2009; 20 KM Carter (580_CR15) 2014; 9 F Al-Turjman (580_CR9) 2017 A Bechtsoudis (580_CR14) 2012; 10 J Lin (580_CR5) 2017; 4 F Al-Turjman (580_CR4) 2017 580_CR28 580_CR26 580_CR23 K Salah (580_CR13) 2015; 9 580_CR21 580_CR22 |
| References_xml | – volume: 54 start-page: 2787 issue: 15 year: 2010 end-page: 2805 ident: CR7 article-title: The Internet of Things: a survey publication-title: Comput. Netw. doi: 10.1016/j.comnet.2010.05.010 – ident: CR22 – year: 2017 ident: CR4 article-title: 5G-enabled devices and smart-spaces in social-IoT: an overview publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.11.035 – volume: 17 start-page: 2317 issue: 4 year: 2015 end-page: 2346 ident: CR12 article-title: Security in software defined networks: a survey publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2015.2474118 – volume: 48 start-page: 104 year: 2010 end-page: 108 ident: CR19 article-title: An innovative network security vulnerability modeling method and tool publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2010.5394037 – volume: 4 start-page: 1125 issue: 5 year: 2017 end-page: 1142 ident: CR5 article-title: A survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2017.2683200 – ident: CR10 – volume: 58 start-page: 49 issue: 1 year: 2011 end-page: 69 ident: CR8 article-title: Internet of Things: applications and challenges in technology and standardization publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-011-0288-5 – volume: 9 start-page: 1394 issue: 9 year: 2014 end-page: 1405 ident: CR15 article-title: Probabilistic threat propagation for network security publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2014.2334272 – volume: 38 start-page: 1115 year: 2012 end-page: 1128 ident: CR16 article-title: Mitigation of DHCP starvation attack publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2012.06.005 – volume: 15 start-page: 472 issue: 1 year: 2013 end-page: 486 ident: CR20 article-title: Game theory for network security publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/SURV.2012.062612.00056 – ident: CR23 – ident: CR21 – volume: 10 start-page: 2236 issue: 10 year: 2015 end-page: 2249 ident: CR18 article-title: A first step toward network security virtualization: from concept to prototype publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2453936 – volume: 1 start-page: 26 issue: 2 year: 2009 end-page: 36 ident: CR24 article-title: Design and implementation of a network security model for cooperative network publication-title: Int. Arab J. e-Technol. (IAJe-T) – volume: 53 start-page: 45 year: 2000 end-page: 51 ident: CR11 article-title: Evolving defense mechanism for future network security publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2015.7081074 – year: 2017 ident: CR1 article-title: Seamless key agreement framework for mobile-sink in IoT based cloud-centric secure public safety networks publication-title: IEEE Access doi: 10.1109/access.2017.2766090 – ident: CR3 – volume: 2 start-page: 155 issue: 2 year: 2017 end-page: 184 ident: CR2 article-title: Security and privacy in the Internet of Things publication-title: J. Cyber Policy doi: 10.1080/23738871.2017.1366536 – volume: 62 start-page: 122 year: 2014 end-page: 136 ident: CR25 article-title: Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments publication-title: Comput. Netw. doi: 10.1016/j.bjp.2013.10.014 – volume: 54 start-page: 149 issue: 1 year: 2011 end-page: 155 ident: CR27 article-title: The design of NetSecLab: a small competition-based network security lab publication-title: IEEE Trans. Educ. doi: 10.1109/TE.2010.2048215 – volume: 9 start-page: 305 issue: 6 year: 2015 end-page: 312 ident: CR13 article-title: Modelling and analysis of rule-based network security middleboxes publication-title: IET Inf. Secur. doi: 10.1049/iet-ifs.2014.0545 – volume: 20 start-page: 766 issue: 6 year: 2009 end-page: 777 ident: CR17 article-title: Firewall policy queries publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2008.263 – ident: CR28 – ident: CR26 – volume: 2 start-page: 55 issue: 90–100 year: 2012 ident: CR6 article-title: Progress and challenges in intelligent vehicle area networks publication-title: Commun. ACM – year: 2017 ident: CR9 article-title: Cognitive caching for the future fog networking publication-title: Elsevier Pervasive Mob. Comput. doi: 10.1016/j.pmcj.2017.06.004 – volume: 10 start-page: 1752 issue: 3 year: 2012 end-page: 1756 ident: CR14 article-title: Aiming at higher network security through extensive penetration tests publication-title: IEEE Lat. Am. Trans. doi: 10.1109/TLA.2012.6222581 – year: 2017 ident: 580_CR1 publication-title: IEEE Access doi: 10.1109/access.2017.2766090 – volume: 53 start-page: 45 year: 2000 ident: 580_CR11 publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2015.7081074 – volume: 58 start-page: 49 issue: 1 year: 2011 ident: 580_CR8 publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-011-0288-5 – volume: 2 start-page: 55 issue: 90–100 year: 2012 ident: 580_CR6 publication-title: Commun. ACM – ident: 580_CR10 doi: 10.1109/WD.2017.7918122 – volume: 10 start-page: 2236 issue: 10 year: 2015 ident: 580_CR18 publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2453936 – ident: 580_CR23 doi: 10.1109/ICTTA.2008.4530276 – ident: 580_CR22 – volume: 20 start-page: 766 issue: 6 year: 2009 ident: 580_CR17 publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2008.263 – volume: 1 start-page: 26 issue: 2 year: 2009 ident: 580_CR24 publication-title: Int. Arab J. e-Technol. (IAJe-T) – ident: 580_CR3 doi: 10.1109/LCN.Workshops.2017.82 – volume: 54 start-page: 2787 issue: 15 year: 2010 ident: 580_CR7 publication-title: Comput. Netw. doi: 10.1016/j.comnet.2010.05.010 – ident: 580_CR28 doi: 10.1145/2491185.2491215 – volume: 38 start-page: 1115 year: 2012 ident: 580_CR16 publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2012.06.005 – volume: 9 start-page: 1394 issue: 9 year: 2014 ident: 580_CR15 publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2014.2334272 – volume: 10 start-page: 1752 issue: 3 year: 2012 ident: 580_CR14 publication-title: IEEE Lat. Am. Trans. doi: 10.1109/TLA.2012.6222581 – ident: 580_CR26 – volume: 2 start-page: 155 issue: 2 year: 2017 ident: 580_CR2 publication-title: J. Cyber Policy doi: 10.1080/23738871.2017.1366536 – year: 2017 ident: 580_CR4 publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.11.035 – volume: 48 start-page: 104 year: 2010 ident: 580_CR19 publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2010.5394037 – volume: 9 start-page: 305 issue: 6 year: 2015 ident: 580_CR13 publication-title: IET Inf. Secur. doi: 10.1049/iet-ifs.2014.0545 – volume: 54 start-page: 149 issue: 1 year: 2011 ident: 580_CR27 publication-title: IEEE Trans. Educ. doi: 10.1109/TE.2010.2048215 – ident: 580_CR21 – volume: 4 start-page: 1125 issue: 5 year: 2017 ident: 580_CR5 publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2017.2683200 – volume: 15 start-page: 472 issue: 1 year: 2013 ident: 580_CR20 publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/SURV.2012.062612.00056 – year: 2017 ident: 580_CR9 publication-title: Elsevier Pervasive Mob. Comput. doi: 10.1016/j.pmcj.2017.06.004 – volume: 62 start-page: 122 year: 2014 ident: 580_CR25 publication-title: Comput. Netw. doi: 10.1016/j.bjp.2013.10.014 – volume: 17 start-page: 2317 issue: 4 year: 2015 ident: 580_CR12 publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2015.2474118 |
| SSID | ssj0009788 |
| Score | 2.370672 |
| Snippet | The Internet of Things (IoT) has particular applications in public safety as well as other domains such as smart cities, health monitoring, smart homes and... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 280 |
| SubjectTerms | Computer Science Confidentiality Cybersecurity Firewalls Internet of Things Network security Processor Architectures Public safety Routers Smart buildings Software Engineering/Programming and Operating Systems Special Issue on Emerging Technology for Software Defined Network Enabled Internet of Things Switches Switching theory Theory of Computation Virtual networks |
| SummonAdditionalLinks | – databaseName: Computer Science Database dbid: K7- link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFA86PXhxfuJ0Sg6elEDTpE17kjE2FKUITtmt5KswGOts5w77603a1KKgF89tQ8l7L-_33st7PwCulfHplMYchVxSRInKkMgkRiETfmwBdSSqkflPLEmi6TR-dgm30l2rbM7E6qBWubQ5cpsJiQNLqkPulu_IskbZ6qqj0NgGO9j3sdXzR4baobus4p00hhQgRoOoqWrWrXMstLF0hLwg8tDmu19qweaP-mjldsbd__7wAdh3gBMOag05BFt6cQS6DZkDdLZ9DMYDmORrPYcvjtEOWpq0OTSgFg7zfKnrEeHwbVbYlhOY1PfHSzhbQAMi4UM-gaOCn4DX8WgyvEeOZAFJgsMVwhr70mcmjpGxQQ9mGzXlMbf9uCwWmWKSKxFkUqiAaEqYUAZQaaYUCYXBhgE5BZ1FvtBnAJrQS5OMYeUrQWmGuecLTaMswByTUJEe8JotTqWbQG6JMOZpOzvZSiU1UkmtVNJND9x8fbKsx2_89XK_kUTqLLFMWzH0wG0jy_bxr4ud_73YBdjzbeRd3eHpg86q-NCXYFeuV7OyuKrU8BMNa-EC priority: 102 providerName: ProQuest |
| Title | A Novel Security Model for Cooperative Virtual Networks in the IoT Era |
| URI | https://link.springer.com/article/10.1007/s10766-018-0580-z https://www.proquest.com/docview/2079521473 |
| Volume | 48 |
| WOSCitedRecordID | wos000522863200008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: Springer LINK customDbUrl: eissn: 1573-7640 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009788 issn: 0885-7458 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JS8NAFH64Hby4i2uZgydlILNlkqOWFkWNxV0vIbMECqWRtnrw1zuTJlZFBb0MhEwm4c28vO_xlg9gzzibznmc4TDTHHNmcqxyTXAoFY09oI5U2TL_TCZJdH8fd6o67mGd7V6HJMs_9YdiNxl67zfCgYgC_DoNs87aRV4bL69uJ512ZUk26bRHYMlFVIcyv1viszGaIMwvQdHS1rQX__WVS7BQQUt0OD4LyzBl-yuwWNM2oEqLV6F9iJLixfbQVcVdhzwhWg85-IqaRfFkx83A0W134ItLUDLOFB-ibh85uIhOimvUGmRrcNNuXTePcUWngDUj4QgTS6im0nksOnY4gVBqeRZnvvJWxio3UmdGiVwrI5jlTCrjoJOVxrBQORQo2DrM9Iu-3QDknCzLckkMNYrznGQBVZZHuSAZYaFhmxDUck111WvcU1700kmXZC-n1Mkp9XJKXzdh__2Rp3Gjjd8m79SblVY6N0xpIGPhaZfc6w_qzZnc_nGxrT_N3oZ56l3uMnlnB2ZGg2e7C3P6ZdQdDhowLe8eGjB71Eo6l-7qVGI3ngdNP9ILN3bEY6M8sG8dH93X |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LT9tAEB4hqNReoE8RoO0e6KVoJe_DXvuAKhSIiEitSk0RN9f7sBQpikMSQPCj-I3d8QOLSuXGoWfbK63n9c3uzHwA-9bHdCmTnEa5kVQKW1BdGEYjpXmCgDrW1cj8kUrT-OIi-bEG920vDJZVtj6xctS2NHhGjichSYikOuLb_JIiaxTerrYUGrVanLnbG5-yLQ-Hx16-XzgfnIz7p7RhFaBGsGhFmWPccOWBu0l8uGScO5knOTagqkQXVpnc6rAw2obCSaG09QjCKWtFpD0YQpYI7_I3pPTmgKWCQb8b8qsqnktvuCFVMozbW9S6VU9FmLvHNAjjgN49joMduP3rPrYKc4Ot_-0HvYbNBlCTo9oC3sCam72FrZasgjS-6x0MjkhaXrsp-dkw9hGkgZsSD9pJvyznrh6BTs4nC2ypIWldH78kkxnxIJkMyzE5WeTv4dez7OYDrM_KmdsG4lNLJwrFLLdayoLlAddOxkXIciYiK3oQtCLNTDNhHYk-plk3Gxq1IPNakKEWZHc9-PrwybweL_LUy3ut5LPG0yyzTuw9OGh1p3v8z8V2nl7sM7w8HX8fZaNherYLrzieMlT1SnuwvlpcuY_wwlyvJsvFp8oECPx-bpX6AyYAPck |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LS-RAEC5EF_Gyug9xfG0f3MtKs9OPpJPDsog6OChhYFVkL9n0IzAwTGZnRkV_mr_OrjwMK-jNw56TNHT666qvuqvqA9iz3qdLGWc0zIykUtic6twwGirNYyTUkS5b5p-pJImuruLBAjw0tTCYVtnYxNJQ28LgGTmehMQBiuqI73mdFjE46v2c_KWoIIU3rY2cRgWRU3d368O32Y_-kV_rr5z3js8PT2itMECNYOGcMse44cqTeBN718k4dzKLMyxGVbHOrTKZ1UFutA2Ek0Jp69mEU9aKUHtihIoR3vwvKR9jYuA3CH63DX9VqXnpN3FAlQyi5ka1KttTIcbxEe0GUZfe_-sTW6L77G62dHm91f_5Z63B-5pok4NqZ3yABTf-CKuNiAWpbdon6B2QpLhxI_KrVvIjKA83Ip7Mk8OimLiqNTq5HE6x1IYkVd78jAzHxJNn0i_OyfE0-wwXbzKbdVgcF2O3AcSHnE7killutZQ5y7pcOxnlAcuYCK3oQLdZ3tTUnddRAGSUtj2jERGpR0SKiEjvO_Dt6ZNJ1XbktZe3GxSktQWapS0EOrDf4Kh9_OJgm68P9gWWPZLSs35yugUrHA8fyjSmbVicT6_dDrwzN_PhbLpb7gYCf94aUY86tEba |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Security+Model+for+Cooperative+Virtual+Networks+in+the+IoT+Era&rft.jtitle=International+journal+of+parallel+programming&rft.au=Alabady%2C+Salah+A.&rft.au=Al-Turjman%2C+Fadi&rft.au=Din%2C+Sadia&rft.date=2020-04-01&rft.issn=0885-7458&rft.eissn=1573-7640&rft.volume=48&rft.issue=2&rft.spage=280&rft.epage=295&rft_id=info:doi/10.1007%2Fs10766-018-0580-z&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10766_018_0580_z |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0885-7458&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0885-7458&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0885-7458&client=summon |