A Novel Security Model for Cooperative Virtual Networks in the IoT Era

The Internet of Things (IoT) has particular applications in public safety as well as other domains such as smart cities, health monitoring, smart homes and environments, smart industry, and various types of pervasive systems. The attacker can simply attack the IoT device in such applications, becaus...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:International journal of parallel programming Ročník 48; číslo 2; s. 280 - 295
Hlavní autori: Alabady, Salah A., Al-Turjman, Fadi, Din, Sadia
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: New York Springer US 01.04.2020
Springer Nature B.V
Predmet:
ISSN:0885-7458, 1573-7640
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The Internet of Things (IoT) has particular applications in public safety as well as other domains such as smart cities, health monitoring, smart homes and environments, smart industry, and various types of pervasive systems. The attacker can simply attack the IoT device in such applications, because it is randomly distributed, dynamic topology and not reliable due to energy and communication limitation. Moreover, the threat to confidentiality and security is increasing as the number of devices connected in IoT is increasing. As the numbers of devices connected to the Internet is expanding, the threat to confidentiality and security is increasing. The aim of this paper is design a typical network security model for cooperative virtual networks in the IoT era. This paper presents and discusses network security vulnerabilities, threats, attacks and risks in switches, firewalls and routers, in addition to a policy to mitigate those risks. The paper provides the fundamentals of secure networking system including firewall, router, AAA server and VLAN technology. It presents a novel security model to defense the network from internal and external attacks and threats in the IoT Era. A testbed is built to investigate the proposed model, and the performed assessment show an effective security performance with a good network performance.
AbstractList The Internet of Things (IoT) has particular applications in public safety as well as other domains such as smart cities, health monitoring, smart homes and environments, smart industry, and various types of pervasive systems. The attacker can simply attack the IoT device in such applications, because it is randomly distributed, dynamic topology and not reliable due to energy and communication limitation. Moreover, the threat to confidentiality and security is increasing as the number of devices connected in IoT is increasing. As the numbers of devices connected to the Internet is expanding, the threat to confidentiality and security is increasing. The aim of this paper is design a typical network security model for cooperative virtual networks in the IoT era. This paper presents and discusses network security vulnerabilities, threats, attacks and risks in switches, firewalls and routers, in addition to a policy to mitigate those risks. The paper provides the fundamentals of secure networking system including firewall, router, AAA server and VLAN technology. It presents a novel security model to defense the network from internal and external attacks and threats in the IoT Era. A testbed is built to investigate the proposed model, and the performed assessment show an effective security performance with a good network performance.
Author Din, Sadia
Al-Turjman, Fadi
Alabady, Salah A.
Author_xml – sequence: 1
  givenname: Salah A.
  surname: Alabady
  fullname: Alabady, Salah A.
  organization: Computer Engineering Department, College of Engineering, University of Mosul
– sequence: 2
  givenname: Fadi
  surname: Al-Turjman
  fullname: Al-Turjman, Fadi
  email: fadi.alturjman@antalya.edu.tr
  organization: Department of Computer Engineering, Antalya Bilim University
– sequence: 3
  givenname: Sadia
  surname: Din
  fullname: Din, Sadia
  organization: Kyungpook National University
BookMark eNp9kF1LwzAUhoNMcJv-AO8CXkfz0TTN5RibDua8cHob0jTVztrMJJ1sv96OCoKgV4cD73M-nhEYNK6xAFwSfE0wFjeBYJGmCJMMYZ5hdDgBQ8IFQyJN8AAMcZZxJBKenYFRCBuMsRRZNgTzCVy5na3hozWtr-Ie3ruia0vn4dS5rfU6VjsLnysfW13DlY2fzr8FWDUwvlq4cGs48_ocnJa6Dvbiu47B03y2nt6h5cPtYjpZIsNIGhGxhBoqUpwaKTgmlNpES80kSYXMy0IYXeS8NHnBmU2YyAtJpRVFwdKcMsLZGFz1c7fefbQ2RLVxrW-6lYpiITkliWBdSvQp410I3pbKVLH7wzXR66pWBKujNNVLU500dZSmDh1JfpFbX71rv_-XoT0TumzzYv3PTX9DXxWygDU
CitedBy_id crossref_primary_10_1109_ACCESS_2019_2923203
crossref_primary_10_1155_2021_3329581
crossref_primary_10_1007_s11227_018_2524_1
crossref_primary_10_1109_ACCESS_2019_2893501
crossref_primary_10_1177_09520767241263233
crossref_primary_10_1007_s13369_020_04461_2
crossref_primary_10_1093_bjc_azac089
crossref_primary_10_1016_j_comnet_2023_110140
crossref_primary_10_1109_JIOT_2018_2876133
crossref_primary_10_3390_su12166469
crossref_primary_10_1155_2022_6604286
crossref_primary_10_61882_jist_48455_13_50_130
crossref_primary_10_1002_ett_3723
crossref_primary_10_1109_JIOT_2018_2869847
crossref_primary_10_1007_s11036_020_01663_8
crossref_primary_10_1016_j_comcom_2021_09_006
crossref_primary_10_1109_COMST_2019_2896380
crossref_primary_10_1007_s12652_021_03498_x
crossref_primary_10_3390_electronics13152900
crossref_primary_10_1016_j_compeleceng_2023_108813
crossref_primary_10_1515_comp_2024_0004
crossref_primary_10_1016_j_compeleceng_2021_107527
crossref_primary_10_1109_ACCESS_2019_2935797
crossref_primary_10_1016_j_future_2019_08_009
crossref_primary_10_3233_THC_213004
crossref_primary_10_32604_cmes_2023_022783
crossref_primary_10_1109_ACCESS_2023_3281655
Cites_doi 10.1016/j.comnet.2010.05.010
10.1016/j.future.2017.11.035
10.1109/COMST.2015.2474118
10.1109/MCOM.2010.5394037
10.1109/JIOT.2017.2683200
10.1007/s11277-011-0288-5
10.1109/TIFS.2014.2334272
10.1016/j.compeleceng.2012.06.005
10.1109/SURV.2012.062612.00056
10.1109/TIFS.2015.2453936
10.1109/MCOM.2015.7081074
10.1109/access.2017.2766090
10.1080/23738871.2017.1366536
10.1016/j.bjp.2013.10.014
10.1109/TE.2010.2048215
10.1049/iet-ifs.2014.0545
10.1109/TPDS.2008.263
10.1016/j.pmcj.2017.06.004
10.1109/TLA.2012.6222581
10.1109/WD.2017.7918122
10.1109/ICTTA.2008.4530276
10.1109/LCN.Workshops.2017.82
10.1145/2491185.2491215
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2018
International Journal of Parallel Programming is a copyright of Springer, (2018). All Rights Reserved.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2018
– notice: International Journal of Parallel Programming is a copyright of Springer, (2018). All Rights Reserved.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOI 10.1007/s10766-018-0580-z
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
Research Library (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business (UW System Shared)
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList ABI/INFORM Global (Corporate)

Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7640
EndPage 295
ExternalDocumentID 10_1007_s10766_018_0580_z
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
-~X
.4S
.86
.DC
.VR
06D
0R~
0VY
199
1N0
2.D
203
28-
29J
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
78A
7WY
8FE
8FG
8FL
8G5
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYJJ
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDPE
ABDZT
ABECU
ABFSI
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTAH
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACIHN
ACKNC
ACMDZ
ACMLO
ACNCT
ACOKC
ACOMO
ACPIV
ACREN
ACUHS
ACZOJ
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEAQA
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AOCGG
ARAPS
ARCSS
ARMRJ
AXYYD
AYJHY
AZFZN
AZQEC
B-.
B0M
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BKOMP
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
E.L
EAD
EAP
EAS
EBLON
EBS
EDO
EIOEI
EJD
EMK
EPL
ESBYG
ESX
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GROUPED_ABI_INFORM_RESEARCH
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
H~9
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
MS~
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TAE
TEORI
TN5
TSG
TSK
TSV
TUC
TUS
U2A
U5U
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
VXZ
W23
W48
WH7
WK8
YLTOR
Z45
Z7R
Z7X
Z81
Z83
Z88
Z8R
Z8W
Z92
ZMTXR
ZY4
~8M
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQUKI
Q9U
ID FETCH-LOGICAL-c316t-1e12c27606c9750122e4a9a391679bfd7cadb5fcbd53e437bd929e7dd36b23153
IEDL.DBID RSV
ISICitedReferencesCount 37
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000522863200008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0885-7458
IngestDate Tue Nov 04 21:59:06 EST 2025
Sat Nov 29 01:59:45 EST 2025
Tue Nov 18 21:19:23 EST 2025
Fri Feb 21 02:37:21 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Security of IoT
Configuration weaknesses
Attacks
Network security policy
Internal and external threats
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-1e12c27606c9750122e4a9a391679bfd7cadb5fcbd53e437bd929e7dd36b23153
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2079521473
PQPubID 48389
PageCount 16
ParticipantIDs proquest_journals_2079521473
crossref_citationtrail_10_1007_s10766_018_0580_z
crossref_primary_10_1007_s10766_018_0580_z
springer_journals_10_1007_s10766_018_0580_z
PublicationCentury 2000
PublicationDate 20200400
2020-4-00
20200401
PublicationDateYYYYMMDD 2020-04-01
PublicationDate_xml – month: 4
  year: 2020
  text: 20200400
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle International journal of parallel programming
PublicationTitleAbbrev Int J Parallel Prog
PublicationYear 2020
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Ahmad, Namal, Ylianttila, Gurtov (CR12) 2015; 17
Bechtsoudis, Sklavos (CR14) 2012; 10
Zhou, Wu, Jiang, Zhou, Gao, Pan, Huang (CR11) 2000; 53
CR10
Lee, Uluagac, Fairbanks, Copeland (CR27) 2011; 54
Al-Turjman, Kirsal Ever, Enver, Nguyen, David (CR1) 2017
Carter, Idika, Streilein (CR15) 2014; 9
Liu, Gouda (CR17) 2009; 20
Salah, Chaudary (CR13) 2015; 9
Qiu, Paterson (CR19) 2010; 48
CR3
Luigi, Iera, Morabito (CR7) 2010; 54
Lin, Yu, Zhang, Yang, Zhang, Zhao (CR5) 2017; 4
Al-Turjman (CR9) 2017
CR28
CR26
Liang, Xiao (CR20) 2013; 15
Al-Turjman (CR4) 2017
Maple (CR2) 2017; 2
CR23
CR22
CR21
Faezipour, Mehrdad, Adnan, Sateesh (CR6) 2012; 2
Shin, Wang, Gu (CR18) 2015; 10
Alabady (CR24) 2009; 1
Giotis (CR25) 2014; 62
Mukhtar, Salah, Iraqi (CR16) 2012; 38
Debasis, Jaydip (CR8) 2011; 58
A Luigi (580_CR7) 2010; 54
B Debasis (580_CR8) 2011; 58
C Maple (580_CR2) 2017; 2
H Mukhtar (580_CR16) 2012; 38
S Shin (580_CR18) 2015; 10
K Giotis (580_CR25) 2014; 62
H Zhou (580_CR11) 2000; 53
SA Alabady (580_CR24) 2009; 1
F Al-Turjman (580_CR1) 2017
CP Lee (580_CR27) 2011; 54
580_CR3
X Liang (580_CR20) 2013; 15
580_CR10
I Ahmad (580_CR12) 2015; 17
M Faezipour (580_CR6) 2012; 2
X Qiu (580_CR19) 2010; 48
AX Liu (580_CR17) 2009; 20
KM Carter (580_CR15) 2014; 9
F Al-Turjman (580_CR9) 2017
A Bechtsoudis (580_CR14) 2012; 10
J Lin (580_CR5) 2017; 4
F Al-Turjman (580_CR4) 2017
580_CR28
580_CR26
580_CR23
K Salah (580_CR13) 2015; 9
580_CR21
580_CR22
References_xml – volume: 54
  start-page: 2787
  issue: 15
  year: 2010
  end-page: 2805
  ident: CR7
  article-title: The Internet of Things: a survey
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2010.05.010
– ident: CR22
– year: 2017
  ident: CR4
  article-title: 5G-enabled devices and smart-spaces in social-IoT: an overview
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.11.035
– volume: 17
  start-page: 2317
  issue: 4
  year: 2015
  end-page: 2346
  ident: CR12
  article-title: Security in software defined networks: a survey
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2015.2474118
– volume: 48
  start-page: 104
  year: 2010
  end-page: 108
  ident: CR19
  article-title: An innovative network security vulnerability modeling method and tool
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2010.5394037
– volume: 4
  start-page: 1125
  issue: 5
  year: 2017
  end-page: 1142
  ident: CR5
  article-title: A survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2017.2683200
– ident: CR10
– volume: 58
  start-page: 49
  issue: 1
  year: 2011
  end-page: 69
  ident: CR8
  article-title: Internet of Things: applications and challenges in technology and standardization
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-011-0288-5
– volume: 9
  start-page: 1394
  issue: 9
  year: 2014
  end-page: 1405
  ident: CR15
  article-title: Probabilistic threat propagation for network security
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2334272
– volume: 38
  start-page: 1115
  year: 2012
  end-page: 1128
  ident: CR16
  article-title: Mitigation of DHCP starvation attack
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2012.06.005
– volume: 15
  start-page: 472
  issue: 1
  year: 2013
  end-page: 486
  ident: CR20
  article-title: Game theory for network security
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/SURV.2012.062612.00056
– ident: CR23
– ident: CR21
– volume: 10
  start-page: 2236
  issue: 10
  year: 2015
  end-page: 2249
  ident: CR18
  article-title: A first step toward network security virtualization: from concept to prototype
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2453936
– volume: 1
  start-page: 26
  issue: 2
  year: 2009
  end-page: 36
  ident: CR24
  article-title: Design and implementation of a network security model for cooperative network
  publication-title: Int. Arab J. e-Technol. (IAJe-T)
– volume: 53
  start-page: 45
  year: 2000
  end-page: 51
  ident: CR11
  article-title: Evolving defense mechanism for future network security
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2015.7081074
– year: 2017
  ident: CR1
  article-title: Seamless key agreement framework for mobile-sink in IoT based cloud-centric secure public safety networks
  publication-title: IEEE Access
  doi: 10.1109/access.2017.2766090
– ident: CR3
– volume: 2
  start-page: 155
  issue: 2
  year: 2017
  end-page: 184
  ident: CR2
  article-title: Security and privacy in the Internet of Things
  publication-title: J. Cyber Policy
  doi: 10.1080/23738871.2017.1366536
– volume: 62
  start-page: 122
  year: 2014
  end-page: 136
  ident: CR25
  article-title: Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
  publication-title: Comput. Netw.
  doi: 10.1016/j.bjp.2013.10.014
– volume: 54
  start-page: 149
  issue: 1
  year: 2011
  end-page: 155
  ident: CR27
  article-title: The design of NetSecLab: a small competition-based network security lab
  publication-title: IEEE Trans. Educ.
  doi: 10.1109/TE.2010.2048215
– volume: 9
  start-page: 305
  issue: 6
  year: 2015
  end-page: 312
  ident: CR13
  article-title: Modelling and analysis of rule-based network security middleboxes
  publication-title: IET Inf. Secur.
  doi: 10.1049/iet-ifs.2014.0545
– volume: 20
  start-page: 766
  issue: 6
  year: 2009
  end-page: 777
  ident: CR17
  article-title: Firewall policy queries
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2008.263
– ident: CR28
– ident: CR26
– volume: 2
  start-page: 55
  issue: 90–100
  year: 2012
  ident: CR6
  article-title: Progress and challenges in intelligent vehicle area networks
  publication-title: Commun. ACM
– year: 2017
  ident: CR9
  article-title: Cognitive caching for the future fog networking
  publication-title: Elsevier Pervasive Mob. Comput.
  doi: 10.1016/j.pmcj.2017.06.004
– volume: 10
  start-page: 1752
  issue: 3
  year: 2012
  end-page: 1756
  ident: CR14
  article-title: Aiming at higher network security through extensive penetration tests
  publication-title: IEEE Lat. Am. Trans.
  doi: 10.1109/TLA.2012.6222581
– year: 2017
  ident: 580_CR1
  publication-title: IEEE Access
  doi: 10.1109/access.2017.2766090
– volume: 53
  start-page: 45
  year: 2000
  ident: 580_CR11
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2015.7081074
– volume: 58
  start-page: 49
  issue: 1
  year: 2011
  ident: 580_CR8
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-011-0288-5
– volume: 2
  start-page: 55
  issue: 90–100
  year: 2012
  ident: 580_CR6
  publication-title: Commun. ACM
– ident: 580_CR10
  doi: 10.1109/WD.2017.7918122
– volume: 10
  start-page: 2236
  issue: 10
  year: 2015
  ident: 580_CR18
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2453936
– ident: 580_CR23
  doi: 10.1109/ICTTA.2008.4530276
– ident: 580_CR22
– volume: 20
  start-page: 766
  issue: 6
  year: 2009
  ident: 580_CR17
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2008.263
– volume: 1
  start-page: 26
  issue: 2
  year: 2009
  ident: 580_CR24
  publication-title: Int. Arab J. e-Technol. (IAJe-T)
– ident: 580_CR3
  doi: 10.1109/LCN.Workshops.2017.82
– volume: 54
  start-page: 2787
  issue: 15
  year: 2010
  ident: 580_CR7
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2010.05.010
– ident: 580_CR28
  doi: 10.1145/2491185.2491215
– volume: 38
  start-page: 1115
  year: 2012
  ident: 580_CR16
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2012.06.005
– volume: 9
  start-page: 1394
  issue: 9
  year: 2014
  ident: 580_CR15
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2334272
– volume: 10
  start-page: 1752
  issue: 3
  year: 2012
  ident: 580_CR14
  publication-title: IEEE Lat. Am. Trans.
  doi: 10.1109/TLA.2012.6222581
– ident: 580_CR26
– volume: 2
  start-page: 155
  issue: 2
  year: 2017
  ident: 580_CR2
  publication-title: J. Cyber Policy
  doi: 10.1080/23738871.2017.1366536
– year: 2017
  ident: 580_CR4
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.11.035
– volume: 48
  start-page: 104
  year: 2010
  ident: 580_CR19
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2010.5394037
– volume: 9
  start-page: 305
  issue: 6
  year: 2015
  ident: 580_CR13
  publication-title: IET Inf. Secur.
  doi: 10.1049/iet-ifs.2014.0545
– volume: 54
  start-page: 149
  issue: 1
  year: 2011
  ident: 580_CR27
  publication-title: IEEE Trans. Educ.
  doi: 10.1109/TE.2010.2048215
– ident: 580_CR21
– volume: 4
  start-page: 1125
  issue: 5
  year: 2017
  ident: 580_CR5
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2017.2683200
– volume: 15
  start-page: 472
  issue: 1
  year: 2013
  ident: 580_CR20
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/SURV.2012.062612.00056
– year: 2017
  ident: 580_CR9
  publication-title: Elsevier Pervasive Mob. Comput.
  doi: 10.1016/j.pmcj.2017.06.004
– volume: 62
  start-page: 122
  year: 2014
  ident: 580_CR25
  publication-title: Comput. Netw.
  doi: 10.1016/j.bjp.2013.10.014
– volume: 17
  start-page: 2317
  issue: 4
  year: 2015
  ident: 580_CR12
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2015.2474118
SSID ssj0009788
Score 2.370672
Snippet The Internet of Things (IoT) has particular applications in public safety as well as other domains such as smart cities, health monitoring, smart homes and...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 280
SubjectTerms Computer Science
Confidentiality
Cybersecurity
Firewalls
Internet of Things
Network security
Processor Architectures
Public safety
Routers
Smart buildings
Software Engineering/Programming and Operating Systems
Special Issue on Emerging Technology for Software Defined Network Enabled Internet of Things
Switches
Switching theory
Theory of Computation
Virtual networks
SummonAdditionalLinks – databaseName: Computer Science Database
  dbid: K7-
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFA86PXhxfuJ0Sg6elEDTpE17kjE2FKUITtmt5KswGOts5w77603a1KKgF89tQ8l7L-_33st7PwCulfHplMYchVxSRInKkMgkRiETfmwBdSSqkflPLEmi6TR-dgm30l2rbM7E6qBWubQ5cpsJiQNLqkPulu_IskbZ6qqj0NgGO9j3sdXzR4baobus4p00hhQgRoOoqWrWrXMstLF0hLwg8tDmu19qweaP-mjldsbd__7wAdh3gBMOag05BFt6cQS6DZkDdLZ9DMYDmORrPYcvjtEOWpq0OTSgFg7zfKnrEeHwbVbYlhOY1PfHSzhbQAMi4UM-gaOCn4DX8WgyvEeOZAFJgsMVwhr70mcmjpGxQQ9mGzXlMbf9uCwWmWKSKxFkUqiAaEqYUAZQaaYUCYXBhgE5BZ1FvtBnAJrQS5OMYeUrQWmGuecLTaMswByTUJEe8JotTqWbQG6JMOZpOzvZSiU1UkmtVNJND9x8fbKsx2_89XK_kUTqLLFMWzH0wG0jy_bxr4ud_73YBdjzbeRd3eHpg86q-NCXYFeuV7OyuKrU8BMNa-EC
  priority: 102
  providerName: ProQuest
Title A Novel Security Model for Cooperative Virtual Networks in the IoT Era
URI https://link.springer.com/article/10.1007/s10766-018-0580-z
https://www.proquest.com/docview/2079521473
Volume 48
WOSCitedRecordID wos000522863200008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: Springer LINK
  customDbUrl:
  eissn: 1573-7640
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009788
  issn: 0885-7458
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JS8NAFH64Hby4i2uZgydlILNlkqOWFkWNxV0vIbMECqWRtnrw1zuTJlZFBb0MhEwm4c28vO_xlg9gzzibznmc4TDTHHNmcqxyTXAoFY09oI5U2TL_TCZJdH8fd6o67mGd7V6HJMs_9YdiNxl67zfCgYgC_DoNs87aRV4bL69uJ512ZUk26bRHYMlFVIcyv1viszGaIMwvQdHS1rQX__WVS7BQQUt0OD4LyzBl-yuwWNM2oEqLV6F9iJLixfbQVcVdhzwhWg85-IqaRfFkx83A0W134ItLUDLOFB-ibh85uIhOimvUGmRrcNNuXTePcUWngDUj4QgTS6im0nksOnY4gVBqeRZnvvJWxio3UmdGiVwrI5jlTCrjoJOVxrBQORQo2DrM9Iu-3QDknCzLckkMNYrznGQBVZZHuSAZYaFhmxDUck111WvcU1700kmXZC-n1Mkp9XJKXzdh__2Rp3Gjjd8m79SblVY6N0xpIGPhaZfc6w_qzZnc_nGxrT_N3oZ56l3uMnlnB2ZGg2e7C3P6ZdQdDhowLe8eGjB71Eo6l-7qVGI3ngdNP9ILN3bEY6M8sG8dH93X
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LT9tAEB4hqNReoE8RoO0e6KVoJe_DXvuAKhSIiEitSk0RN9f7sBQpikMSQPCj-I3d8QOLSuXGoWfbK63n9c3uzHwA-9bHdCmTnEa5kVQKW1BdGEYjpXmCgDrW1cj8kUrT-OIi-bEG920vDJZVtj6xctS2NHhGjichSYikOuLb_JIiaxTerrYUGrVanLnbG5-yLQ-Hx16-XzgfnIz7p7RhFaBGsGhFmWPccOWBu0l8uGScO5knOTagqkQXVpnc6rAw2obCSaG09QjCKWtFpD0YQpYI7_I3pPTmgKWCQb8b8qsqnktvuCFVMozbW9S6VU9FmLvHNAjjgN49joMduP3rPrYKc4Ot_-0HvYbNBlCTo9oC3sCam72FrZasgjS-6x0MjkhaXrsp-dkw9hGkgZsSD9pJvyznrh6BTs4nC2ypIWldH78kkxnxIJkMyzE5WeTv4dez7OYDrM_KmdsG4lNLJwrFLLdayoLlAddOxkXIciYiK3oQtCLNTDNhHYk-plk3Gxq1IPNakKEWZHc9-PrwybweL_LUy3ut5LPG0yyzTuw9OGh1p3v8z8V2nl7sM7w8HX8fZaNherYLrzieMlT1SnuwvlpcuY_wwlyvJsvFp8oECPx-bpX6AyYAPck
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LS-RAEC5EF_Gyug9xfG0f3MtKs9OPpJPDsog6OChhYFVkL9n0IzAwTGZnRkV_mr_OrjwMK-jNw56TNHT666qvuqvqA9iz3qdLGWc0zIykUtic6twwGirNYyTUkS5b5p-pJImuruLBAjw0tTCYVtnYxNJQ28LgGTmehMQBiuqI73mdFjE46v2c_KWoIIU3rY2cRgWRU3d368O32Y_-kV_rr5z3js8PT2itMECNYOGcMse44cqTeBN718k4dzKLMyxGVbHOrTKZ1UFutA2Ek0Jp69mEU9aKUHtihIoR3vwvKR9jYuA3CH63DX9VqXnpN3FAlQyi5ka1KttTIcbxEe0GUZfe_-sTW6L77G62dHm91f_5Z63B-5pok4NqZ3yABTf-CKuNiAWpbdon6B2QpLhxI_KrVvIjKA83Ip7Mk8OimLiqNTq5HE6x1IYkVd78jAzHxJNn0i_OyfE0-wwXbzKbdVgcF2O3AcSHnE7killutZQ5y7pcOxnlAcuYCK3oQLdZ3tTUnddRAGSUtj2jERGpR0SKiEjvO_Dt6ZNJ1XbktZe3GxSktQWapS0EOrDf4Kh9_OJgm68P9gWWPZLSs35yugUrHA8fyjSmbVicT6_dDrwzN_PhbLpb7gYCf94aUY86tEba
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Security+Model+for+Cooperative+Virtual+Networks+in+the+IoT+Era&rft.jtitle=International+journal+of+parallel+programming&rft.au=Alabady%2C+Salah+A.&rft.au=Al-Turjman%2C+Fadi&rft.au=Din%2C+Sadia&rft.date=2020-04-01&rft.issn=0885-7458&rft.eissn=1573-7640&rft.volume=48&rft.issue=2&rft.spage=280&rft.epage=295&rft_id=info:doi/10.1007%2Fs10766-018-0580-z&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10766_018_0580_z
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0885-7458&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0885-7458&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0885-7458&client=summon