Suche senden
Hochladen
Performance Analysis of Wireless Trusted Software Defined Networks
•
0 gefällt mir
•
33 views
IRJET Journal
Folgen
https://irjet.net/archives/V4/i8/IRJET-V4I8403.pdf
Weniger lesen
Mehr lesen
Ingenieurwesen
Melden
Teilen
Melden
Teilen
1 von 7
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
A review on software defined network security risks and challenges
A review on software defined network security risks and challenges
TELKOMNIKA JOURNAL
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
ijtsrd
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET Journal
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET Journal
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET Journal
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
Empfohlen
A review on software defined network security risks and challenges
A review on software defined network security risks and challenges
TELKOMNIKA JOURNAL
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
ijtsrd
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET Journal
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET Journal
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET Journal
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
IRJET Journal
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Siyabonga Masuku
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
IOSR Journals
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
IRJET Journal
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
IJNSA Journal
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight Controller
Saikat Chaudhuri
SEDRP
SEDRP
Manoj Mithun
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET Journal
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
IRJET Journal
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
Improvement of quality of service parameters using
Improvement of quality of service parameters using
eSAT Publishing House
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
rahulmonikasharma
Next Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
IRJET Journal
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
IJECEIAES
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
Weitere ähnliche Inhalte
Was ist angesagt?
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
IRJET Journal
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Siyabonga Masuku
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
IOSR Journals
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
IRJET Journal
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
IJNSA Journal
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight Controller
Saikat Chaudhuri
SEDRP
SEDRP
Manoj Mithun
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET Journal
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
IRJET Journal
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
Improvement of quality of service parameters using
Improvement of quality of service parameters using
eSAT Publishing House
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
rahulmonikasharma
Next Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
Was ist angesagt?
(19)
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight Controller
SEDRP
SEDRP
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using
Improvement of quality of service parameters using
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
An Improved Intrusion Prevention Sytem for WLAN
An Improved Intrusion Prevention Sytem for WLAN
Next Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
Ähnlich wie Performance Analysis of Wireless Trusted Software Defined Networks
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
IRJET Journal
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
IJECEIAES
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
IRJET Journal
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
IRJET Journal
Security sdn
Security sdn
Priya Singh
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET Journal
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Fernando Velez Varela
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
rosemariebrayshaw
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architectures
IJCNCJournal
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
IJCNCJournal
IRJET- Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
IRJET Journal
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
IRJET Journal
Software Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic Engineering
QuEST Global (erstwhile NeST Software)
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
IRJET Journal
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET Journal
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
IJECEIAES
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
IRJET Journal
Ähnlich wie Performance Analysis of Wireless Trusted Software Defined Networks
(20)
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Security sdn
Security sdn
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
IRJET- Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Software Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic Engineering
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
Mehr von IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Mehr von IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Kürzlich hochgeladen
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
DerechoLaboralIndivi
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
DineshKumar4165
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
Online banking management system project.pdf
Online banking management system project.pdf
Kamal Acharya
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
JiananWang21
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Suman Jyoti
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
roncy bisnoi
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
rs7054576148
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
University management System project report..pdf
University management System project report..pdf
Kamal Acharya
Kürzlich hochgeladen
(20)
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Online banking management system project.pdf
Online banking management system project.pdf
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
University management System project report..pdf
University management System project report..pdf
Performance Analysis of Wireless Trusted Software Defined Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2231 PERFORMANCE ANALYSIS OF WIRELESS TRUSTED SOFTWARE DEFINED NETWORKS Angel Antonette Keziah .J 1, Rajarajeshwari.K.C2, M.Kirubha3 1 ,2,3 Assistant Professor, Dept. of Electronics and Communication Engineering, Sri Ramakrishna Institute of Technology, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Software defined network (SDN) provides a centralized intelligence andcontrolmodelbytheseparationof the data plane and the control plane that is well suited to provide much needed flexibility to network security deployments. Secured networks are critical to all businesses, especially with their increased migration to the cloud and the wave of innovation being unleashed by SDN. This paper focuses on performance analysis of wireless trusted software defined networks by considering performance matrices like energy consumption, throughput, end-to-end delay, packet delivery ratio for a particular topology model. Results show that the performance of SDN networks is better than the conventional networks which operate without SDN. Furthermore, comparison of energy consumptionfordifferent topology models which uses SDN is done. Key words— Authentication, End-To-End Delay, Packet Delivery Ratio, Throughput, SDN-Software Defined Network 1. INTRODUCTION Recently, Data centres have received significant attention as a very important infrastructure for its ability to store large amount of data and hosting large-scale service applications. Today large companies use data centres for their large scalecomputationsandITbusinesses.SDNoffersa dynamicapproach to networking byseparating(decoupling) the control plane and data forwarding plane of network devices. The data plane is responsible for the actual forwarding of the datapacketsthroughthenetworkusingthe paths chosen by the control plane. The control plane realizes the intelligence of a network. By decoupling the data and control planes routing decisions can becentralizedandmade by software, rather than decentralized decisions at every router within the network. As SDN has better featuresthanconventionalnetworks more research and development study are being done as regards to securing SDN by providing security key. Wide usage of SDN in enhancing fields like underwater sensor nodes, IOT has better prospects. This project began with a literaturestudy to provide relevant background information about the SDN networks and their security issues. SDN architectures were developed to provide improved routing and networking performance, however it changes the network’s communication patterns, allowing new types of attacks, and necessitating a new approach to securing the network .The SDN architectures have not focused on security.SDN security challenges are a combination of SDN, and network security vulnerabilities. The highly secureSDN Networks remains an open problem Fig -1: The SDN Stack. As seen from the Fig 1, SDN architectureis dividedinto three layers: application layer, control layer, and infrastructurelayer.Thisarchitectureprovidesthepossibility to centralize the stateof the networkandtheintelligenceinto one part of the network. This, enhances the property of network programmability, the network industry can start to innovateandenabledifferentiationinthedevelopingprocess. Therefore, SDN can make networks become more scalable, flexible and proactive. SDN architecture stack abstracts and decouples hardware from software, control plane from forwarding plane, and physical from logical configuration. 2. SDN BENEFITS AND CHALLENGES SDN, with its inherent decoupling of control plane from data plane, offers a greater control of a network through programming. This combined feature would bring potential benefits of enhanced configuration, improved performance, and encouraged innovation in network architecture and operations, as summarized in Table 1. Moreover, with an ability to acquire instantaneous network status, SDN permits a real-time centralized control of a network based on both instantaneous network status and user defined policies. This further leads to benefits in
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2232 optimizing network configurations and improving network performance. The potential benefit of SDN is further evidenced by the fact that SDN offers a convenient platform for experimentationsofnew techniquesandencourages new network designs, attributed to its network programmability and the ability to define isolated virtual networks via the control plane. In the subsection, we dwell on these afore mentioned benefits of SDN TABLE -1: Comparison Between SDN And Conventional Networks CHARACTERISTICS SDN CONVENTIONAL NETWORKING Features Decoupled data and control plane and programmability A new protocol per problem, complex network control Configuration Automated configuration with centralized validation Error prone manual configuration Performance Dynamic global control with cross layer information Limited information and relatively static configuration Innovation Easy software implementation for new ideas, sufficient test environment with isolation, and quick deployment using software upgrade. Difficult hardware implementation for new ideas, limited testing environment, long standardization process. In comparison from table 1, SDN encourages innovation by providing a programmable network platform to implement, experiment, and deploy new ideas, new applications, and new revenue earningservicesconveniently and flexibly. High configurability of SDN offers clear separation among virtual networks permitting experimentation on a real environment. Progressive deployment of new ideas can be performed through a seamless transition from an experimental phase to an operational phase. Given the promises of enhancedconfiguration,improved performance, and encouraged innovation, SDN is still in its infancy. Many fundamental issues still remain not fully solved, among which security is the most urgent ones. Common concerns include SDN interoperability with legacy network devices, performance and privacy concerns of centralized control, and lackof experts for technical support. 3. Performance Metrics The following are the metrics that are used for performance analyses. End-to-end delay is the average time it takes a data packet to reach the destination. This includes all possible delays caused by buffering during route discovery latency, queuing at the interface queue. This metric is calculated by subtracting time at which first packet was transmitted by source from time at which first data packetarrived to destination. Mathematically, it can be defined as: Avg.EED=S/N Where S is thesumof the time spent to deliver packets for each destination, and N is the number of packets received by the all destination nodes. Packet delivery ratio is defined as the total number of packets delivered over the total simulation time.Packet delivery ratio Packet delivery ratio is defined as the ratio of data packets received by the destinations to those generated by the sources. Mathematically, it can be defined as: PDR= S1÷ S2 Where, S1 is the sum of data packets received by the each destination and S2 is the sum of data packets generated by the each source. Throughput is a measure of how many units of information a system can process in a given amount of time. Throughput is usually measured in bits per second (and sometimes in data packets per second or data packets per time slot. 4. Security Analyses Of SDN The basic properties of a secure communications network are: confidentiality, integrity, availability of information, authentication and non-repudiation. Inorderto provide a network protected from malicious attack or unintentionaldamage,securityprofessionalsmustsecurethe data, the network assets (e.g. devices) and the communication transactions across the network. The alterations to the network architecture introduced by SDN must be assessed to ensure that network security is sustained. Systems are becoming increasingly complex. This complexity in turn has led to increased risk and severity of bugs and errors in implementations. This complexity increases with virtualization within networks, as increasing numbers of traditional hardware functions are realized by software. This puts a large amount of pressure upon programmers to deliver flawless software solutions. Additionally, this pressure is increasing due to the business trend towards cloud computing. The aim is to ensure that networks are protected from attack by malicious intruders. Networks that are built according to SDN architecture principles need to protect a number of key security assets: Availability – the network should remain operational even under attack. Performance – the network should be able to guarantee a baseline bandwidth and latency in the event of an attack Integrityand confidentiality–controlplaneanddata plane integrity and isolation should be upheld between tenants. To assure protection of these assets, a number of processes need to be in place. They are authentication and authorization, resiliency, multi-domain isolation and repudiation. Authentication and authorization are the processes used to identify an unknown source and then determine its access privileges.Implementedcorrectly,these processes can protect networks from certain types of attack,
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2233 such as Provision of false (statistical) feedback to thesystem, Modification of a valid on-path request, Forwarding Traffic that is not meant to be forwarded or not forwarding, Gaining control access to any component. The critical nature of the SDNC dictates that additional security measures need to be taken to protect it.And so, all communication within the control plane must be mutually authenticated. Security protocols like TLS and IPSEC provide a means for mutual authentication as well as for replay attack protection, confidentiality, and integrity protection. Encryption and integrity protection without mutual authentication are less useful from a security point of view. The problem with mutual authentication is that it requires previousknowledge of the remotecommunicating endpoint – unless a commonly trusted third party exists. The major security threats are denial of service attack, vulnerability attack, connection flooding and bandwidth flooding. Due to these security threats thereisanurgingneed to focus on the security issues of SDN as SDN is the current emerging technology. 5. Proposed Methodology The SDN architectures have not focused on security.SDN security challenges are a combination of SDN, and network security vulnerabilities. The highly secure SDN Networks remains an open problem. The need of the hour is to develop a secured SDN to overcome the security issues by providing a secure networking architecture that secures the data within each layer of communication packet utilizing SDN centralized controller for secure routing and performance management. While advantage of the SDN framework has been recognized, solutions to tackle the challenges of securing the SDN network are fewer in number. SDNs provide us with the ability to easily program the network and to allow for the creation of dynamic flow policies. It is, in fact, this advantage that may also lead to security vulnerabilities. Within this dynamic environment, it is vital that network security policy is enforced. The promises of agility, simplified control, and real-time programmability offered by software-defined networking (SDN) are attractive incentives for operators to keep networkevolutionapacewithadvancesinvirtualization technologies. But thecapabilitiesthatunderminethesecurity is a question to be answered. The aim is to ensure that networks are protected from attack by malicious intruders. The proposed methodology is a secured SDN which focuses on the one of the three assets of security; Authentication which secures the communication between nodes. Various wireless topologies likegrid,randomandtree are developed based on theSDNconcepts.Inthesetopologies the data plane and control plane are separated and one node is made to act as SDN controller which controls the entire network. This approach provides us with the ability to easily program the network. AODV is used for authentication .One distinguishing feature of AODV is its use of a destination sequence number for each route entry. The destination sequence number is created by the destination to be included along with any route information it sends to requesting nodes. Given the choice between two routes to a destination, a requesting node is required to select the one with the greatest sequence number. Requests (RREQs), Route Replies (RREPs), and Route Errors (RERRs) are the message types defined by AODV. When a route to a new destination is needed, thenode broadcasts a RREQ to find a route to the destination. A route can be determined when the RREQ reaches the SDN controller. The route is madeavailable by unicasting a RREP back to the origination of the RREQ. Each node receiving the request caches a route back to the originator of the request, so that the RREP can be unicast from the destination along a path to that originator, or likewise from any intermediate node (SDN controller) that is able to satisfy the request. When a link break in an active route is detected, a RERR message is used to notify other nodes that thelossofthatlink has occurred. The RERR message indicates those destinations which are no longer reachable by way of the broken link. The Fig 2 gives a flow graph of the proposed work. The topologies withSDNcontrollerareauthenticatedbyusingthe above mentioned process and various analyses are considered based on the energy consumption, packet delivery, throughput and the time delay. Of which SDN out beats the conventional network in terms of energy consumption and the time taken
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2234 Fig- 2: Flow Chart for Authentication Process 6. EXPERIMENTAL RESULTS In this project the SDN concept is considered especially from the perspective of network authentication and the Data Plane and Control plane is separated in three wireless topologies and the performance metrics are calculated. Fig 3 illustrate wireless Grid Topology based on SDN concept wherein separation of Data Plane and Control plane is done by using one of the nodes as SDN Controller. The other nodes that wish to send their data have to obtain authentication from the SDN controller Fig-3: Grid Topology Random Topology is elaborated in Fig 4 by separating Data and Control Planes. In fig 5 Packet Drop is seen at times when more number of nodes send request to the controller at the same time. This Topology is less preferred owing to the packet drop. Fig 4: Random Topology Fig -5: Packet Drop In Random Topology
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2235 In the Tree Topology is shown in Fig 6. The Root Node is considered as SDN. Nodes C1, C2 and C3 are nodes which initiate transmission. C1first seeksauthenticationfromSDN, followed by C2 and C3 Fig -6: Tree Topology The following graph in Fig 7 illustrates energy consumption against time taken in grid topology .It elaborates that energy consumption in SDN networks is much lesser compared to the conventional networks Values varied to evaluate energy consumption by using upto 50 nodes. Fig -7: Energy Consumption With and Without SDN The below figure illustrates packet delivery ratio versus time in grid topology. The Packet delivery Ratio in network with SDN is higher in the given time compared to without SDN according to the graph obtained in Fig.8 Fig -8: Packet Delivery Ratio With and Without SDN The Fig 9 shows graph against end-to end delay and time with and without SDN using grid topology. The End-To-End Delay is observed to be less in SDN compared to traditional network without SDN Fig -9: End-To-End Delay with SDN and Without SDN In fig 10 throughputs versus time is plotted and as seen in the figure throughput in SDN is high when compared to without SDN. Fig 10: Throughput With and Without SDN
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2236 The below Fig 11 shows comparison of three topologies with SDN against energy consumption and number of nodes by varying up to 50 nodes. Comparatively Random Topology has seen to consume highest energy followed by Tree and then Grid. As a result it has been observed that only Grid topology consumes less energy. Fig 11: Energy Consumption of Different Topologies With SDN Fig -12: Energy Consumption of Different Topologies with SDN against Time The graph in Fig 12 elucidated, compares energy consumption versus time taken in random, grid and tree topology. The graph elucidates that in the given time, Random Topology consumes more energy while there is a slight variation in the Grid and tree topologies. 7. Conclusion And Future Work Software-defined networking is a new concept to manage and configure computer networks. The main idea of the SDN concept is to separate the controlling layer of the computer network fromthenetwork switchesandcentralize it to the SDN controller. The centralized managementbrings a new way to control network functionality with one single application instead of configuring hundreds and thousands of devices independently. In this paper the SDN concept is addressed especially from the perspective of network security. The security improvements are explored and solutions are proposed for an enhanced security. But, still more research needs to be done to obtain highly secured network.NS2 software is used to study the parameters involved and to develop the proposed solution. Authentication mechanism is provided which secures the communication between nodes, thereby providing security. Different wireless topologies like grid, tree and random has been created with SDN controller and performance metrics like energy consumptionVsnumberof nodes, energy Vs time, throughput, end to end delay and packet delivery ratio are analyzed for the same. Energy consumption and the time taken is analyzed and compared with SDN and without SDN .Wherein, without SDN, consumes less energy than the normal conventional networks which is a great advantage for SDN and another advantage is the lesser time consumed. Although this paper gives out some advantages based on the project work, still security can be enhanced to provide a highly secured network. The SDN will be the leadingnetworkingtechnology in the future but it still needs a little more time to evolve. However the future perspectiveofusageofSDN isvery high. As SDN has better featuresthanconventional networks more research and development study shall be done as regards to securing SDN by providing security key. Wide usage of SDN in enhancing fields like underwater sensor nodes, IOT has better prospects 8. BIBLIOGRAPHY 1. Diogo Menezes Ferrazani Mattos, Lyno Henrique Gonc¸alves Ferraz,Otto Carlos Muniz Bandeira Duarte, “AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking,”IEEE International conference on computer networks,2013. 2. Feliksas Kuliesius, and Vainius Dangovas, “SDN Enhanced Campus Network Authentication andAccess Control System”,IEEE International Conference on Computer Science and Network Technology, 2015. 3. Ruikang Zhou,Yingxu Lai,ZenghuiLiu,JingLiu,“Studyon authentication protocol of SDN trusted domain”, IEEE Twelfth International Symposium on Autonomous Decentralized Systems, 2015. 4. Caraguay ALV, Lopez LIB, Villalba LJG,“Evolution and Challenges of Software Defined Networking”, IEEE Communications Magazine,2012. 5. Patouni E, Merentitis A, Panagiotopoulos P, Glentis A, Alonistioti N, “Network VirtualisationTrends:Virtually
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2237 Anything Is Possible by Connecting the Unconnected”, IEEE SDN for Future Networks and Services (SDN4FNS),2013. 6. CasadoM, Koponen T, Shenker S, Tootoonchian A, “Fabric: A retrospectiveon evolvingSDN”,International journal on SDN, 2012. 7. Monteleone G, Paglierani P,“Session Border Controller Virtualization Towards Service-Defined Networks Based on NFV and SDN”,IEEE SDN for Future Networks and Services (SDN4FNS), 2013. 8. Gelberger A, Yemini N, Giladi R, “Performance Analysis of Software-Defined Networking (SDN)”,IEEE 21st International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS),2013 9. Lara A, Kolasani A, Ramamurthy B, “Network Innovation using OpenFlow: A Survey”, IEEE Communications Surveys & Tutorials,2014 10. Akyildiz IF, Lee A, Wang P, Luo M, Chou W, “A roadmap for traffic engineering in SDN-OpenFlow networks”,International conference on Computer Networks,2014 11. Jin D, Nicol DM, “simulation of software defined networks”,springer,2013 12. Raghavan B, Koponen T, Ghodsi A, Casado M, Ratnasamy S, Shenker S,”Software-defined internet architecture: decoupling architecture from infrastructure”,ACM Hotnets ’12,2012 13. Bhattacharya B, Das D,”SDNbasedArchitectureforQOS Enabled Services across Networks with Dynamic Service Level Agreement”,IEEE ANTS, 2013. 14. Kobayashi M, Seetharaman S, Parulkar G, Appenzeller G, Little J, van Reijendam J, Weissmann P, McKeown N,”Maturing of Open Flow and Software-defined Networking through deployments”,IEEEConferenceon Computer Networks,2014 15. Galis A, Clayman S, Mamatas L, Rubio Loyola J, Manzalini A, Kuklinski S, Serrat J, Zahariadis T,”Softwarization of Future Networks and Services - Programmable Enabled Networks as Next Generation Software Defined Networks”, IEEE SDN for Future Networks and Services(SDN4FNS),2013. 16. Caraguay ALV, Lopez LIB, Villalba LJG,”Evolution and Challenges of Software Defined Networking”, IEEE Communications Magazine,2012. 17. Cahn A, Hoyos J, Hulse M, Keller E,”Software-Defined Energy Communication Networks: From Substation Automation to Future Smart Grids”,IEEE Smart Grid Communication 2013 Symposium - Smart Grid Services and Management Models,2013 18. Wang J, Wang Y, Hu H, Sun Q, Shi H, Zeng L,”Towards a Security-Enhanced Firewall Application for OpenFlow Networks”,Springer LNCS CSS,2013.
Jetzt herunterladen