2016
DOI: 10.14569/ijacsa.2016.071248
|View full text |Cite
|
Sign up to set email alerts
|

A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks

Abstract: Abstract-Software-Defined Networks have seen an increasing in their deployment because they offer better network manageability compared to traditional networks. Despite their immense success and popularity, various security issues in SDN remain open problems for research. Particularly, the problem of securing the controllers in distributed environment is still short of any solutions. This paper proposes a scheme to identify any rogue/malicious controller(s) in a distributed environment. Our scheme is based on … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…A punishment mechanism is used to enhance the cooperative behavior of nodes in wireless ad hoc networks [9]. A trust driven model for network architecture software is proposed [10], which enables trust management and online evolution of trust relationship to be realized. Based on the law of trust, it aims to accumulate feedback of different information interactions to calculate the reputation of users, and then dynamically adjust the reputation of users through reputation rewards and punishments for different information behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…A punishment mechanism is used to enhance the cooperative behavior of nodes in wireless ad hoc networks [9]. A trust driven model for network architecture software is proposed [10], which enables trust management and online evolution of trust relationship to be realized. Based on the law of trust, it aims to accumulate feedback of different information interactions to calculate the reputation of users, and then dynamically adjust the reputation of users through reputation rewards and punishments for different information behaviors.…”
Section: Introductionmentioning
confidence: 99%